---
description: Compare CrowdStrike vs iManage Threat Manager regarding their features, reviews, pricing, specifications, screenshots & more.
image: https://gdm-localsites-assets-gfprod.imgix.net/images/software_advice/og_logo-55146305bbe7b450bea05c18e9be9c9a.png
title: CrowdStrike vs iManage Threat Manager Comparison
---

Breadcrumb: [Home](/) > [Vulnerability Management Software](/directory/4286/vulnerability-management/software) > [CrowdStrike \<span\>vs\</span\> iManage Threat Manager](https://www.softwareadvice.ie/compare/135499/298339/crowdstrike/vs/imanage-threat-manager)

# Compare CrowdStrike vs iManage Threat Manager

Canonical: https://www.softwareadvice.ie/compare/135499/298339/crowdstrike/vs/imanage-threat-manager

> Detailed comparison between CrowdStrike and iManage Threat Manager. Check ratings, reviews, pricing, and features to make the best decision for your business.

-----

## At a Glance

| Metric | CrowdStrike | iManage Threat Manager |
| **Overall rating** | 4.7/5 | - |
| **Total Reviews** | 55 | 0 |
| **Starting Price** | US$8.99 | - |
| **Free Trial** | Yes | No |
| **Free Version** | No | No |
| **Deployment** | Cloud, SaaS, Web-based, Android (Mobile), iPhone (Mobile), iPad (Mobile) | Cloud, SaaS, Web-based |
| **Support** | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support, 24/7 (Live rep), Chat | Email/Help Desk, FAQs/Forum, Knowledge Base, Phone Support |
| **Training** | In Person, Webinars, Documentation, Videos | Webinars, Documentation, Videos |

## Key features

### CrowdStrike

- AI/Machine Learning
- API
- Access Controls/Permissions
- Application Security
- Audit Trail
- Behavioural Analytics
- Dashboard
- Encryption
- IOC Verification
- Incident Management
- Monitoring
- Prioritisation
- Remediation Management
- Risk Analysis
- Root Cause Analysis
- Status Tracking
- Threat Response
- Vulnerability Scanning
- Web Threat Management
- Whitelisting/Blacklisting

### iManage Threat Manager

- API
- Access Controls/Permissions
- Audit Trail
- Behavioural Analytics
- Incident Management
- Monitoring
- Prioritisation
- Risk Analysis
- Threat Response
- Vulnerability Scanning
- Web Threat Management
- Whitelisting/Blacklisting

## Links

- [View CrowdStrike Profile](https://www.softwareadvice.ie/software/135499/crowdstrike)
- [View iManage Threat Manager Profile](https://www.softwareadvice.ie/software/298339/imanage-threat-manager)
- [View Original Comparison](https://www.softwareadvice.ie/compare/135499/298339/crowdstrike/vs/imanage-threat-manager)

-----

## Structured Data

<script type="application/ld+json">
  {"@context":"https://schema.org","@graph":[{"name":"CrowdStrike vs iManage Threat Manager Comparison","description":"Compare CrowdStrike vs iManage Threat Manager regarding their features, reviews, pricing, specifications, screenshots & more.","url":"https://www.softwareadvice.ie/compare/135499/298339/crowdstrike/vs/imanage-threat-manager","about":[{"@id":"https://www.softwareadvice.ie/software/135499/crowdstrike#software"},{"@id":"https://www.softwareadvice.ie/software/298339/imanage-threat-manager#software"}],"breadcrumb":{"@id":"https://www.softwareadvice.ie/compare/135499/298339/crowdstrike/vs/imanage-threat-manager#breadcrumblist"},"@id":"https://www.softwareadvice.ie/compare/135499/298339/crowdstrike/vs/imanage-threat-manager#webpage","@type":["WebPage","CollectionPage"],"isPartOf":{"@id":"https://www.softwareadvice.ie/#website"},"publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"inLanguage":"en-IE"},{"name":"CrowdStrike","description":"CrowdStrike is a cloud-based endpoint protection solution, which assists small to large businesses with anti-virus protection and device control. Key features include AI-based testing, data security and threat event detection. \n\n\nThe application helps network administrators monitor malicious activities, apply mitigation techniques and block data tampering across multiple devices. System engineers can use the solution to detect unauthorized access in real-time, review and categorize hackers under blacklist or whitelist. Additionally, it helps users identify and block various malware activities such as polymorphic, obfuscated and more. \n\n\nCrowdStrike comes with a feature which enables managers to provide user-based access to USBs, monitor usage and track security risks. It comes with a mobile application for Android and is available on an annual subscription. The solution offers different support options to customers, including email and phone.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/85ac090b-dae6-4c18-b68c-6a0c37a08a9d.png","url":"https://www.softwareadvice.ie/software/135499/crowdstrike","@id":"https://www.softwareadvice.ie/software/135499/crowdstrike#software","@type":"SoftwareApplication","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"aggregateRating":{"@type":"AggregateRating","ratingValue":4.7,"bestRating":5,"ratingCount":55},"offers":{"price":"8.99","@type":"Offer","priceCurrency":"USD"},"operatingSystem":"Cloud, Android, Platform ios, Platform ipad"},{"name":"iManage Threat Manager","description":"iManage Threat Manager offers threat detection, intervention, analytics and data governance to protect sensitive content with compliance monitoring.\n\nThe system protects sensitive information from internal and external threat vectors using technology including adaptive behavior modeling and machine learning to continuously monitor, alert and secure critical assets.","image":"https://gdm-catalog-fmapi-prod.imgix.net/ProductScreenshot/54f2d1d5-5384-4821-bd88-23d4282aea3b.jpeg","url":"https://www.softwareadvice.ie/software/298339/imanage-threat-manager","@id":"https://www.softwareadvice.ie/software/298339/imanage-threat-manager#software","@type":"SoftwareApplication","applicationCategory":"BusinessApplication","publisher":{"@id":"https://www.softwareadvice.ie/#organization"},"operatingSystem":"Cloud"},{"@id":"https://www.softwareadvice.ie/compare/135499/298339/crowdstrike/vs/imanage-threat-manager#breadcrumblist","@type":"BreadcrumbList","itemListElement":[{"name":"Home","position":1,"item":"/","@type":"ListItem"},{"name":"Vulnerability Management Software","position":2,"item":"/directory/4286/vulnerability-management/software","@type":"ListItem"},{"name":"CrowdStrike vs iManage Threat Manager","position":3,"item":"https://www.softwareadvice.ie/compare/135499/298339/crowdstrike/vs/imanage-threat-manager","@type":"ListItem"}]}]}
</script>
