The world’s leading AI-powered platform for unified endpoint detection and response (EDR) and extended detection and response (XDR)
Achieve enhanced observability across distributed systems while eliminating the need to make cost-based concessions on which logs to ingest and retain.
Falcon Horizon automates cloud security management across the application development lifecycle for any cloud, enabling customers to securely deploy applications in the cloud with greater speed and efficiency.
Falcon Cloud Security delivers comprehensive breach protection for workloads, containers, and Kubernetes enabling organizations to build, run, and secure cloud-native applications with speed and confidence.
For organizations struggling with the ineffectiveness and complexity of legacy antivirus solutions, Falcon Prevent is here to help. As the most complete AV replacement solution in the industry, Falcon Prevent delivers superior protection with a single lightweight agent that operates without the need for constant signature updates, on-premises management infrastructure, or complex integrations.
Provides visibility for identity based attacks and anomalies, comparing live traffic against behavior baselines and rules to detect attacks and lateral movement. Realtime identity threat detection alerts on compromised credentials and infected machines within the network or cloud, or other unusual authentication traffic.
For IT and Security teams who need to identify and track computers and applications on their network, Falcon Discover is the CrowdStrike IT hygiene solution. Falcon Discover monitors and inventories systems, application usage and user account usage in real time.
Enriches the events and incidents detected by the CrowdStrike Falcon platform, automating intelligence so security operations teams can make better, faster decisions.
With the Falcon platform, customers receive rapid and scalable deployment, superior protection and performance, reduced complexity, and immediate time-to-value. With capabilites such as EDR/XDR, Threat Intelligence, Identity Protection, Security and IT Operations, Log Management, and Data Protection.
Supercharges detection and response across your entire security stack by synthesizing multi-domain telemetry in one unified, threat-centric command console
Protects against all types of threats, from malware and ransomware to sophisticated attacks, and deploys in minutes, immediately protecting your endpoints
Delivers continuous, comprehensive endpoint visibility and automatically detects and intelligently prioritizes malicious activity to ensure nothing is missed and potential breaches are stopped
Delivers simple, centralized host firewall management, making it easy to manage and control host firewall policies
Provides the visibility and precise control required to enable safe usage of USB devices across your organization
Enriches the events and incidents detected by the CrowdStrike Falcon platform, automating intelligence so security operations teams can make better, faster decisions
Maximizes your investment in Falcon X Premium with access to a CrowdStrike threat intelligence analyst whose mission is helping you defend against adversaries targeting your organization
Monitors potentially malicious activity across the open, deep and dark web, enabling you to better protect your brand, employees and sensitive data
Uncovers the full malware attack lifecycle with in-depth insight into all file, network, memory and process activity, and provides easy-to-understand reports, actionable IOCs and seamless integration
Partners you with a team of elite cybersecurity experts to hunt continuously within the Falcon platform for faint signs of sophisticated intrusions, leaving attackers nowhere to hide
Extends your team with an assigned CrowdStrike threat hunting analyst, providing dedicated expertise, tactical day-to-day insights into your threat landscape and strategic advisory to help drive continuous improvement
Stops and eradicates threats in minutes with 24/7 expert management, monitoring and surgical remediation, backed by the industry’s strongest Breach Prevention Warranty
Provides comprehensive breach protection across private, public, hybrid and multi-cloud environments, allowing customers to rapidly adopt and secure technology across any workload
Streamlines cloud security posture management across the application lifecycle for multi-cloud environments, enabling you to securely deploy applications in the cloud with greater speed and efficiency
Automates the secure development of cloud-native applications by delivering full-stack protection and compliance for containers, Kubernetes and hosts across the container lifecycle
Provides a fully managed service with seasoned security professionals who have experience in cloud defense, incident handling and response, forensics, SOC analysis and IT administration
Identifies unauthorized accounts, systems and applications anywhere in your environment in real time, enabling faster remediation to improve your overall security posture
Offers security teams an automated, comprehensive vulnerability management solution, enabling faster prioritization and improved remediation workflows without resource-intensive scans
Provides real-time, comprehensive and centralized visibility that boosts compliance and offers relevant contextual data
Automates collection of point-in-time and historic forensic triage data for robust analysis of cybersecurity incidents
Enables hyper-accurate detection of identity-based threats in real time, leveraging AI and behavioral analytics to provide deep actionable insights to stop modern attacks like ransomware
Enables hyper-accurate threat detection and real-time prevention of identity-based attacks by combining the power of advanced AI, behavioral analytics and a flexible policy engine to enforce risk-based conditional access
Offers an advanced, purpose-built log management platform that lets organizations log everything to answer anything in real time, enables complete observability for all streaming logs and event data, and helps better prepare for the unknown by making it easy to explore and find the root cause of any incident
Delivers pre- and post-incident response (IR) services 24/7 to support you before, during and after a breach, with skilled teams to help you defend against and respond to security incidents, prevent breaches and optimize your speed to remediation
Prepare: Advisory Services
Respond: Breach Services
Fortify: Advisory Services
Technology Services