Understanding the Gartner Magic Quadrant

A Leader for the third consecutive time

Enterprise Detection & Response, Q1 2020

Gartner Magic Quadrant is a culmination of research in a specific market, giving you a wide view of the relative positions of the market’s competitors.

  • Using a Gartner Magic Quadrant can be a good first place to start to understand technology providers.
  • "Leaders execute well against their current vision and are well positioned for tomorrow."1
  • Among the 17 other vendors in the Magic Quadrant, CrowdStrike is positioned as a Leader and furthest for Completeness of Vision.

Get your 2022
Gartner report

By clicking submit, I consent to the processing of my contact information by CrowdStrike and its partners, including to CrowdStrike contacting me and sharing my contact information with its partners. I acknowledge that CrowdStrike will use and keep my contact information for as long as necessary for these purposes in accordance with its Privacy Notice.
Register Now

THE Forrester WaveTM

Enterprise Detection & Response, Q1 2020

Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook, Chris Silva, 31 December 2022.

Gartner Research Methodologies, “Magic Quadrant'', 17 November 2022.
https://www.gartner.com/en/research/methodologies/magic-quadrants-research


Gartner is a registered trademark and service mark and Magic Quadrant is a registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. All rights reserved. This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from CrowdStrike. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner research organization and should not be construed as statements of fact. Gartner disclaims all warranties, express or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Try It FREE

By submitting my contact information, I consent to the processing of my data by CrowdStrike and its partners, including to CrowdStrike contacting me and sharing information with its partners. I acknowledge that information submitted may be used by and associated with other information CrowdStrike has collected and used pursuant to its Privacy Notice.

TRUSTED BY OTHERS WHO LEAD

Get peace of mind, and join the world's most secure businesses using CrowdStrike to stop breaches.

Deloitte
Market Presence

Download this report to learn:

  • The roles that threat hunting and cyber threat intelligence play in Forrester’s assessment that “CrowdStrike continues to lead on strategy and execution”
  • What differentiates CrowdStrike in the EDR space and why it received the highest possible score in 11 criteria
  • Why Forrester states that CrowdStrike® Falcon capabilities are often the “benchmark other client references use when describing capabilities they wish were available in their selected products”
Read Now
Case Study: Oak Hill Advisors

Case Study: Oak Hill AdvisorsCase Study: Oak Hill AdvisorsCase Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download
2020 Global Threat Report

2020 Global Threat Report

Get an overview of the trends in attackers tactics and practical recommendations to keep your organization protected.

Download
Case Study: Financial Services Comp...

Case Study: Financial Services Comp...

See how a finanical services leader rolled out CrowdStrike to over 60,000 endpoints and 15,000 servers.

Download
Case Study: Greenhill & Co.

Case Study: Greenhill & Co.

Hear how CIO John Shaffer, provides end-to-end protection for Greenhill's global operations.

Download
Data Sheet: CrowdStrike Falcon For...

Data Sheet: CrowdStrike Falcon For...

See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks. See how security teams are managing customer data in the face of heavy regulation and sophisticiated exteral and internal attacks.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors. Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
Forrester Wave: Enterprise Detecti...

Forrester Wave: Enterprise Detecti...

Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download
View More

Related Resources

Case Study: Oak Hill Advisors Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security. Q1 2020. Get an overview of the technology and Forrester's ratings of the leading vendors.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security. Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download

Case Study: Oak Hill Advisors

Learn how CISO Sajawal Haider created a secure cloud infrastructure that provides agility while maintaining security.

Download
View More
Video Thumbnail
Play Buttom

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

  • Highly Targeted

    Financial services is the #1 targeted industry by cybercriminals.

  • Regulatory Compliance

    Financial services companies must achieve compliance or risk heavy fines and loss of business.

  • Sophisticated & Persistent Attacks

    Financial institutions are required to protect customer data regardless of where it is located.

Text

Text

Video Thumbnail
Play Buttom

Andy Ozment, Goldman Sachs CISO

Discusses the threat landscape faced by financial institutions and
how they use CrowdStrike to protect against new threats.

SEE HOW CROWDSTRIKE STACKS UP

Try it free

Information submitted on this form may be associated with other information we have collected and used pursuant to our  Privacy Notice.

A Leader
for the third
consecutive time

CrowdStrike named a Leader in the 2022 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.

View the report

Falcon Firewall Management: Host Firewall

Falcon Firewall Management provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies

Start Free Trial

PROUD OF WHERE WE ARE, FOCUSED ON WHERE WE'RE GOING

Our missions at CrowdStrike is the same today as it was in 2011: to stop breaches. Our key areas of leadership reinforce our commitment to that mission, and will continue to deliver a platform that not only stops attacks in the moment but is purpose-built to meet the future needs of cybersecurity and advancing adversary tactics.

PROUD OF WHERE WE ARE, FOCUSED ON WHERE WE'RE GOING

Our mission at CrowdStrike is the same today as it was in 2011: to stop breaches. Our key areas of leadership reinforce our commitment to that mission, and will continue to deliver a platform that not only stops attacks in the moment but is purpose-built to meet the future needs of cybersecurity and advancing adversary tactics.

Ease of Use
Ease-of Use

Our light weight, single agent solution can be deployed quickly for immediate and comprehensive protection.

Customer Experience
Customer Experience

From extensive managed services offerings to whiteglove customer support, we go above and beyond to serve our customers.

Innovation
Innovation

Through acquistions and product development, we continually expand the functionality of our platform.

COMPARE CROWDSTRIKE
TO OTHER ENDPOINT PROTECTION

Not sure which endpoint security solution to choose?
Discover the key differences between CrowdStrike, Microsoft Defender and VMware Carbon Black123

MainTitle
Symantec
CrowdStrike
Symantec
CrowdStrike
DETECTION
Signatureless Advanced, signatureless protection from machine learning, behavioral analytics and integrated threat intelligence.
Signatures Includes signature-based AV engine.
REBOOT REQUIRED Sensor updates require OS-level updates and device reboots, including critical servers.
Maintenance
FRICTIONless UPDATES Lightweight agent. No reboot required.
REBOOT REQUIRED Sensor updates require OS-level updates and device reboots, including critical servers.
REBOOT REQUIRED Sensor updates require OS-level updates and device reboots, including critical servers.
Maintenance
SIGNATURE BASED Protects only against known threats. Machine learning on Windows only.
SIGNATURE Uses local machine and on-premise infrastructure. Additional hardware costs and maintenance burden.
MULTI-DAY Required endpoint downtime, and restart for installation and updates.
Managed threat hunting
MACHINE LEARNING BASED Protects against known & unknown threats.
MACHINE LEARNING BASED Protects against known & unknown threats.
MACHINE LEARNING BASED Protects against known & unknown threats.
Cross-platform support
MACHINE LEARNING BASED Protects against known & unknown threats.
MACHINE LEARNING BASED Protects against known & unknown threats.
MACHINE LEARNING BASED Protects against known & unknown threats.
Integrated threat intel
Best in Class Integrated Intel Protects against known & unknown threats.
MACHINE LEARNING BASED Protects against known & unknown threats.
MACHINE LEARNING BASED Protects against known & unknown threats.