Save to My Lists

Falco Reviews & Product Details

MS
Software Engineer TDP-ll
Mid-Market(51-1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Falco?

As a security analyst. I like its powerful intrusion detection feature that detects suspicious activities.

Also, its container and Kubernetes are a big support for organizations operating in cloud infrastructure.

It is open-source so can be used for free. Review collected by and hosted on G2.com.

What do you dislike about Falco?

Falcon sometimes releases unnecessary alerts due to its default settings.

Also, people with little knowledge in security field will find it hard to operate. Review collected by and hosted on G2.com.

What problems is Falco solving and how is that benefiting you?

It helps you to customize rules so that you can create rules for the threats that are relevant to your organization's environment.

Most of the security tools are expensive, so it's a good support for smaller organisation as it is free. Review collected by and hosted on G2.com.

Falco Overview

What is Falco?

Define what activity is considered normal for your containerized applications & be notified when an application deviates.

Falco Details
Discussions
Falco Community
Show LessShow More
Product Description

Define what activity is considered normal for your containerized applications & be notified when an application deviates.


Seller Details
Seller
Sysdig
Year Founded
2013
HQ Location
San Francisco, California
Twitter
@Sysdig
10,165 Twitter followers
LinkedIn® Page
www.linkedin.com
787 employees on LinkedIn®
Description

In the cloud, every second counts. Attacks move at warp speed, and security teams must protect the business without slowing it down. Sysdig stops cloud attacks in real time, instantly detecting changes in risk with runtime insights and open source Falco. Sysdig, rated #1 for CSPM in the Gartner Peer Insights “Voice of a Customer” report, correlates signals across cloud workloads, identities, and services to uncover hidden attack paths and prioritize real risk. From prevention to defense, Sysdig helps enterprises focus on what matters: innovation.𝘚𝘺𝘴𝘥𝘪𝘨. 𝙎𝙚𝙘𝙪𝙧𝙚 𝙀𝙫𝙚𝙧𝙮 𝙎𝙚𝙘𝙤𝙣𝙙.

Recent Falco Reviews

BS
Bikash s.Enterprise (> 1000 emp.)
4.0 out of 5
"Enhancing Kubernetes Security with Falco: A Comprehensive Review"
Ease of Integration: Falco integrates seamlessly with Kubernetes and container environments. Makes it easy to deploy as a DaemonSet across the clus...
MS
Mansi S.Mid-Market (51-1000 emp.)
4.0 out of 5
"Falco - Deep visibility"
As a security analyst. I like its powerful intrusion detection feature that detects suspicious activities. Also, its container and Kubernetes are ...
AH
Anussha H.Small-Business (50 or fewer emp.)
4.0 out of 5
"A Good security toolfor linux systems"
It is really good for linux systems and is a cloud native security tool so it is quite good at the scalability front. It is very good looking when ...
Security Badge
This seller hasn't added their security information yet. Let them know that you'd like them to add it.
0 people requested security information

Falco Media

Answer a few questions to help the Falco community
Have you used Falco before?
Yes

2 out of 3 Total Reviews for Falco

4.0 out of 5
The next elements are filters and will change the displayed results once they are selected.
Search reviews
Hide FiltersMore Filters
The next elements are filters and will change the displayed results once they are selected.
The next elements are filters and will change the displayed results once they are selected.
2 out of 3 Total Reviews for Falco
4.0 out of 5
2 out of 3 Total Reviews for Falco
4.0 out of 5

Falco Pros and Cons

How are these determined?Information
Pros and Cons are compiled from review feedback and grouped into themes to provide an easy-to-understand summary of user reviews.
Pros
Cons
G2 reviews are authentic and verified.
BS
DevOps Engineer
Enterprise(> 1000 emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Falco?

Ease of Integration: Falco integrates seamlessly with Kubernetes and container environments. Makes it easy to deploy as a DaemonSet across the cluster.

Customizable Rules: The ability to customize search rules helps teams tailor security reviews to their specific needs. Helps reduce false positives At the same time it guarantees that important events are recorded.

Detailed notifications: When Falco detects an issue, it provides a detailed notification with context about the event. Help security teams quickly understand and respond to potential threats.

Community Support: As an open source project, Falco benefits from a lively community that actively contributes to its development. It provides a wealth of resources, plugins, and shared experiences…

Extensive coverage: Review various aspects of the Kubernetes ecosystem, including network activity. File access and configuration changes Provides a holistic view of security within a cluster Review collected by and hosted on G2.com.

What do you dislike about Falco?

Configuration Complexity: Although Falco provides customizable rules, setting up and fine-tuning these rules can be complex, especially for organizations with specific or intricate security requirements. New users might find the initial configuration overwhelming.

Resource Consumption: As a DaemonSet running on each node, Falco can consume a noticeable amount of system resources, which might impact performance, especially in resource-constrained environments. This can be a concern for large clusters with many nodes. Review collected by and hosted on G2.com.

What problems is Falco solving and how is that benefiting you?

Runtime Threat Detection:

Problem: Traditional security measures often focus on vulnerabilities and compliance during development but may overlook runtime security issues.

Benefit: Falco continuously monitors the behavior of running containers, detecting anomalies or suspicious activities as they occur. This proactive approach allows for immediate response to potential threats, significantly reducing the risk of breaches.

Visibility into Container Behavior:

Problem: Containers are often treated as black boxes, making it challenging to understand what they are doing in real-time.

Benefit: Falco provides visibility into system calls and actions performed by containers, enabling security teams to identify unusual patterns and respond to potential risks. This enhanced visibility leads to better security management and oversight.

Alerting and Incident Response:

Problem: Many organizations struggle with timely detection and alerting of security incidents, leading to delayed responses.

Benefit: Falco generates real-time alerts for suspicious activities, allowing security teams to take swift action. This rapid response capability minimizes the potential impact of security incidents and improves overall incident management. Review collected by and hosted on G2.com.

AH
Cyber Security Analyst
Small-Business(50 or fewer emp.)
More Options
Validated Reviewer
Review source: G2 invite
Incentivized Review
What do you like best about Falco?

It is really good for linux systems and is a cloud native security tool so it is quite good at the scalability front. It is very good looking when it comes to UI and does house a lot of securty tools within it. Review collected by and hosted on G2.com.

What do you dislike about Falco?

The only issue I faced was to the integration of Falco using API. It is much difficult as it isn't REST API. Hence, there is a learning curve involved when it comes to using this tool. Review collected by and hosted on G2.com.

What problems is Falco solving and how is that benefiting you?

With the need for securing systems becoming more vitals, having a scalable and reliable solution when it comes to security is much need. This tool was perfect for my use case and it was easy to scale. Review collected by and hosted on G2.com.

There are not enough reviews of Falco for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Dynatrace Logo
Dynatrace
4.5
(1,332)
Dynatrace has redefined how you monitor today’s digital ecosystems. AI-powered, full stack and completely automated, it’s the only solution that provides answers, not just data, based on deep insight into every user, every transaction, across every application. The world’s leading brands trust Dynatrace to optimize customer experiences, innovate faster and modernize IT operations with absolute confidence.
2
Wiz Logo
Wiz
4.7
(700)
Wiz is a CNAPP that consolidates CSPM, KSPM, CWPP, vulnerability management, IaC scanning, CIEM, DSPM, and container and Kubernetes security into a single platform.
3
Lacework Logo
Lacework
4.3
(382)
Lacework offers the data-driven security platform for the cloud, and is the leading cloud-native application protection platform (CNAPP) solution. The Polygraph Data Platform is purpose-built with a single detection engine, user interface, and API framework. With the Platform, your team only needs to learn one system for all of your cloud and workload protections, leading to tool consolidation, greater organizational efficiencies, and cost savings. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across your organizations' AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. By taking a data-driven approach to security, the more data you put in, the smarter the Platform gets. This automated intelligence drives better efficacy and a higher return on your investment. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud.
4
Microsoft Defender for Cloud Logo
Microsoft Defender for Cloud
4.4
(302)
Azure Security Center provides security management and threat protection across your hybrid cloud workloads. It allows you to prevent, detect, and respond to security threats with increased visibility.
5
Orca Security Logo
Orca Security
4.6
(218)
Get workload-level visibility into AWS, Azure, and GCP without the operational costs of agents. You could buy three tools instead… but why? Orca replaces legacy vulnerability assessment tools, CSPM, and CWPP. Deploys in minutes, not months.
6
AlgoSec Logo
AlgoSec
4.5
(190)
AlgoSec is a business-driven security management solution.
7
Hybrid Cloud Security Logo
Hybrid Cloud Security
4.5
(175)
Hybrid Cloud Security solution, powered by XGen security, delivers a blend of cross-generational threat defense techniques that have been optimized to protect physical, virtual, and cloud workloads.
8
Qualys VMDR Logo
Qualys VMDR
4.4
(166)
Discover, assess, prioritize, and patch critical vulnerabilities in real time and across your global hybrid-IT landscape — all from a single solution.
9
Check Point CloudGuard CNAPP Logo
Check Point CloudGuard CNAPP
4.5
(156)
Check Point CloudGuard CNAPP provides you with more context to drive actionable security and smarter prevention, from code-to-cloud, across the application lifecycle. CloudGuard’s prevention-first approach protects applications and workloads throughout the software development lifecycle, and includes an effective risk management engine, with automated remediation prioritization, to allow users to focus on the security risks that matter.
10
Snyk Logo
Snyk
4.5
(122)
Snyk is a security solution designed to find and fix vulnerabilities in Node.js and Ruby apps.
Show More