CrowdStrike

New and innovative strides in threat protection. Paving the way for the next generation of IT security.

 

CrowdStrike
Best of breed, cloud-based next-generation threat protection platform providing real-time detection and prevention.

Falcon Platform

picture

CrowdStrike’s cloud-based next-generation threat protection platform leverages execution profiling and real-time forensics. It enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real-time. The core is network of host-based detection sensors driven by world-class cyber threat intelligence.

Falcon Host

picture

Falcon Host is comprised of two core components, the cloud-based application and the on-premise host-based sensor. Falcon Host leverages a lightweight host-based sensor that shadows, captures, and correlates low-level operating system events to instantly identify the adversary tradecraft and activity through our patent-pending Execution Profiling technology.

Falcon Intelligence

picture

Falcon Intelligence is the cyber threat intelligence application of the CrowdStrike Falcon Platform. It provides strategic, customized, and actionable intelligence that enables organizations to prioritize resources and proactively defend against future attacks. Intelligence provides your organization with detailed technical and strategic analysis of adversary capabilities, indicators and tradecraft, attribution and intentions.

Falcon DNS

picture

CrowdStrike’s Falcon DNS uses malicious network indicators to protect your network from targeted attack. CrowdStrike will serve as your upstream DNS provider, identifying malicious DNS requests or blocking their successful resolution. It can manage a “blacklist” of targeted attack beacons and alert on suspicious requests. It can also block, or “sinkhole,” malicious domains.

Falcon Email

picture

More than 80% of targeted attacks begin with spear phishing emails sent to users in the targeted environment. Our custom Email Protect service can identify behavioral patterns within emails and email attachments with fully customizable policies. It requires no onsite hardware. It works passively alongside other mail gateway solutions rapidly alerting on suspicious and malicious emails and attachments.

Falcon Protect

picture

Managed cutting-edge advanced adversary intrusion detection services. The operations center provides a holistic view of customers’ cyber landscape, constantly monitoring CrowdStrike’s security platform, as well as data feeds from other security products. Falcon Managed Protect services can also help reveal existing compromised systems and provide counter-intelligence techniques.

Active Defense

picture

Identify and prevent damage from targeted attacks with the Active Defense strategy. Active Defense is employed to support four primary uses cases; attack detection, attribution, flexibility of response, and intelligence dissemination. When deploying technology and leveraging security-driven intelligence across all four components, organizations can protect their networks from the most persistent adversaries.

Incidence Response

picture

CrowdStrike’s world-class team is quickly becoming an industry leader in “deep dive” strategic and technical analyses of computer-based intrusions. Our seasoned team of Cyber Intelligence professionals, Incident Responders, and Malware Researchers consists of a number of internationally recognized authors, speakers, and experts.