This is your compare tray

Apps you want to compare will be listed here. Launch a head to head comparison at any time.

Intercept X Endpoint vs Falcon Comparison

Add to Compare

Compare similar apps

NinjaOne logo

NinjaOne

4.9

1Password logo

1Password

4.7

N-central logo

N-central

3.9

DataSet logo

DataSet

4.7

Splunk Enterprise logo

Splunk Enterprise

4.6

Webroot Business Endpoint Protection logo

Webroot Business Endpoint Protection

4.5

Good recommendations?

Overview

Category Leaders

Intercept X Endpoint is an endpoint protection tool that helps IT administrators utilize detect and block malware attacks...

Falcon is a cloud-based endpoint protection platform designed to help enterprises detect, manage, and remediate threats in...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

Pricing

Starting from

ic-pricetag

No pricing info

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

Starting from

ic-pricetag

No pricing info

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

User reviews

4.5

187

5

4

3

2

1

112

58

13

2

2

  • Value for money
  • Ease of use
  • Features
  • Customer support
96%
would recommend this app

4.7

15

5

4

3

2

1

12

2

1

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

Pros

Sophos is a great antivirus defense for mac users, I recommend everyone getting it install, it is constantly in the background working and is the best defense that I have used.

KH

Katie H.

I have been a Sophos customer since 1997, but I check and compare them every couple of years. The price for what you get is great and the features you get are first class and award winning.

NS

Nick S.

We switched to Sophos recently and overall have been super happy with the change. We get notifications of issues.
AvatarImg

Garret H.

Pros

Detailed analysis of processes, logon attempts, and great ability to sync with Splunk and Active Directory. Great dashboard to add to the best parts.
AvatarImg

Anshuman B.

The support team is very responsive and helps guide us through any issues we have. They also help clear up what is a rather complex, information filled portal.

MH

Matt H.

Good interface, lots of Splunk dashboards integrated in the dashboards. Good drilldown capability.

AR

Anonymous Reviewer

Cons

Sophos can be a little bit of a memory hog. On some devices we notice a slow down that does cause some complaints.
AvatarImg

Garret H.

Server protection too asks for reboot when the app gets updated , which is a bit itchy feature.

SS

Sameer S.

Setting up users in the admin portal can also be tedious. If you don't add every user in the same way it can be difficult to keep user data as far as what you can see in the user interface.

MR

Michael R.

Cons

Sometimes it is not update automatically, and I had some problems to remove the software, the key that is used to install/remove fails sometimes.
AvatarImg

André L.

When you are in a limited bandwidth with a higher number of PC’s this will cause too high bandwidth utilization and can interrupt your operation.

AR

Anonymous Reviewer

Diagnosing malware threats, attack vectors and root-cause was never easier.

AR

Anonymous Reviewer

  • Vendor responds to reviews
  • Last review12 days ago
  • Vendor responds to reviews
  • Last review3 months ago

Key features

  • Total features23
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Audit Trail
  • Bandwidth Monitoring
  • Behavior Tracking
  • Behavioral Analytics
  • Container Scanning
  • Continuous Integration
  • Continuous Monitoring
  • Credential Management
  • Dashboard
  • Data Security
  • Data Visualization
  • Device Management
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Event Tracking
  • IOC Verification
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Issue Tracking
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Resource Management
  • Network Security
  • Performance Monitoring
  • Policy Management
  • Prioritization
  • Privileged Account Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Root Cause Analysis
  • Runtime Container Security
  • Server Monitoring
  • Signature Matching
  • Status Tracking
  • Task Management
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Uptime Reporting
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting
  • Total features67
  • API
  • Access Controls/Permissions
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Alerts / Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anti Virus
  • Application Security
  • Audit Trail
  • Bandwidth Monitoring
  • Behavior Tracking
  • Behavioral Analytics
  • Container Scanning
  • Continuous Integration
  • Continuous Monitoring
  • Credential Management
  • Dashboard
  • Data Security
  • Data Visualization
  • Device Management
  • Disaster Recovery
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Event Tracking
  • IOC Verification
  • IP Filtering
  • IT Incident Management
  • Incident Management
  • Incident Reporting
  • Intrusion Detection System
  • Investigation Management
  • Issue Tracking
  • Monitoring
  • Network Monitoring
  • Network Provisioning
  • Network Resource Management
  • Network Security
  • Performance Monitoring
  • Policy Management
  • Prioritization
  • Privileged Account Management
  • Real Time Analytics
  • Real Time Monitoring
  • Real Time Reporting
  • Remediation Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analytics
  • Risk Assessment
  • Root Cause Analysis
  • Runtime Container Security
  • Server Monitoring
  • Signature Matching
  • Status Tracking
  • Task Management
  • Third Party Integrations
  • Threat Intelligence
  • Threat Response
  • Uptime Reporting
  • Virus Definition Update
  • Vulnerability Assessment
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Threat Management
  • Whitelisting/Blacklisting

Integrations

  • Total integrationsN/A
  • Azure Active Directory
  • Box
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft SharePoint
  • Microsoft Teams
  • Okta
  • ServiceNow
  • Slack
  • Splunk Enterprise
  • WordPress
  • Zendesk
  • Total integrations4
  • Azure Active Directory
  • Box
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Cloud Platform
  • Google Workspace
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Outlook
  • Microsoft SharePoint
  • Microsoft Teams
  • Okta
  • ServiceNow
  • Slack
  • Splunk Enterprise
  • WordPress
  • Zendesk

User reviews that mention these apps

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend10/10

Share this review:

Falcon logo

Falcon

Crowdstrike is top security product on the market

Reviewed 2 years ago
Pros

Crowdstrike handles endpoint security monitoring and detection better than any solution available.

Cons

The rate at which they add partner integrations

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend10/10

Share this review:

Falcon logo

Falcon

Great solution but expensive

Reviewed 5 years ago
Pros

Good overall endpoint protection. They also offer sort of SOC services in which they monitor your environment for threats and report on it.

Cons

Very expensive solution...the most expensive I've seen in the market. The solution only supports OS that are newer and does not work with legacy OS like server 2003 and XP

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend8/10

Share this review:

Falcon logo

Falcon

CrowdStrike by Falcon

Reviewed 3 years ago

Customer support is good and they are working on specific issues we've brought to their attention.

Pros

Crowdstrike is a modern endpoint protection software. Instead of guarding against a known set of viruses, it detects malicious behavior as well as protecting endpoints from known viruses, ransomware and malware. The admin console is logically and thorough.

Cons

Support for Mac and endpoints in steady state environments needs more development. There are some unknowns about duplication of endpoint entries in the console for Macintosh clients.

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend8/10

Share this review:

Falcon logo

Falcon

Next Generation Anti virus ideal for enterprises

Reviewed 2 years ago

Crowdstrike is an endpoint protection with EDR which has most advanced features to protect from latest malwares with overall visibility on endpoints. It supports almost all types of endpoint operating systems with lightweight agent installation. Crowdstrike has gone beyond traditional signature based anti viruses. Informative dashboards are nicely presented graphically to understand even for non-technical people as well. For enterprises this is the ideal tool to protect endpoints.

Pros

Crowdtsrike falcon agent is very lightweight and has lower resource utilization in endpoints. Further it supports all the endpoint operating Systems. Interfaces are simple and even non-technical people can understand. Dashboards are informative and graphical representation is perfect with breakdown approach. It provides remote control of the endpoint through the command line and one of the most needed options which most other Anti viruses don't have. It has threat intelligence with correlation and can map endpoints with an incident to provide the big picture.

Cons

Crowdstrike falcon sensor update is frequent and bandwidth utilization is a bit high since each and every node needs updates. When you are in a limited bandwidth with a higher number of PC’s this will cause too high bandwidth utilization and can interrupt your operation. When you. Connecting through proxy server machine detection is taking long.time Crowdstrike doesn’t support Windows XP. So if you have windows XP PCs in your environment you need some other antivirus to protect them.

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend10/10

Share this review:

Falcon logo

Falcon

One of the best endpoint security solution

Reviewed 2 years ago

Overall, I am thoroughly impressed with Falcon, with its ease of use and commendable anomaly detection.

Pros

Detailed analysis of processes, logon attempts, and great ability to sync with Splunk and Active Directory. Great dashboard to add to the best parts. The falcon complete team does a great work to ensure endpoint security is well

Cons

The falcon complete team sometimes does not provide additional details about False Positive events or why a software was classified malicious.

Overall Rating
  • Value for money
  • Ease of use
  • Features
  • Customer support
  • Likelihood to recommend8/10

Share this review:

Falcon logo

Falcon

Good EDR, lot's of features and integration

Reviewed 3 years ago

We liked it. There are a couple features only available to Windows endpoints, but those features are slated to be on Mac OS X shortly. We are waiting on that. As a Splunk user, the integrated Splunk dashboards in the Falcon console are really nice and easy to use.

Pros

Good interface, lots of Splunk dashboards integrated in the dashboards. Good drilldown capability. Love the process execution tracking functionality

Cons

The interface took a couple hours (tops) to get used to, but it wasn't bad. There was a little snag with Mac OS X Catalina, but that's been resolved.