CrowdStrike

Sunnyvale, CA, USA
2011
Sep 20, 2022   |  By CrowdStrike
CrowdStrike further integrating third-party telemetry from CrowdXDR Alliance partners, which now include Cisco, ForgeRock and Fortinet as new members, and third-party vendors, which now include Microsoft and Palo Alto Networks.
Sep 20, 2022   |  By CrowdStrike
CrowdStrike Cloud Security is also now integrated with CrowdStrike Asset Graph to provide rich cloud asset visualizations and unprecedented visibility of cloud resources.
Sep 20, 2022   |  By CrowdStrike
Additional enhancements to Security and IT Operations product suite include new capabilities for Falcon Discover to provide unmatched visibility into attack surface.
Sep 20, 2022   |  By CrowdStrike
CrowdStrike expands and enhances log management and observability capabilities to help organizations leverage their data for security and non-security use cases.
Sep 20, 2022   |  By Amol Kulkarni
Every second, as your IT systems run every facet of your business, they are also creating data related to the health, performance and security of the systems themselves. This information, known as log data, is vital to SecOps, ITOps and DevOps teams as they seek to understand how the IT environment is functioning — and how secure those assets are.
Sep 20, 2022   |  By Michael Sentonas
The digital footprint of the modern organization is expanding at an unprecedented rate. The move to the cloud, Internet of Things (IoT), digital transformation, connected supply chain partners and related trends have led to an explosion of internet-facing assets. Cloud workloads, websites, user credentials, S3 buckets, SSL certificates, IoT, operational technology (OT), rogue IT devices, and more exist in the thousands across most organizations.
Sep 20, 2022   |  By George Kurtz
At CrowdStrike, we stop breaches. It’s a simple yet powerful promise to our customers, our partners and to the world. As thousands join us today in person at Fal.Con 2022 in Las Vegas, and thousands more watch remotely via livestream, it’s a promise that we want to reinforce and extend. As cyberattacks have grown more powerful and disruptive, the importance of stopping the breach has grown. Stopping the breach is about more than stopping a single attack.
Sep 13, 2022   |  By CrowdStrike
Findings from Falcon Overwatch threat hunters showed faster breakout times by eCrime adversaries and one million malicious events were prevented by the CrowdStrike Falcon platform.
Sep 13, 2022   |  By Thomas Etheridge
Another turbulent year for cybersecurity finds itself right at home alongside global economic headwinds and geopolitical tensions. This year has been defined by rampant affiliate activity, a seemingly endless stream of new vulnerabilities and exploits, and the widespread abuse of valid credentials. These circumstances have conspired to drive a 50% increase in interactive intrusion activity tracked by CrowdStrike Falcon OverWatch™ threat hunters this year.
Sep 6, 2022   |  By Venu Shastri
As cyberattacks continue to grow relentlessly, enterprises have to continue improving their cyber defenses to stay one step ahead of the adversaries. One area that CISOs have recently started paying more attention is identity threat protection. This is not surprising considering 80% of modern attacks are identity-driven leveraging stolen credentials. In fact, identity threat detection and response is highlighted as one of the top trends in cybersecurity in 2022 by Gartner.
Sep 20, 2022   |  By CrowdStrike
In this video, we will review a Falcon Intelligence use case and see how intelligence automation can help improve incident investigation times and your organization's overall security posture.
Sep 20, 2022   |  By CrowdStrike
CrowdStrike Falcon Intelligence Recon enables organizations to better protect their brand, employees, and sensitive data by allowing security teams to easily conduct investigations of underground activity. By empowering security teams to conduct investigations in real time, they can proactively uncover fraud, data breaches, phishing campaigns and protect their brand from other online threats that target their organization.
Sep 16, 2022   |  By CrowdStrike
Every year, CrowdStrike’s proactive 24/7 threat hunting team, Falcon OverWatch™, publishes its findings and technical analysis detailing the novel and prominent adversary tradecraft and emerging intrusion trends the team unearthed during the preceding 12-month period from July 1, 2021 through June 30, 2022. This past year in particular, OverWatch observed striking shifts in how attackers design and deploy their attacks.
Sep 16, 2022   |  By CrowdStrike
As a CrowdStrike Powered Service Provider - harness the power of the Falcon platform to deliver an endpoint, cloud, identity and data security service to provide the highest level of protection for your customers.
Aug 25, 2022   |  By CrowdStrike
On this week’s episode of The ReadOut, CrowdStrike’s CEO & Co-Founder George Kurtz and Worldwide CTO Mike Sentonas speak with Sales Engineer, Cristian Rodriguez on the CrowdStrike Falcon Platform's Longterm Repository.
Aug 15, 2022   |  By CrowdStrike
On this week’s episode of The ReadOut, CrowdStrike’s CEO & Co-Founder George Kurtz and Worldwide CTO Mike Sentonas dive into identity and share answers to some of the most important identity questions on the CrowdStrike Falcon Platform.
Jun 30, 2022   |  By CrowdStrike
Ransomware, systemic risk & regulations are becoming leading concerns for the cyber insurance industry. Understand an underwriter's POV with respect to scrutiny & poor controls.
Jun 30, 2022   |  By CrowdStrike
With the increase of ransomware attacks, underwriters are becoming more scrutinous and carriers are scaling back on cyber insurance coverage. Learn how a strong identity protection strategy can help organizations optimize their cyber insurance initiatives.
Jun 21, 2022   |  By CrowdStrike
Learn more about why endpoint detection and response (EDR) is foundational for successful extended detection and response (XDR).
Jun 2, 2022   |  By CrowdStrike
In this demo we'll see the Falcon Platform identify systems vulnerable to Follina in your organization, prevent an attack of this vulnerability and show threat hunting capabilities to identify any systems that may have been targeted.
Dec 20, 2021   |  By CrowdStrike
Visibility in the cloud is an important but difficult problem to tackle. It differs among cloud providers, and each one has its own positive and negative aspects. This guide covers some of the logging and visibility options that Amazon Web Services (AWS) and Google Cloud Platform (GCP) offer, and highlights their blind spots and how to eliminate them.
Dec 20, 2021   |  By CrowdStrike
Since a majority of the breaches are credential based, securing your multi-directory identity store - Microsoft Active Directory (AD) and Azure AD - is critical to protecting your organization from adversaries launching ransomware and supply chain attacks. Your security and IAM teams are concerned about securing AD and maintaining AD hygiene - and they need to be in sync, for example, to ensure that legacy and deprecated protocols like NTLMv1 are not being used and that the right security controls are in place to prevent breaches in real time.
Dec 1, 2021   |  By CrowdStrike
You have to secure your workforce identities immediately, to protect your organization from modern attacks like ransomware and supply chain threats. Your environment could be just Microsoft Active Directory (AD), or a hybrid identity store with AD and Azure AD, and it's important to have a holistic view of the directories and a frictionless approach to securing them. If you're considering Microsoft to secure your identities and identity store (AD and Azure Active Directory), you should ask these five questions.
Dec 1, 2021   |  By CrowdStrike
Learn about how to strengthen and modernize your agency's security protection, detection and remediation with Zero Trust. This white paper explains the unique risk factors federal agencies face, what a superior Zero Trust framework includes, and how cloud and endpoint security can help modernize federal security from the endpoint to the application.
Nov 1, 2021   |  By CrowdStrike
Cloud adoption remains a key driver for digital transformation and growth for today's businesses, helping them deliver applications and services to customers with the speed and scalability that only the cloud can provide. Enabling them to do so safely is a critical objective for any enterprise IT security team.
Nov 1, 2021   |  By CrowdStrike
Network segmentation has been around for a while and is one of the core elements in the NIST SP 800-207 Zero Trust framework. Although network segmentation reduces the attack surface, this strategy does not protect against adversary techniques and tactics in the identity phases in the kill chain. The method of segmentation that provides the most risk reduction, at reduced cost and operational complexity, is identity segmentation.

CrowdStrike protects the people, processes and technologies that drive modern enterprise. A single agent solution to stop breaches, ransomware, and cyber attacks—powered by world-class security expertise and deep industry experience.

Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

A Radical New Approach Proven To Stop Breaches:

  • Cloud Native: Eliminates complexity and simplifies deployment to drive down operational costs.
  • AI Powered: Harnesses the power of big data and artificial intelligence to empower your team with instant visibility.
  • Single Agent: Delivers everything you need to stop breaches — providing maximum effectiveness on day one.

One platform. Every industry. Superior protection.