Compare BlackBerry UEM and CrowdStrike Falcon Endpoint Protection Platform

Save
    Log in to your account
    to save comparisons,
    products and more.
At a Glance
BlackBerry UEM
BlackBerry UEM
Star Rating
(376)3.8 out of 5
Market Segments
Enterprise (54.7% of reviews)
Information
Entry-Level Pricing
No pricing available
Learn more about BlackBerry UEM
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Star Rating
(288)4.7 out of 5
Market Segments
Enterprise (54.1% of reviews)
Information
Entry-Level Pricing
Free Trial
Browse all 4 pricing plans
AI Generated Summary
AI-generated. Powered by real user reviews.
  • Users report that CrowdStrike Falcon Endpoint Protection Platform excels in malware detection with a score of 9.6, while BlackBerry UEM falls behind with a score of 9.3. Reviewers mention that the real-time detection capabilities of CrowdStrike are particularly impressive, providing a proactive defense against threats.
  • Reviewers mention that CrowdStrike's ease of setup is rated at 9.2, significantly higher than BlackBerry UEM's 7.5. Users on G2 appreciate the straightforward installation process of CrowdStrike, which allows for quicker deployment in enterprise environments.
  • Users say that CrowdStrike's product direction is highly rated at 9.6, indicating a strong commitment to innovation and improvement, whereas BlackBerry UEM's score of 5.7 suggests concerns about its future development. Reviewers express confidence in CrowdStrike's roadmap and ongoing enhancements.
  • G2 users highlight the superior quality of support from CrowdStrike, scoring 8.9 compared to BlackBerry UEM's 7.9. Users report that CrowdStrike's support team is responsive and knowledgeable, which is crucial for organizations needing timely assistance.
  • Reviewers mention that CrowdStrike's endpoint intelligence feature is rated at 9.4, showcasing its ability to provide actionable insights, while BlackBerry UEM's score of 9.1 indicates a solid but less robust offering. Users appreciate the depth of analytics provided by CrowdStrike.
  • Users on G2 report that CrowdStrike's proactive threat hunting capabilities, rated at 8.9, are a standout feature, allowing organizations to identify and mitigate threats before they escalate. In contrast, BlackBerry UEM's similar feature is perceived as less effective, leading to concerns about its overall security posture.
Featured Products
Pricing
Entry-Level Pricing
BlackBerry UEM
No pricing available
CrowdStrike Falcon Endpoint Protection Platform
Falcon Pro
Free Trial
Browse all 4 pricing plans
Free Trial
BlackBerry UEM
No trial information available
CrowdStrike Falcon Endpoint Protection Platform
Free Trial is available
Ratings
Meets Requirements
8.2
306
9.3
200
Ease of Use
8.0
309
9.1
202
Ease of Setup
7.5
67
9.2
163
Ease of Admin
7.8
63
9.0
155
Quality of Support
7.9
275
8.9
197
Has the product been a good partner in doing business?
7.8
63
9.2
156
Product Direction (% positive)
5.7
290
9.6
180
Features by Category
Cloud Content CollaborationHide 21 FeaturesShow 21 Features
7.9
1,528
Not enough data
File Management
8.2
96
Not enough data
8.0
95
Not enough data
8.0
98
Not enough data
7.7
96
Not enough data
7.9
95
Not enough data
Collaboration
8.3
89
Not enough data
8.0
96
Not enough data
7.5
93
Not enough data
8.1
90
Not enough data
Administration
7.9
81
Not enough data
7.9
79
Not enough data
7.8
82
Not enough data
8.0
82
Not enough data
7.9
82
Not enough data
8.0
78
Not enough data
8.6
81
Not enough data
Platform
8.0
23
Not enough data
7.4
24
Not enough data
7.8
24
Not enough data
7.6
23
Not enough data
7.5
21
Not enough data
Multi-Factor Authentication (MFA)Hide 13 FeaturesShow 13 Features
Not enough data
Not enough data
Authentication type
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Implementation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Unified Endpoint Management (UEM)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Scope
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Endpoint Protection SuitesHide 12 FeaturesShow 12 Features
Not enough data
9.1
489
Administration
Not enough data
9.1
37
Not enough data
8.7
33
Not enough data
8.8
36
Not enough data
8.9
39
Not enough data
9.0
39
Functionality
Not enough data
9.6
47
Not enough data
8.7
36
Not enough data
9.5
43
Not enough data
9.7
48
Analysis
Not enough data
9.0
45
Not enough data
9.3
42
Not enough data
9.2
44
Not enough data
Not enough data
Login Options
Not enough data
Not enough data
Not enough data
Not enough data
Productivity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Customization
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Task Creation
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Task Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Identity and Access Management (IAM)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Type
Not enough data
Not enough data
Not enough data
Not enough data
Reporting
Not enough data
Not enough data
Not enough data
Not enough data
Communication Platform as a ServiceHide 6 FeaturesShow 6 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Support
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Extended Detection and Response (XDR) PlatformsHide 10 FeaturesShow 10 Features
Not enough data
9.2
406
Detection & Response
Not enough data
9.1
40
Not enough data
9.1
41
Not enough data
9.3
41
Not enough data
9.6
42
Management
Not enough data
9.0
41
Not enough data
8.9
38
Not enough data
9.1
38
Analytics
Not enough data
9.4
42
Not enough data
9.1
41
Not enough data
9.3
42
Not enough data
Not enough data
Design
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Collaboration
Not enough data
Not enough data
Not enough data
Not enough data
File Types
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Edit & Revise
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Integrate & Embed
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Operating System
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Application Development PlatformsHide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity Threat Detection and Response (ITDR)Hide 7 FeaturesShow 7 Features
Not enough data
9.2
96
Monitoring
Not enough data
9.3
14
Not enough data
9.6
14
Not enough data
8.6
13
Not enough data
9.3
14
Not enough data
9.1
13
Remediation
Not enough data
9.3
14
Not enough data
9.4
14
Managed Detection and Response (MDR)Hide 8 FeaturesShow 8 Features
Not enough data
9.0
84
Platform Features
Not enough data
9.5
10
Not enough data
8.9
11
Not enough data
9.2
11
Not enough data
9.0
10
Not enough data
9.5
11
Not enough data
8.0
10
Automation Capabilities
Not enough data
9.0
10
Not enough data
8.9
11
Not enough data
Not enough data
Generative AI
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Not enough data
Not enough data
Not enough data
Generative AI
Not enough data
Feature Not Available
Not enough data
Feature Not Available
Endpoint ManagementHide 1 FeatureShow 1 Feature
Not enough data
Not enough data
Generative AI
Feature Not Available
Feature Not Available
Not enough data
Not enough data
Memory Management - Operating System
Not enough data
Not enough data
Device Management - Operating System
Not enough data
Not enough data
Backup and Recovery - Operating System
Not enough data
Not enough data
Error Detection - Operating System
Not enough data
Not enough data
Not enough data
9.1
581
Orchestration
Not enough data
8.8
53
Not enough data
8.7
53
Not enough data
9.2
58
Not enough data
8.8
53
Information
Not enough data
9.2
61
Not enough data
9.5
64
Not enough data
9.3
62
Personalization
Not enough data
9.4
62
Not enough data
9.3
62
Not enough data
8.7
53
Generative AI
Not enough data
Feature Not Available
Not enough data
Not enough data
Cloud Visibility
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Identity
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Information and Event Management (SIEM)Hide 10 FeaturesShow 10 Features
Not enough data
Not enough data
Network Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Incident Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Intelligence
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Encryption
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Compliance
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
System Control
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Vulnerability Prevention
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Desktop as a Service (DaaS)Hide 7 FeaturesShow 7 Features
Not enough data
Not enough data
Functionality
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Management
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
User and Entity Behavior Analytics (UEBA)Hide 7 FeaturesShow 7 Features
Not enough data
8.4
42
Analysis
Not enough data
8.3
6
Not enough data
8.3
6
Not enough data
8.1
6
Not enough data
8.1
6
Detection
Not enough data
8.6
6
Not enough data
8.3
6
Not enough data
8.9
6
Not enough data
Not enough data
Administration
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Platform
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Security
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
Not enough data
ServiceNow Store AppsHide 2 FeaturesShow 2 Features
Not enough data
9.1
23
ServiceNow Apps
Not enough data
9.0
12
Not enough data
9.2
11
Reviews
Reviewers' Company Size
BlackBerry UEM
BlackBerry UEM
Small-Business(50 or fewer emp.)
26.5%
Mid-Market(51-1000 emp.)
18.8%
Enterprise(> 1000 emp.)
54.7%
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Small-Business(50 or fewer emp.)
8.6%
Mid-Market(51-1000 emp.)
37.2%
Enterprise(> 1000 emp.)
54.1%
Reviewers' Industry
BlackBerry UEM
BlackBerry UEM
Financial Services
19.9%
Information Technology and Services
8.3%
Banking
7.5%
Computer Software
3.6%
Accounting
3.6%
Other
57.2%
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Information Technology and Services
16.9%
Computer & Network Security
9.0%
Financial Services
8.6%
Hospital & Health Care
5.3%
Computer Software
4.9%
Other
55.3%
Most Helpful Reviews
BlackBerry UEM
BlackBerry UEM
Most Helpful Favorable Review
Tapan J.
TJ
Tapan J.
Verified User in Marketing and Advertising

It allows fast access to sensitive and classified business info without worrying about the confidentiality theft. Further, I don't need to carry a separate device to be in sync with business mails and syncing with calendars.Good acts as a security layer...

Most Helpful Critical Review
Lia M.
LM
Lia M.
Verified User in Hospital & Health Care

The app for Android Kit kat. Crashes frequently and has connection problems. Can't attach documents unless they are already in document library and you can't add documents to the document library manually. Another annoyance is that it limits the number of...

CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform
Most Helpful Favorable Review
Verified User
G
Verified User in Financial Services

CrowdStrike Falcon Endpoint Protection Platform has great user interface and easily understandable for layer 1 analyst or a new user

Most Helpful Critical Review
Ernesto T.
ET
Ernesto T.
Verified User in Retail

When looking at an incident, it only shows a process tree related to the incident. In order to view the whole panorama of what was going on you need to navigate to Investigate host, which consumes more time and is slow to load. Compare that to Cisco AMP4E...

Alternatives
BlackBerry UEM
BlackBerry UEM Alternatives
ManageEngine Endpoint Central
ManageEngine Endpoint Central
Add ManageEngine Endpoint Central
Jamf Pro
Jamf Pro
Add Jamf Pro
Symantec End-user Endpoint Security
Symantec End-user Endpoint Security
Add Symantec End-user Endpoint Security
NinjaOne
NinjaOne
Add NinjaOne
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Alternatives
Cynet - All-in-One Cybersecurity Platform
Cynet - All-in-One Cybersecurity Platform
Add Cynet - All-in-One Cybersecurity Platform
ThreatDown
ThreatDown
Add ThreatDown
ESET PROTECT
ESET PROTECT
Add ESET PROTECT
SentinelOne Singularity
SentinelOne
Add SentinelOne Singularity
Discussions
BlackBerry UEM
BlackBerry UEM Discussions
How do I work my BlackBerry?
1 comment
Jen G.
JG
Log in and select an app (mail, calendar, etc.) and use it just like on a computer.Read more
como puedo integrar esta herramienta con la nube de otro colega
1 comment
Qiel 9.
Q9
I need software to store documents securely
1 comment
ibnu m.
IM
The office has needs, and I am personal.Read more
CrowdStrike Falcon Endpoint Protection Platform
CrowdStrike Falcon Endpoint Protection Platform Discussions
How to uninstall the CS sensor remotely from any host?
2 comments
Bryan B.
BB
This can be done via RTR if enabled or via deploying CS's uninstall tool through GPO, or whatever other deployment package manager you are using.Read more
How do people see Firewall logs in Crowdstrike . Is it Possible to view Firewall logs or requires a separated application to pull those into CS console.
1 comment
Bryan B.
BB
You can see firewall changes and rule modifications under the event_SimpleNames "FirewallChangeOption" and "FirewallSetRule". CrowdStrike's Firewall license...Read more
Crowd strike have UBA??
1 comment
Bryan B.
BB
No it does not.Read more