This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

All categories

Learn why GetApp is free

HackEDU vs Falcon Comparison

Overview

HackEDU is a cloud-based solution, which helps businesses manage training programs for software developers. Primarily designed...

Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Screenshots

Pricing

Starting from
/
No info available
/
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based
Starting from
/
No info available
/
  • Free trial available
  • No credit card required
  • Free account
  • Subscription based

User reviews

4.8

(5)

5

4

3

2

1

4

1

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

4.8

(12)

5

4

3

2

1

10

2

0

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

Not enoughreviews yet

Pros

Good interface, lots of Splunk dashboards integrated in the dashboards. Good drilldown capability.
Overall, I am thoroughly impressed with Falcon, with its ease of use and commendable anomaly detection.
Pretty easy to use, and it is very light installation on the client, specially if you do not have a very actual and robust configuration on your computers.

Cons

Not enoughreviews yet

Cons

Sometimes it is not update automatically, and I had some problems to remove the software, the key that is used to install/remove fails sometimes.
When you are in a limited bandwidth with a higher number of PC’s this will cause too high bandwidth utilization and can interrupt your operation.
Diagnosing malware threats, attack vectors and root-cause was never easier.
  • Vendor responds to reviews
  • Last reviewN/A
  • Vendor responds to reviews
  • Last review2 months ago

Key features

  • Total features42
  • API
  • Academic/Education
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad hoc Reporting
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Applications Management
  • Asynchronous Learning
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Blended Learning
  • Built-in Course Authoring
  • Certification & Licensing
  • Certification Tracking
  • Compliance Management
  • Contact Management
  • Content Management
  • Continuous Monitoring
  • Corporate/Business
  • Credential Management
  • Customizable Reports
  • Data Visualization
  • Device Management
  • Disaster Recovery
  • Endpoint Management
  • Endpoint Protection
  • Engagement Analytics
  • Event Analysis
  • Event Logs
  • Event Tracking
  • Gamification
  • HIPAA Compliant
  • IOC Verification
  • IT Incident Management
  • Incident Management
  • Interactive Content
  • Intrusion Detection System
  • Investigation Management
  • Learner Portal
  • Learning Management
  • Learning Paths/Tracks
  • Modeling & Simulation
  • Monitoring
  • Multiple User Accounts
  • Network Resource Management
  • Network Security
  • PCI Compliance
  • Policy Management
  • Prioritization
  • Privileged Account Management
  • Progress Reports
  • Progress Tracking
  • Real Time Monitoring
  • Remediation Management
  • Reminders
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Root Cause Analysis
  • Secure Data Storage
  • Secure Login
  • Self-Learning
  • Signature Matching
  • Single Sign On
  • Status Tracking
  • Task Scheduling
  • Tests/Assessments
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Training Management
  • Training Record Management
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Total features52
  • API
  • Academic/Education
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad hoc Reporting
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Applications Management
  • Asynchronous Learning
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavioral Analytics
  • Blended Learning
  • Built-in Course Authoring
  • Certification & Licensing
  • Certification Tracking
  • Compliance Management
  • Contact Management
  • Content Management
  • Continuous Monitoring
  • Corporate/Business
  • Credential Management
  • Customizable Reports
  • Data Visualization
  • Device Management
  • Disaster Recovery
  • Endpoint Management
  • Endpoint Protection
  • Engagement Analytics
  • Event Analysis
  • Event Logs
  • Event Tracking
  • Gamification
  • HIPAA Compliant
  • IOC Verification
  • IT Incident Management
  • Incident Management
  • Interactive Content
  • Intrusion Detection System
  • Investigation Management
  • Learner Portal
  • Learning Management
  • Learning Paths/Tracks
  • Modeling & Simulation
  • Monitoring
  • Multiple User Accounts
  • Network Resource Management
  • Network Security
  • PCI Compliance
  • Policy Management
  • Prioritization
  • Privileged Account Management
  • Progress Reports
  • Progress Tracking
  • Real Time Monitoring
  • Remediation Management
  • Reminders
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Root Cause Analysis
  • Secure Data Storage
  • Secure Login
  • Self-Learning
  • Signature Matching
  • Single Sign On
  • Status Tracking
  • Task Scheduling
  • Tests/Assessments
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Training Management
  • Training Record Management
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting

Integrations

  • Total integrations1
  • Axonius
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Okta
  • OneLogin
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk
  • Total integrations3
  • Axonius
  • Box
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Okta
  • OneLogin
  • PagerDuty
  • Salesforce Sales Cloud
  • ServiceNow
  • SharePoint
  • Slack
  • Splunk Enterprise
  • Zendesk

Security

  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation
  • Encryption of sensitive data at rest
  • HTTPS for all pages (web-based apps)
  • Reports/alerts for security breaches
  • Multifactor authentication options
  • Customer data removed upon service cancellation

HackEDU vs. Falcon

See how HackEDU and Falcon stack up against each other by comparing features, pricing, ratings, integrations, security & more.

Select your country

10+ YEARS RECOMMENDING SOFTWARE

© 2010-2021 GetApp. All Rights Reserved.
GetApp® is a registered trademark of Nubera eBusiness S.L. Nubera eBusiness uses its own and third-party cookies. By using the website you are accepting the use of these cookies. To get more information about our cookies click here.