Yeah, it's tough, not cheap, and not a proposal. We do auto-ish-update, with a delay loop, of an hour or so, for sanity checking. System owners do have an unenviable balancing act, between one regulation that demands instant response to zero-days, and more mature regulations that demand Supply Chain Security validation, plus a rigorous Configuration Management Plan, plus a Continuity of Operations plan.
We run a lab with the closet possible mirror of Prod OSs, apps and workflows (though not data and work loading, obviously). We live on call (well, not me, of course, because I'm old and only architected it). There's health monitoring with 24-7 alerts from SOC when they hit something truly urgent, like a new zero-day in the wild. We're usually up, caffeinated and waiting around for vendors to get their **** together. We zip through the tests, and then enable auto-update in Prod.
Sometimes our SOC alert starts with CISA vetting exploit and detection updates, which means we Protect-Serve and have a joy-joy day. In any event, I can't see a rush to rip and replace Crowdstrike. We've ALL seen lots of vendors screw up, and if we cancel every time, there's no benefit from the vendors' lessons learned.
As for IOS, yes, the core is reasonably secure. Compliance scans are grudgingly accepted even though most configuration and vulnerability scanners only query an MDM, as opposed to the device itself (mixed blessing). Crowdstrike is an odd duck in IOS support, by providing an on-device software agent (also a mixed blessing)