www.crowdstrike.com Open in urlscan Pro
2606:4700::6812:9909  Public Scan

Submitted URL: http://crowdstrike.com/
Effective URL: https://www.crowdstrike.com/
Submission: On September 14 via manual from MX — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

CrowdStrike named a leader in The Forrester WaveTM: External Threat Intelligence
Service Providers, Q3 2023 Get the report

 * 
 * Experienced a breach?
 * Small Business
 * Contact Us
 * Login
 * Blog

 * English (US)
   * Deutsch
   * English (AU)
   * English (UK)
   * Español
   * Français
   * Italiano
   * Português
   * LatAm
   * 繁體中文
   * 日本語
   * 한국어
   * عربى

 * Platform
   Main Menu
   Falcon platform bundles Falcon Go: get started with CrowdStrike
   Affordable next-gen antivirus and USB device
   control to protect your business.
   Falcon Pro: optimize your defense
   Next-gen antivirus and threat intelligence for greater
   insight into your environment. Automated threat
   investigations accelerate alert, triage and response.
   Falcon Enterprise: never miss a threat
   Unify all security tools to provide a single source of truth:
   next-gen antivirus, EDR, XDR, managed threat hunting
   and integrated threat intelligence.
   Falcon Elite: advanced breach prevention
   Integrated endpoint and identity protection, the expanded
   visibility of Falcon Insight XDR, unequaled threat-hunting and
   the added protection of identity security to stop every breach.
   Falcon Complete: superior prevention, detection & response
   The full suite of managed endpoint threat and identity protection
   with expert monitoring and remediation.
   Platform categories Cloud security
   Stop cloud breaches with unified cloud security
   posture management and breach prevention.
   Endpoint security & XDR
   Supercharge protection, detection and
   response – for endpoint and beyond.
   Identity protection
   Stop breaches faster by protecting
   workforce identities everywhere.
   Security & IT operations
   Unmatched real-time visibility into the devices,
   users and applications in your network.
   Threat intelligence & hunting
   Disrupt adversaries and their attacks.
   Know them. Find them. Stop them.
   Next-gen SIEM
   Rapidly shut down threats with real-time detections,
   blazing-fast search, and cost-effective data retention.
   Platform capabilities About the CrowdStrike platform Falcon Fusion Charlotte
   AI AI & machine learning Threat Graph FAQs
 * Services
   Main Menu
   Prepare
   Prepare and train your organization to defend
   against sophisticated threat actors using real-life
   simulation exercises.
   Tabletop Exercise Red Team / Blue Team Exercise Adversary Emulation Exercise
   Penetration Testing
   Respond
   Available under a Services Retainer, giving
   you access to security consultants and
   expertise to respond to a breach.
   Incident Response Compromise Assessment Endpoint Recovery Network Detection
   Experienced a breach?
   Fortify
   Enhance your cybercsecurity practices and
   controls with actionable recommendations to
   fortify your cybersecurity posture.
   Maturity Assessment Technical Risk Assessment SOC Assessment Cloud Security
   Assessment Identity Security Assessment
   Managed Services Managed Detection & Response
   Included in Falcon Complete and backed by
   CrowdStrike's Breach Prevention Warranty.
   Managed Threat Hunting
   Falcon OverWatch, as an extension of your team,
   hunting relentlessly to stop hidden threats.
   Managed LogScale
   Managed service that combines centralized
   log management technology with CrowdStrike's
   industry leading service expertise.
   Additional Services Cloud Security Services Identity Protection Services
   Falcon LogScale Services Partner Services
 * Why CrowdStrike?
   Main Menu
   Why CrowdStrike? Considering Microsoft?
   
   Compare CrowdStrike
   See how we stack up against our competitors
   Industry recognition
   CrowdStrike is the recognized leader in
   endpoint protection solutions.
   Customer stories
   Don't take our word for it, hear what
   our customers have to say.
   Solutions by topic Zero Trust
   Real-time breach protection on
   any endpoint, cloud workload or
   identity, wherever they are.
   Cloud threat detection and response
   Stop cloud breaches for multi-
   cloud and hybrid environments
   in a single platform.
   Ransomware protection
   Learn what you can do to stop
   ransomware threats in their tracks.
   Log4Shell mitigation
   Get the latest information on
   this evolving vulnerability.
   Observability & log management
   Fills in the gaps, logs everything, and
   realizes real-time observability for
   your entire system.
   Solutions by industry Small business Election security Public sector
   Healthcare Financial services Retail
 * Learn
   Main Menu
   Featured resources Considering Microsoft?
   Cyber risk that starts with Microsoft
   ends with CrowdStrike
   Cybersecurity 101 glossary
   Explanations, examples and best practices
   on a variety of cybersecurity topics.
   Get your threat landscape
   Discover the adversaries targeting
   your industry.
   2023 Global Threat Report
   The highly anticipated annual
   threat report is here!
   2023 Threat Hunting Report
   CrowdStrike's threat hunting insights
   from July 1, 2022 to June 30, 2023.
   CrowdStrike blog
   
   
   Discover how CrowdStrike protects you against
   the most advanced attacks.
   From the front lines Executive viewpoint Counter Adversary Operations
   Customer focused Free trial guide Customer support portal CrowdStrike
   University CrowdStrike Tech Center Developer portal
   Knowledge resources Case studies White papers Webinars Adversary Universe
   Podcast Reports Logging guides All resources
 * Company
   Main Menu
   Connect with us Careers Events Fal.Con 2023 Falcon Encounter Hands-on Labs
   Partner programs Channel partners and distributors Service providers
   Strategic technology partners View all
   Become a partner
   About us Our story Executive team Board of directors Latest news Investor
   relations Environmental, social & governance CrowdStrike & F1 Racing
 * Start now

 * 
 * 

 * Start free trial
 * Platform
 * Services
 * Why CrowdStrike?
 * Learn
 * Company
 * Contact Us
 * EXPERIENCED A BREACH?
 * Languages

Main Menu
Falcon Platform Bundles Falcon Go: get started with CrowdStrike
Affordable next-gen antivirus and USB device
control to protect your business.
Falcon Pro: optimize your defense
Next-gen antivirus and threat intelligence for greater
insight into your environment. Automated threat
investigations accelerate alert, triage and response.
Falcon Enterprise: never miss a threat
Unify all security tools to provide a single source of truth:
next-gen antivirus, EDR, XDR, managed threat hunting
and integrated threat intelligence.
Falcon Elite: advanced breach prevention
Integrated endpoint and identity protection, the expanded
visibility of Falcon Insight XDR, unequaled threat-hunting and
the added protection of identity security to stop every breach.
Falcon Complete: superior prevention, detection & response
The full suite of managed endpoint threat and identity protection
with expert monitoring and remediation.
Platform Categories Cloud security
Stop cloud breaches with unified cloud security
posture management and breach prevention.
Endpoint security & XDR
Supercharge protection, detection and
response – for endpoint and beyond.
Identity protection
Stop breaches faster by protecting
workforce identities everywhere.
Security & IT operations
Unmatched real-time visibility into the devices,
users and applications in your network.
Threat intelligence & hunting
Disrupt adversaries and their attacks.
Know them. Find them. Stop them.
Observability
Enhance visibility of your infrastructure with
unrivaled speed and scale.
Platform Capabilities About the CrowdStrike platform Falcon Fusion Charlotte AI
AI & machine learning Threat Graph FAQs
Main Menu
Prepare
Prepare and train your organization to defend
against sophisticated threat actors using real-life
simulation exercises.
Tabletop Exercise Red Team / Blue Team Exercise Adversary Emulation Exercise
Penetration Testing
Respond
Available under a Services Retainer, giving
you access to security consultants and
expertise to respond to a breach.
Incident Response Compromise Assessment Endpoint Recovery Network Detection
Experienced a breach?
Fortify
Enhance your cybersecurity practices and
controls with actionable recommendations to
fortify your cybersecurity posture.
Maturity Assessment Technical Risk Assessment SOC Assessment Cloud Security
Assessment Identity Security Assessment
Managed Services Managed Detection & Response
Included in Falcon Complete and backed by
CrowdStrike's Breach Prevention Warranty.
Managed Threat Hunting
Falcon OverWatch, as an extension of your team,
hunting relentlessly to stop hidden threats.
Managed LogScale
Managed service that combines centralized
log management technology with CrowdStrike's
industry leading service expertise.
Additional Services Cloud Security Services Identity Protection Services Falcon
LogScale Services Partner Services
Main Menu
Why CrowdStrike? Considering Microsoft?

Compare CrowdStrike
See how we stack up against our competitors
Industry recognition
CrowdStrike is the recognized leader in
endpoint protection solutions.
Customer stories
Don't take our word for it, hear what
our customers have to say.
Solutions by topic Zero Trust
Real-time breach protection on
any endpoint, cloud workload or
identity, wherever they are.
Cloud threat detection and response
Stop cloud breaches for multi-
cloud and hybrid environments
in a single platform.
Ransomware protection
Learn what you can do to stop
ransomware threats in their tracks.
Log4Shell mitigation
Get the latest information on
this evolving vulnerability.
Observability & log management
Fills in the gaps, logs everything, and
realizes real-time observability for
your entire system.
Solutions by industry Small business Election security Public sector Healthcare
Financial services Retail
Main Menu
Featured resources Considering Microsoft?
Cyber risk that starts with Microsoft
ends with CrowdStrike
Cybersecurity 101 glossary
Explanations, examples and best practices
on a variety of cybersecurity topics.
Get your threat landscape
Discover the adversaries targeting
your industry.
2023 Global Threat Report
The highly anticipated annual
threat report is here!
2023 Threat Hunting Report
CrowdStrike's threat hunting insights
from July 1, 2022 to June 30, 2023.
CrowdStrike blog


Discover how CrowdStrike protects you against
the most advanced attacks.
From the front lines Executive viewpoint Counter Adversary Operations
Customer focused Free trial guide Customer support portal CrowdStrike University
CrowdStrike Tech Center Developer portal
Knowledge resources Case studies White papers Webinars Adversary Universe
Podcast Reports Logging guides All resources
Main Menu
Connect with us Careers Events Fal.Con 2023 Falcon Encounter Hands-on Labs
Partner programs Channel partners and distributors Service providers Strategic
technology partners View all
Become a partner
About us Our story Executive team Board of directors Latest news Investor
relations Environmental, social & governance CrowdStrike & F1 Racing
Main Menu
 * English (US)
 * Deutsch
 * English (AU)
 * English (UK)
 * Español
 * Français
 * Italiano
 * Português
 * LatAm
 * 繁體中文
 * 日本語
 * 한국어
 * عربى

 * THE
   WORLD’S
   LEADING
   AI-POWERED
   CYBERSECURITY
   PLATFORM
   
   Endpoint Security XDR Cloud Security Identity Protection Next-Gen SIEM Threat
   Intelligence & Hunting MDR Security & IT Operations IR & Proactive Services
   Endpoint Security
   Get started now
 * REGISTER
   FOR
   THE
   CYBERSECURITY
   EVENT
   OF
   THE
   YEAR
   
   Discover Fal.Con
   
 * THE
   PIONEER
   OF
   ADVERSARY
   INTELLIGENCE
   
   
   THE MUST-READ CYBERSECURITY REPORTS OF 2023.
   
   Threat Hunting Report Global Threat Report

 * 
 * 
 * 

MEET
CHARLOTTE:

THE
FUTURE
OF

AI-POWERED
CYBERSECURITY

MAKE EVERY USER OF THE CROWDSTRIKE FALCON® PLATFORM A POWER USER WITH
CHARLOTTE AI.

Learn more

BUILD
GENERATIVE

AI
WORKFLOWS

Charlotte, do we have vulnerabilities involving Microsoft Outlook?

Yes, Microsoft Outlook has 3 critical vulnerabilities across 231 devices.

Charlotte, which threat actors are actively targeting us?

Detections observed in your environment are attributed to 6 actors. Most
recently BITWISE SPIDER was observed in August 2023.

Charlotte, find lateral movement involving Windows hosts.

There is one Critical Incident in progress where lateral movement was detected.

Learn more

UNIFIED
PLATFORM.
ONE
AGENT.
COMPLETE
PROTECTION.

BUILT WITH AI AT ITS CORE,
CROWDSTRIKE FALCON IS
THE DEFINING
PLATFORM FOR
CYBERSECURITY CONSOLIDATION.

Explore now

BETTER SECURITY. BETTER OUTCOMES.

200% ROI by consolidating with CrowdStrike Average savings: $5.8 million over
three years 70% faster mean time to response1 200% ROI by consolidating with
CrowdStrike
EXPERIENCE
INDUSTRY-LEADING
SOLUTIONS

FROM
ONE
POWERFUL
PLATFORM

CROWDSTRIKE DELIVERS A UNIFIED PLATFORM APPROACH TO A MODERN SECURITY SO YOU CAN
PROTECT AND BUILD YOUR FUTURE.

 * CrowdStrike Falcon® Cloud Security
   
   SECURE YOUR CLOUD
   
   --------------------------------------------------------------------------------
   
   Stop cloud breaches with unified agent and agentless protection.
   
   Learn more

 * CrowdStrike Falcon® Identity Protection
   
   STOP IDENTITY ATTACKS
   
   --------------------------------------------------------------------------------
   
   Real-time visibility, detection, and protection against all types of
   identity-based attacks.
   
   Learn more

 * CrowdStrike® Falcon LogScale™
   
   NEXT-GEN SIEM
   
   --------------------------------------------------------------------------------
   
   Get full visibility to uncover threats before they impact your business.
   
   Learn more

 * CrowdStrike Falcon® Cloud Security
   
   SECURE YOUR CLOUD
   
   --------------------------------------------------------------------------------
   
   Stop cloud breaches with unified agent and agentless protection.
   
   Learn more

 * CrowdStrike Falcon® Identity Protection
   
   STOP IDENTITY ATTACKS
   
   --------------------------------------------------------------------------------
   
   Real-time visibility, detection, and protection against all types of
   identity-based attacks.
   
   Learn more

 * CrowdStrike® Falcon LogScale™
   
   NEXT-GEN SIEM
   
   --------------------------------------------------------------------------------
   
   Get full visibility to uncover threats before they impact your business.
   
   Learn more

 * CrowdStrike Falcon® Cloud Security
   
   SECURE YOUR CLOUD
   
   --------------------------------------------------------------------------------
   
   Stop cloud breaches with unified agent and agentless protection.
   
   Learn more

 * CrowdStrike Falcon® Identity Protection
   
   STOP IDENTITY ATTACKS
   
   --------------------------------------------------------------------------------
   
   Real-time visibility, detection, and protection against all types of
   identity-based attacks.
   
   Learn more

 * CrowdStrike® Falcon LogScale™
   
   NEXT-GEN SIEM
   
   --------------------------------------------------------------------------------
   
   Get full visibility to uncover threats before they impact your business.
   
   Learn more

 * CrowdStrike Falcon® Cloud Security
   
   SECURE YOUR CLOUD
   
   --------------------------------------------------------------------------------
   
   Stop cloud breaches with unified agent and agentless protection.
   
   Learn more

 * CrowdStrike Falcon® Identity Protection
   
   STOP IDENTITY ATTACKS
   
   --------------------------------------------------------------------------------
   
   Real-time visibility, detection, and protection against all types of
   identity-based attacks.
   
   Learn more

 * CrowdStrike® Falcon LogScale™
   
   NEXT-GEN SIEM
   
   --------------------------------------------------------------------------------
   
   Get full visibility to uncover threats before they impact your business.
   
   Learn more

 * CrowdStrike Falcon® Cloud Security
   
   SECURE YOUR CLOUD
   
   --------------------------------------------------------------------------------
   
   Stop cloud breaches with unified agent and agentless protection.
   
   Learn more

 * CrowdStrike Falcon® Identity Protection
   
   STOP IDENTITY ATTACKS
   
   --------------------------------------------------------------------------------
   
   Real-time visibility, detection, and protection against all types of
   identity-based attacks.
   
   Learn more

 * CrowdStrike® Falcon LogScale™
   
   NEXT-GEN SIEM
   
   --------------------------------------------------------------------------------
   
   Get full visibility to uncover threats before they impact your business.
   
   Learn more

 * 

MORE
THAN
23,000
CUSTOMERS
TRUST
CROWDSTRIKE
TO
PROTECT
WHAT
MATTERS
MOST

 * "ALL
   OF
   US
   SEE
   THAT
   WE
   HAVE
   TO
   WORK
   TOGETHER.
   IT’S
   THE
   ONLY
   WAY
   THAT
   WE
   ARE
   GOING
   TO
   COMBAT
   THE
   ADVANCED
   THREAT
   ACTORS
   OUT
   THERE."
   
   Kelly McCracken
   SVP of Detection & Response, Salesforce
   
   Hear their stories
 * "IN
   HEALTHCARE,
   THE
   RIGHT
   CYBERSECURITY
   DOES
   MORE
   THAN
   SAVE
   TIME.
   IT
   SAVES
   LIVES."
   
   Tahir Ali
   CTO & CISO, Montage Health
   
   Hear their stories
 * "THE
   THREAT
   LANDSCAPE’S
   CHANGING.
   AND
   WITH
   CROWDSTRIKE,
   OUR
   ABILITY
   TO
   PROTECT
   AND
   STAY
   ONE
   STEP,
   OR
   EVEN
   TEN
   STEPS
   AHEAD
   OF
   THOSE
   CHANGES
   IS
   KEY."
   
   Brad Jones
   VP Information Security & CISO, Seagate
   
   Hear their stories

 * 
 * 
 * 


79 MINUTES COULD BRING YOUR BUSINESS DOWN

THAT'S THE AVERAGE TIME IT TAKES AN ADVERSARY TO LAND AND MOVE LATERALLY THROUGH
YOUR NETWORK. WHEN YOUR DATA, REPUTATION, AND REVENUE ARE AT STAKE, TRUST THE
PIONEER IN ADVERSARY INTELLIGENCE.

Get your custom threat report
 * 
 * 
 * 
 * 
 * 
 * 
 * 
 * 

 * 
 * 
 * 
 * 

A
LEADER
FOR
THE
THIRD
CONSECUTIVE
TIME

CROWDSTRIKE IS NAMED A LEADER IN THE DECEMBER 2022 GARTNER® MAGIC QUADRANT™ FOR
ENDPOINT PROTECTION PLATFORMS.2

Get the report


CrowdStrike is continually recognized as a leader by 3rd party organizations and
customers. Learn more at crowdstrike.com/leader.

1 Customer expectations are based on calculations made by CrowdStrike with data
provided by customers or prospective customers who conduct a Business Value
Realized or Business Value Assessment. Average savings are from the Total
Economic Impact™ of CrowdStrike Falcon Complete, commissioned by CrowdStrike,
February 2021. Results are for a composite organization as stated in the study.
Individual results may vary by customer.

2 Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook,
Chris Silva, 31 December 2022.

Gartner is a registered trademark and service mark and Magic Quadrant is a
registered trademark of Gartner, Inc. and/or its affiliates in the U.S. and
internationally and are used herein with permission. All rights reserved. This
graphic was published by Gartner, Inc. as part of a larger research document and
should be evaluated in the context of the entire document. The Gartner document
is available upon request from CrowdStrike. Gartner does not endorse any vendor,
product or service depicted in its research publications, and does not advise
technology users to select only those vendors with the highest ratings or other
designation. Gartner research publications consist of the opinions of Gartner
research organization and should not be construed as statements of fact. Gartner
disclaims all warranties, express or implied, with respect to this research,
including any warranties of merchantability or fitness for a particular purpose.


Start your
free trial now.

Total protection has never been easier. Take advantage of our free 15-day trial
and explore the most popular solutions for your business:

 * Protect against malware with next-gen antivirus.
 * Get unrivaled visibility with USB device control.
 * Simplify your host firewall management.
 * Receive real-time insights with automated threat intelligence.

Request free trial
 * 
 * 
 * 
 * 
 * 

New to CrowdStrike? About the platform Explore products Services Why choose
CrowdStrike?
Company About CrowdStrike Careers Events Newsroom Partners
Learn with CrowdStrike 2023 Global Threat Report Cybersecurity 101 Your threat
landscape Tech Center View all resources
Contact us Experienced a breach?
Copyright © 2023
 * Contact us
 * Privacy
 * Cookies
 * Cookie Settings
 * Terms of Use
 * Candidate Privacy Notices





x


ABOUT COOKIES ON THIS SITE

By clicking “Accept All Cookies”, you agree to the storing of cookies on your
device to enhance site navigation, analyze site usage, and assist in our
marketing efforts. Cookie Notice

Cookie Settings Reject All Accept All Cookies



COOKIE PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * FUNCTIONAL COOKIES


 * PERFORMANCE COOKIES


 * TARGETING COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer. 
More information.

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. This includes diagnostic functions such as identifying 404
errors and monitoring page load speed. They are usually only set in response to
actions made by you which amount to a request for services, such as setting your
privacy preferences, logging in or filling in forms. You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collet is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


BACK

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * View Third Party Cookies
    * Name
      cookie name


Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All