www.crowdstrike.com Open in urlscan Pro
2606:4700::6812:4052  Public Scan

URL: https://www.crowdstrike.com/
Submission Tags: falconsandbox
Submission: On June 10 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

 * blog
   * Cybersecurity 101
 * EXPERIENCED A BREACH?
 * Request Info
 * contact us
 * Login

English (US)
 * Deutsch
 * English (AU)
 * English (UK)
 * Español
 * Français
 * Italiano
 * Português
 * LatAm
 * 繁體中文
 * 日本語
 * 한국어
 * عربى

 * Products
   
 * Services
   
 * Why CrowdStrike?
   
 * Partners
   
 * Company
   
 * Resources
   
 * Start Free Trial

About Crowdstrike Executive Team

Board of Directors

Investors

Corporate Brochure

News

CrowdStrike & F1 Racing

Public Policy

Code of Ethics/Compliance

Falcon Fund

Suppliers

Corporate Social Responsibility

Careers Sales & Marketing

Engineering & Technology

Professional Services

HR, Finance, & Legal

Intel & R&D

Internships

View Open Positions

Events Conferences

Workshop Wednesdays

Fal.Con

PARTNERS PROGRAM Store Partners

Solution Providers

Technology Partners

Service Providers

Cloud Providers

Embedded OEM

CrowdStrike Partners Red Hat

EY Alliance

Verizon Alliance

Amazon Web Services (AWS)

Managed Service Providers (MSP/MSSP)

Google Cloud Platform

Deloitte Alliance

Learn More Become a Partner

Partners Login

Become a CrowdStrike Falcon

Product Bundles Falcon Pro: Replace Your AV

Falcon Enterprise: Breach Prevention

Falcon Elite: Advanced Breach Prevention

Falcon Complete: Managed Detection & Response

Endpoint Security Solutions Falcon Prevent: NGAV

Falcon Insight: EDR

Falcon Device Control

Falcon Firewall Management

Falcon XDR

Cloud Security Solutions Falcon CWP: AWS, Azure, GCP

Falcon Horizon: CSPM

Container Security

Falcon CWP Complete

Identity Protection Solutions Falcon Identity Threat Detection

Falcon Identity Threat Protection

Threat Intelligence Solutions Falcon X: Automated Intelligence

Falcon X Premium: Cyber Threat Intelligence

Falcon X Elite: Assigned Intel Analyst

Falcon X Recon: Digital Risk Monitoring

Security & IT Operations Solutions Falcon Discover: Security Hygiene

Falcon Spotlight: Vulnerability Management

Falcon Forensics: Forensic Cybersecurity

Falcon FileVantage: File Integrity Monitoring

About the Platform Falcon Platform Architecture

CrowdStrike Threat Graph

Falcon Fusion

Visit the CrowdStrike Store

Falcon FAQs

CrowdStrike Zero Trust

CrowdStrike University

Observability & Log Management Humio

Humio Community Edition

The Nest, by Humio

RESOURCES Reports

Tech Center

Blog

Webinars

Cybersecurity 101

All Resources

Free Trial Guide

Ransomware Ransomware Solutions

How to Prevent Ransomware

How Ransomware Actors are Evolving

Ransomware-as-a-Service Explained

Extended Detection & Response Falcon XDR

CrowdXDR Alliance

XDR 101

Endpoint Protection What is Endpoint Security?

Endpoint Protection Buyer's Guide

Gartner MQ for Endpoint Protection Platforms

Legacy Endpoint Protection vs. CrowdStrike

Zero Trust Zero Trust

What is Zero Trust

Identity Security 101

Cloud Security Cloud Security Reimagined

Cloud Security 101

CrowdStrike Security Cloud

Report: The Maturation of Cloud-Native Security

Prepare: Advisory Services Tabletop Exercise

Adversary Emulation Exercise

Red Team / Blue Team Exercise

Penetration Testing

Technology Services Cloud Security Services

Identity Protection Services

Network Monitoring Services

Managed Services Falcon Complete: Managed Detection & Response

Falcon OverWatch: Managed Threat Hunting

Falcon OverWatch Elite: Assigned Intrusion Analyst

Falcon X Recon Plus: Managed Digital Risk Protection

Respond: Breach Services Incident Response (DFIR)

Endpoint Recovery

Compromise Assessment

Network Security Monitoring

Plus Services Retainer

Services Catalog

Falcon Gold Standard

Falcon Operational Support

Falcon Training (CSU)

Falcon Certification (CSU)

Fortify: Advisory Services Cybersecurity Maturity Assessment

Technical Risk Assessment

SOC Assessment

AD Security Assessment

Cybersecurity Enhancement Program

Security Program in Depth

Referral Partners Law Firms and Insurance

Why CrowdStrike? Industry Recognition

Our Customers

Compliance & Certifications

Compare CrowdStrike CrowdStrike vs. Carbon Black

CrowdStrike vs. Cylance

CrowdStrike vs. McAfee

CrowdStrike vs. SentinelOne

CrowdStrike vs. Symantec

SOLUTIONS Finance

Retail

Election Security

Public Sector Solutions

Healthcare

 * Start free trial
 * Products
   
 * Services
   
 * Why CrowdStrike?
   
 * Partners
   
 * Company
   
 * Resources
   
 * CrowdStrike Blog
 * Cybersecurity 101
 * Contact Us
 * REQUEST INFO
 * EXPERIENCED A BREACH?
 * Languages
   


Main Menu
About Crowdstrike Executive Team

Board of Directors

Investors

Corporate Brochure

News

CrowdStrike & F1 Racing

Public Policy

Code of Ethics/Compliance

Falcon Fund

Suppliers

Corporate Social Responsibility

Careers Sales & Marketing

Engineering & Technology

Professional Services

HR, Finance, & Legal

Intel & R&D

Internships

View Open Positions

Events Conferences

Workshop Wednesdays

Fal.Con


Main Menu
PARTNERS PROGRAM Store Partners

Solution Providers

Technology Partners

Service Providers

Cloud Providers

Embedded OEM

CrowdStrike Partners Red Hat

EY Alliance

Verizon Alliance

Amazon Web Services (AWS)

Managed Service Providers (MSP/MSSP)

Google Cloud Platform

Deloitte Alliance

Learn More Become a Partner

Partners Login

Become a CrowdStrike Falcon


Main Menu
Product Bundles Falcon Pro: Replace Your AV

Falcon Enterprise: Breach Prevention

Falcon Elite: Advanced Breach Prevention

Falcon Complete: Managed Detection & Response

Endpoint Security Solutions Falcon Prevent: NGAV

Falcon Insight: EDR

Falcon Device Control

Falcon Firewall Management

Falcon XDR

Cloud Security Solutions Falcon CWP: AWS, Azure, GCP

Falcon Horizon: CSPM

Container Security

Falcon CWP Complete

Identity Protection Solutions Falcon Identity Threat Detection

Falcon Identity Threat Protection

Threat Intelligence Solutions Falcon X: Automated Intelligence

Falcon X Premium: Cyber Threat Intelligence

Falcon X Elite: Assigned Intel Analyst

Falcon X Recon: Digital Risk Monitoring

Security & IT Operations Solutions Falcon Discover: Security Hygiene

Falcon Spotlight: Vulnerability Management

Falcon Forensics: Forensic Cybersecurity

Falcon FileVantage: File Integrity Monitoring

About the Platform Falcon Platform Architecture

CrowdStrike Threat Graph

Falcon Fusion

Visit the CrowdStrike Store

Falcon FAQs

CrowdStrike Zero Trust

CrowdStrike University

Observability & Log Management Humio

Humio Community Edition

The Nest, by Humio


Main Menu
RESOURCES Reports

Tech Center

Blog

Webinars

Cybersecurity 101

All Resources

Free Trial Guide

Ransomware Ransomware Solutions

How to Prevent Ransomware

How Ransomware Actors are Evolving

Ransomware-as-a-Service Explained

Extended Detection & Response Falcon XDR

CrowdXDR Alliance

XDR 101

Endpoint Protection What is Endpoint Security?

Endpoint Protection Buyer's Guide

Gartner MQ for Endpoint Protection Platforms

Legacy Endpoint Protection vs. CrowdStrike

Zero Trust Zero Trust

What is Zero Trust

Identity Security 101

Cloud Security Cloud Security Reimagined

Cloud Security 101

CrowdStrike Security Cloud

Report: The Maturation of Cloud-Native Security


Main Menu
Prepare: Advisory Services Tabletop Exercise

Adversary Emulation Exercise

Red Team / Blue Team Exercise

Penetration Testing

Technology Services Cloud Security Services

Identity Protection Services

Network Monitoring Services

Managed Services Falcon Complete: Managed Detection & Response

Falcon OverWatch: Managed Threat Hunting

Falcon OverWatch Elite: Assigned Intrusion Analyst

Falcon X Recon Plus: Managed Digital Risk Protection

Respond: Breach Services Incident Response (DFIR)

Endpoint Recovery

Compromise Assessment

Network Security Monitoring

Plus Services Retainer

Services Catalog

Falcon Gold Standard

Falcon Operational Support

Falcon Training (CSU)

Falcon Certification (CSU)

Fortify: Advisory Services Cybersecurity Maturity Assessment

Technical Risk Assessment

SOC Assessment

AD Security Assessment

Cybersecurity Enhancement Program

Security Program in Depth

Referral Partners Law Firms and Insurance


Main Menu
Why CrowdStrike? Industry Recognition

Our Customers

Compliance & Certifications

Compare CrowdStrike CrowdStrike vs. Carbon Black

CrowdStrike vs. Cylance

CrowdStrike vs. McAfee

CrowdStrike vs. SentinelOne

CrowdStrike vs. Symantec

SOLUTIONS Finance

Retail

Election Security

Public Sector Solutions

Healthcare


Main Menu
 * Deutsch
 * English (AU)
 * English (UK)
 * Español
 * Français
 * Italiano
 * Português
 * LatAm
 * 繁體中文
 * 日本語
 * 한국어
 * عربى


STOP BREACHES. DRIVE BUSINESS.

Get unparalleled protection from the industry’s most advanced cloud-native
platform

Start your free trial View product bundles

FROM THE FRONTLINES

RSAC 2022: CrowdStrike Delivers Protection that Powers ProductivityRead More
RSAC 2022: CrowdStrike Innovations that Prioritize DataRead MoreRSAC 2022:
Introducing CrowdStrike Asset Graph — the Path to Proactive Security Posture
ManagementRead MoreDetecting Poisoned Python Packages: CTX and PHPassRead
MoreCrowdStrike Uncovers New MacOS Browser Hijacking CampaignRead More

NEWS


RSAC 2022: INTRODUCING CROWDSTRIKE ASSET GRAPH

A new graph database that lets organizations see the assets they have and how
they interact with each other.

Read the blog

ANALYST REPORT


IDC WORLDWIDE CORPORATE ENDPOINT SECURITY MARKET SHARES, 2021

CrowdStrike ranks #1 in worldwide corporate endpoint security market share

Read the report

One platform. One agent.
Complete protection.


Technology, intelligence, and expertise come together in our industry-leading
platform to deliver security that works









POWERED BY THE SECURITY CLOUD



Using world-class AI, the CrowdStrike Security Cloud creates actionable data,
identifies shifts in adversarial tactics, and maps tradecraft in the patented
Threat Graph to automatically prevent threats in real time across CrowdStrike’s
global customer base.



Learn more


AN ADVERSARY-FOCUSED APPROACH



Intelligence is woven deeply into our platform; it's in our DNA, and enriches
everything we do. It’s derived not only from our world-class threat researchers,
but also from the first-hand experience of our threat hunters and professional
services teams.



Learn more


BACKED BY WORLD-CLASS EXPERTISE



We embed human expertise into every facet of our products, services, and design.
We’ve pioneered a new delivery model for cybersecurity where our experts work
hand-in-hand with you to deliver better security outcomes.



Learn more


A UNIFIED PLATFORM APPROACH TO STOPPING BREACHES






Comprehensive visibility and protection across your critical areas of risk:
endpoints, workloads, data, and identity


ENDPOINTS AND XDR



CrowdStrike's expanded endpoint security solution suite leverages cloud-scale AI
and deep link analytics to deliver best-in-class XDR, EDR, next-gen AV, device
control, and firewall management. Our endpoint security offerings are truly
industry-leading, highly regarded by all three of the top analyst firms:
Gartner, Forrester, and IDC.



All endpoint solutionsFalcon XDR




 * 
 * 




CLOUD SECURITY



CrowdStrike's powerful suite of CNAPP solutions provides an adversary-focused
approach to Cloud Security that stops attackers from exploiting modern
enterprise cloud environments. By combining agent-based and agentless protection
in a single, unified platform experience with integrated threat intelligence,
the Falcon platform delivers comprehensive visibility, detection and remediation
to secure cloud workloads with coverage from development to runtime.



All cloud security solutions






 * 
 * 




THREAT INTELLIGENCE



CrowdStrike’s threat intel offerings power an adversary-focused approach to
security and takes protection to the next level delivering meaningful context on
the who, what, what and how behind a security alert. Falcon X threat
intelligence is integrated throughout Falcon modules and is presented as part of
the incident workflow and ongoing risk scoring that enables prioritization,
attack attribution, and tools to dive deeper into the threat via malware search
and analysis.

 * 
 * 

All threat intelligence solutions



IDENTITY PROTECTION



Falcon Identity Protection – fully integrated with the CrowdStrike Falcon
Platform – is the ONLY solution in the market to ensure comprehensive protection
against identity-based attacks in real-time. With a simple, light-weight sensor,
the Falcon Platform gathers and analyzes all your identity and configuration
data providing instant visibility into your identity landscape.



All identity protection solutions




 * 
 * 




SECURITY AND IT OPERATIONS



CrowdStrike Falcon delivers security and IT operations capabilities including IT
hygiene, vulnerability management, and patching. All of this gets enriched by
world-class threat intelligence, including capabilities to conduct malware
searching and sandbox analysis that are fully integrated and automated to
deliver security teams deep context and predictive capabilities.



Falcon FileVantageFalcon Discover



 * 
 * 




TESTED AND PROVEN LEADER


THE FORRESTER WAVE™: ENDPOINT DETECTION AND RESPONSE PROVIDERS, Q2 2022
CrowdStrike named a “Leader” in The Forrester Wave™: Endpoint Detection and
Response Providers.
Read the Report
The Forrester Wave™: Cybersecurity Incident Response Services, Q1 2022
CrowdStrike has been named a Leader in 2022 Forrester Wave™ for Cybersecurity
Incident Response Services (CIRS).
Read the Report
MITRE Engenuity ATT&CK Evaluation
CrowdStrike achieved 100% prevention with comprehensive visibility and
actionable alerts – demonstrating the power of the Falcon platform to stop
today’s most sophisticated threats.
Read the Blog


TRUSTED BY CUSTOMERS EVERYWHERE



Read All Customer Stories


“Thanks to CrowdStrike, we know exactly what we're dealing with, which is a
visibility I never had before.”

Rob Thomas, COO
Mercedes-AMG Petronas Formula One Team

Read the Story


The CrowdStrike platform lets us forget about malware and move onto the stuff we
need to do.”

Dawn Armstrong, VP of IT
Virgin Hyperloop

Read the Story


START YOUR FREE TRIAL NOW



ONE CLOUD-NATIVE PLATFORM, FULLY DEPLOYED IN MINUTES TO PROTECT YOUR
ORGANIZATION


ProductsFalcon Pro Falcon Enterprise Falcon Elite Falcon Complete ALL PRODUCTS
TECHNOLOGYFalcon Platform Threat Graph CrowdStrike Store Humio Hybrid Analysis
Why CrowdStrike?Why CrowdStrike? Industry Validation Our Customers
COMPANYCrowdStrike's Story Executive Team Events Investors Careers News &
Releases Customer Support Partners
ResourcesCrowdcasts Cybersecurity 101 Free Tools Reports Videos ALL RESOURCES
RansomwareRansomware Solutions How to Prevent Ransomware How Ransomware Actors
are Evolving Ransomware-as-a-Service Explained
Blog Seven Key Ingredients of Incident Response to Reduce the Time and Cost of
Recovery CrowdStrike Falcon Stops Modern Identity-Based Attacks in Chrome For
the Common Good: How to Compromise a Printer in Three Simple Steps Latest Blog
Posts
English (US)
 * Deutsch
 * English (AU)
 * English (UK)
 * Español
 * Français
 * Italiano
 * Português
 * LatAm
 * 繁體中文
 * 日本語
 * 한국어
 * عربى

 * Copyright © 2022
 * Contact Us
 * Privacy
 * Cookies
 * Terms of Use
 * Candidate Privacy Notices

 * 
 * 
 * 
 * 
 * 

 X




$H2

$hl

X


ABOUT COOKIES ON THIS SITE

By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Notice

Cookie Settings Reject All Accept All Cookies



COOKIE PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * FUNCTIONAL COOKIES


 * PERFORMANCE COOKIES


 * TARGETING COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer. 
More information.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. This includes diagnostic functions such as identifying 404
errors and monitoring page load speed. They are usually only set in response to
actions made by you which amount to a request for services, such as setting your
privacy preferences, logging in or filling in forms. You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collet is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


BACK

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * View Third Party Cookies
    * Name
      cookie name


Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All