


ENDPOINT PROTECTION MANAGED IN THE CLOUD
INTRODUCING THE FALCON PLATFORM
Cloud Native
ENDPOINTS PROTECTION THROUGH THE CLOUD
Eliminate complexity, simplify your security model in layers, and deploy in record time, using collaborative data and cloud analytics to stop advanced threats.
threat Grapht
BASED ON ARTIFICIAL INTELLIGENCE
Take advantage of big data and artificial intelligence to provide your team with instant visibility and protection throughout the entire threat lifecycle.
Single Agent
THE PROTECTION YOU NEED
Get everything you need to stop cybersecurity incidents with a single lightweight agent. Replace antivirus, consolidate agents, and restore endpoint performance.

Better protection
Protects against all threat vectors, not just malware - even when computers and servers aren’t connected to the internet.

Better Performance
Cloud-based architecture and no need for signature updates.

Immediate recovery time
No fine-tuning or costly infrastructure. Receive unmatched prevention from the moment you deploy.

CROWDSTRIKE PRODUCTS
ENDPOINT PROTECTION SOLUTIONS
%2011_19_30%20a.png)

%2011_19_45%20a.png)

%2011_19_51%20a.png)

%2011_19_57%20a.png)

CROWDSTRIKE
FALCON PLATFORM
Unified cloud-native framework that powers the next generation of enterprise security and IT operations to solve real-world customer problems.
SECURITY CLOUD ARCHITECTURE
CrowdStrike's Security Cloud is a pioneer in the next-generation enterprise security platform, spanning across endpoints, workloads, identities and applications, from the network edge to the cloud. Leverage the power and speed of the cloud, artificial intelligence (AI) and an intelligent, lightweight agent to defend against modern cyberattacks.


ENDPOINT DETECTION & RESPONSE

FALCON
INSIGHT

NEXT GEN ANTIVIRUS

FALCON
PREVENT

FIREWALL
MANAGEMENT

FALCON
FIREWALL
MANAGEMENT

DEVICE
CONTROL

FALCON
DEVICE
CONTROL

Endpoint
Security

SITUATIONAL AWARENESS

FALCON X
RECON

THREAT
INTELLIGENCE

FALCON
X

FALCON SEARCH ENGINE

FALCON
INSIGHT


FALCON
SANDBOX
MALWARE
ANALYSIS

Threat
Intel

THREAT
HUNTING

FALCON
OVERWHATCH

TURNKEY
SOLUTIONS

FALCON
COMPLETE

Managed
Services

ITEM
HYGYENE

FALCON
DISCOVER

VULNERABILITY
MANAGEMENT

FALCON
SPOTLIGHT

FORENSICS

FALCON
FORENSICS

Security & IT
Operations

CLOUD SECURITY
POSTURE MANAGEMENT

FALCON
HORIZON

CLOUD WORKLOAD PROTECTION

FALCON
CWP

CONTAINER SECURITY

FALCON
CONTAINER SECURITY

Cloud
Security

IDENTITY THREAT DETECTION

FALCON
ITD

ZERO
TRUST

FALCON
ZERO TRUST

Identity
Protection
%2011_34_27%20a.png)



