• @zorro
    link
    English
    -92 months ago

    Or in other words, everyone else is complete shit.

    • @[email protected]
      link
      fedilink
      27
      edit-2
      2 months ago

      No, but yes.

      Crowdstrike was one of the first companies doing EDR, and have a first mover advantage they have held onto. Lots of other companies offer good solutions now, but crowdstrike is still considered the gold standard, and they have worked hard to become the “default” for their market segment.

      • @fishpen0
        link
        12 months ago

        Also thanks to ebpf it’s now very easy to implement EDR without a full blown rootkit in Linux and anyone on the bleeding edge is moving away from this kind of solution

    • slazer2au
      link
      English
      122 months ago

      No, it’s not a binary thing. There are other EDR products but they are the largest.

    • @bushvin
      link
      112 months ago

      What CrowdStrike is actually selling, is someone who actually looks at the system logs and who pushes a button when something pops up. Roughly.

      There are better solutions on the market. Unfortunately CrowdStrike has the more aggressive sales team.

      For those wondering, I’m referring to *nix based solutions like SElinux, appArmor, iptables, nftables, cgroups, … But you need to monitor your logs if you want to take appropriate action.

        • @bushvin
          link
          02 months ago

          The problem with SELinux/nftables/cgroups is that they don’t come with a centralised log aggregator, and they don’t do much blocking beyond the defaults for 99% of deployments.

          You must not have heard of ®syslog.

          Also, SELinux is a massive pain to set up (even compared to AppArmor), and setting it up correctly is even worse.

          I beg to differ, I find SELinux easy to setup. But your mileage may vary, depending on one’s experience.

          CrowdStrike does a lot of what SELinux does but it’s easier to configure, works on every operating system, and comes with tools to roll out configuration across an organisation. There’s nothing close to that in the open source world. Even if you set up something yourself, you’ll need to continuously tweak your setup not to get in the way of employees and to prevent alert fatigue from all of the false positives. Apparently, recent events show it doesn’t work on every OS… 😜

          When talking about ease of use… Configuration is configuration. If you do not take the time to learn how to use your product, the product you know will always be better than the one you don’t. I’ve used Crowdstrike. I’ve battled them to get their kernel modules signing certificate to be signed by RedHat. I’ve battled them to have the possibility to have the auto update disabled. So no, I am not impressed by the quality of their product. I’ll bet any day a vanilla RHEL with the correct security related software and the latest updates outperforms and outclasses Crowdstrike.

          I think a preconfigured solution like Security Onion combined with tons of group policy and Ansible can form an open source alternative, but that only monitors, whereas CrowdStrike also blocks. To block behaviour, you’ll need to write code for most platforms, and that’s just as likely to take down your org as an auto update from CrowdStrike. I can’t speak of MS products, as I have not managed them for 20 years, but all of this is not needed on a decent Linux distro.

    • @Brkdncr
      link
      52 months ago

      Crowdstrike marketed to c-suites better than the others.