www.crowdstrike.com Open in urlscan Pro
2606:4700::6811:63a  Public Scan

Submitted URL: http://crowdstrike.com/
Effective URL: https://www.crowdstrike.com/
Submission: On January 12 via manual from US — Scanned from US

Form analysis 0 forms found in the DOM

Text Content

 * CrowdStrike Falcon Surface:
 * The industry’s most complete adversary-driven External Attack Surface
   Management technology

Learn more
 * EXPERIENCED A BREACH?
 * contact us
 * Login

English (US)
 * Deutsch
 * English (AU)
 * English (UK)
 * Español
 * Français
 * Italiano
 * Português
 * LatAm
 * 繁體中文
 * 日本語
 * 한국어
 * عربى

 * Products
   
 * Services
   
 * Why CrowdStrike?
   
 * Learn
   
 * Company
   
 * Start Free Trial

Connect with us Careers

Events

Fal.Con

Falcon Encounter Hands-on Labs

CrowdStrike Store

Partner programs Cloud providers

Technology partners

Solution providers

View all

Become a partner
About us Our story

Executive team

Board of directors

Latest news

Investor relations

Environmental, social & governance

CrowdStrike & F1 Racing

Featured resources Cybersecurity 101 glossary
Explanations, examples and best practices
on a variety of cybersecurity topics.
Adversary Universe
Learn more about APTs and adversaries,
their origin, target industries and nations.
2022 Global Threat Report
The highly anticipated annual
threat report is here!
2022 Threat Hunting Report
CrowdStrike's threat hunting insights
from July 1, 2021 to June 30, 2022.
CrowdStrike blog


Discover how CrowdStrike protects you against
the most advanced attacks.
From the front lines

Executive viewpoint

Research & threat intelligence

Customer focused Free trial guide

Customer support portal

CrowdStrike University

CrowdStrike Tech Center

Developer portal

Knowledge resources Case studies

White papers

Webinars

Reports

All resources

Falcon product bundles Falcon Go: get started with CrowdStrike
Affordable next-gen antivirus and USB device
control to protect your business.
Falcon Pro: optimize your defense
Next-gen antivirus and threat intelligence for greater
insight into your environment. Automated threat
investigations accelerate alert, triage and response.
Falcon Enterprise: never miss a threat
Unify all security tools to provide a single source of truth:
next-gen antivirus, EDR, XDR, managed threat hunting
and integrated threat intelligence.
Falcon Elite: advanced breach prevention
Integrated endpoint and identity protection, the expanded
visibility of Falcon Insight XDR, unequaled threat-hunting and
the added protection of identity security to stop every breach.
Falcon Complete: superior prevention, detection & response
The full suite of managed endpoint threat and identity protection
with expert monitoring and remediation.
Product categories Cloud security
Stop cloud breaches with unified cloud security
posture management and breach prevention.
Endpoint security & XDR
Supercharge protection, detection and
response – for endpoint and beyond.
Identity protection
Stop breaches faster by protecting
workforce identities everywhere.
Security & IT operations
Unmatched real-time visibility into the devices,
users and applications in your network.
Threat intelligence
Supercharge your SOC and Incident Response
teams with built-in adversary intelligence.
Observability
Enhance visibility of your infrastructure with
unrivaled speed and scale.
Features About the platform

Threat Graph

Falcon Fusion

AI & machine learning

FAQs

Prepare
Prepare and train your organization to defend
against sophisticated threat actors using real-life
simulation exercises.
Tabletop Exercise

Red Team / Blue Team Exercise

Adversary Emulation Exercise

Penetration Testing

Respond
Available under a Services Retainer, giving
you access to security consultants and
expertise to respond to a breach.
Incident Response

Compromise Assessment

Endpoint Recovery

Network Security Monitoring

Experienced a breach?
Fortify
Enhance your cybercsecurity practices and
controls with actionable recommendations to
fortify your cybersecurity posture.
Maturity Assessment

Technical Risk Assessment

SOC Assessment

Active Directory Assessment

Managed Services Managed Detection & Response
Included in Falcon Complete and backed by
CrowdStrike's Breach Prevention Warranty.
Managed Threat Hunting
Falcon OverWatch, as an extension of your team,
hunting relentlessly to stop hidden threats.
Managed LogScale
Managed service that combines centralized
log management technology with CrowdStrike's
industry leading service expertise.
Additional Services Cloud Security Services

Identity Protection Services

Partner Services

Why CrowdStrike? Industry recognition
CrowdStrike is the recognized leader in
endpoint protection solutions.
Customer stories
Don't take our word for it, hear what
our customers have to say.
Compare CrowdStrike
See how we stack up against our
competitors.
Solutions by topic Zero Trust
Real-time breach protection on
any endpoint, cloud workload or
identity, wherever they are.
Cloud security
Stop cloud breaches for multi-
cloud and hybrid environments
in a single platform.
Ransomware protection
Learn what you can do to stop
ransomware threats in their tracks.
Log4Shell mitigation
Get the latest information on
this evolving vulnerability.
Observability & log management
Fills in the gaps, logs everything, and
realizes real-time observability for
your entire system.
Solutions by industry Small business

Election security

Public sector

Healthcare

Financial services

Retail

 * Start free trial
 * Products
   
 * Services
   
 * Why CrowdStrike?
   
 * Learn
   
 * Company
   
 * Contact Us
 * EXPERIENCED A BREACH?
 * Languages
   


Main Menu
Connect with us Careers

Events

Fal.Con

Falcon Encounter Hands-on Labs

CrowdStrike Store

Partner programs Cloud providers

Technology partners

Solution providers

View all

Become a partner
About us Our story

Executive team

Board of directors

Latest news

Investor relations

Environmental, social & governance

CrowdStrike & F1 Racing


Main Menu
Featured resources Cybersecurity 101 glossary
Explanations, examples and best practices
on a variety of cybersecurity topics.
Adversary Universe
Learn more about APTs and adversaries,
their origin, target industries and nations.
2022 Global Threat Report
The highly anticipated annual
threat report is here!
2022 Threat Hunting Report
CrowdStrike's threat hunting insights
from July 1, 2021 to June 30, 2022.
CrowdStrike blog


Discover how CrowdStrike protects you against
the most advanced attacks.
From the front lines

Executive viewpoint

Research & threat intelligence

Customer focused Free trial guide

Customer support portal

CrowdStrike University

CrowdStrike Tech Center

Developer portal

Knowledge resources Case studies

White papers

Webinars

Reports

All resources


Main Menu
Falcon product bundles Falcon Go: get started with CrowdStrike
Affordable next-gen antivirus and USB device
control to protect your business.
Falcon Pro: optimize your defense
Next-gen antivirus and threat intelligence for greater
insight into your environment. Automated threat
investigations accelerate alert, triage and response.
Falcon Enterprise: never miss a threat
Unify all security tools to provide a single source of truth:
next-gen antivirus, EDR, XDR, managed threat hunting
and integrated threat intelligence.
Falcon Elite: advanced breach prevention
Integrated endpoint and identity protection, the expanded
visibility of Falcon Insight XDR, unequaled threat-hunting and
the added protection of identity security to stop every breach.
Falcon Complete: superior prevention, detection & response
The full suite of managed endpoint threat and identity protection
with expert monitoring and remediation.
Product categories Cloud security
Stop cloud breaches with unified cloud security
posture management and breach prevention.
Endpoint security & XDR
Supercharge protection, detection and
response – for endpoint and beyond.
Identity protection
Stop breaches faster by protecting
workforce identities everywhere.
Security & IT operations
Unmatched real-time visibility into the devices,
users and applications in your network.
Threat intelligence
Supercharge your SOC and Incident Response
teams with built-in adversary intelligence.
Observability
Enhance visibility of your infrastructure with
unrivaled speed and scale.
Features About the platform

Threat Graph

Falcon Fusion

AI & machine learning

FAQs


Main Menu
Prepare
Prepare and train your organization to defend
against sophisticated threat actors using real-life
simulation exercises.
Tabletop Exercise

Red Team / Blue Team Exercise

Adversary Emulation Exercise

Penetration Testing

Respond
Available under a Services Retainer, giving
you access to security consultants and
expertise to respond to a breach.
Incident Response

Compromise Assessment

Endpoint Recovery

Network Security Monitoring

Experienced a breach?
Fortify
Enhance your cybercsecurity practices and
controls with actionable recommendations to
fortify your cybersecurity posture.
Maturity Assessment

Technical Risk Assessment

SOC Assessment

Active Directory Assessment

Managed Services Managed Detection & Response
Included in Falcon Complete and backed by
CrowdStrike's Breach Prevention Warranty.
Managed Threat Hunting
Falcon OverWatch, as an extension of your team,
hunting relentlessly to stop hidden threats.
Managed LogScale
Managed service that combines centralized
log management technology with CrowdStrike's
industry leading service expertise.
Additional Services Cloud Security Services

Identity Protection Services

Partner Services


Main Menu
Why CrowdStrike? Industry recognition
CrowdStrike is the recognized leader in
endpoint protection solutions.
Customer stories
Don't take our word for it, hear what
our customers have to say.
Compare CrowdStrike
See how we stack up against our
competitors.
Solutions by topic Zero Trust
Real-time breach protection on
any endpoint, cloud workload or
identity, wherever they are.
Cloud security
Stop cloud breaches for multi-
cloud and hybrid environments
in a single platform.
Ransomware protection
Learn what you can do to stop
ransomware threats in their tracks.
Log4Shell mitigation
Get the latest information on
this evolving vulnerability.
Observability & log management
Fills in the gaps, logs everything, and
realizes real-time observability for
your entire system.
Solutions by industry Small business

Election security

Public sector

Healthcare

Financial services

Retail


Main Menu
 * Deutsch
 * English (AU)
 * English (UK)
 * Español
 * Français
 * Italiano
 * Português
 * LatAm
 * 繁體中文
 * 日本語
 * 한국어
 * عربى













THE REVIEWS ARE IN. CUSTOMERS RATE CROWDSTRIKE #1
IN EDR.

Start today
View bundles & pricing







FROM THE FRONTLINES

SCATTERED SPIDER Exploits Windows Security Deficiencies with
Bring-Your-Own-Vulnerable-Driver Tactic in...Read moreOWASSRF: CrowdStrike
Identifies New Exploit Method for Exchange Bypassing ProxyNotShell...Read
moreCrowdStrike Named a Leader in Frost & Sullivan’s 2022 Frost...Read
moreAttackers Set Sights on Active Directory: Understanding Your Identity
ExposureRead moreUnveiling CrowdStrike Falcon Surface: The Industry’s Most
Complete Adversary-Driven External...Read more


G2 NAMES CROWDSTRIKE A LEADER ACROSS 16 CATEGORIES

Learn more



PROTECTING ALL COMPANIES,
FROM SMALL BUSINESS TO ENTERPRISE









 
 

One platform. One agent.
Complete protection.


Technology, intelligence, and expertise come together in our industry-leading
CrowdStrike Falcon®️ platform to deliver security that works









POWERED BY THE SECURITY CLOUD



Using world-class AI, the CrowdStrike Security Cloud creates actionable data,
identifies shifts in adversarial tactics, and maps tradecraft in the patented
Threat Graph to automatically prevent threats in real time across CrowdStrike’s
global customer base.



Learn more


AN ADVERSARY-FOCUSED APPROACH



Intelligence is woven deeply into our platform; it's in our DNA, and enriches
everything we do. It’s derived not only from our world-class threat researchers,
but also from the first-hand experience of our threat hunters and professional
services teams.



Learn more


BACKED BY WORLD-CLASS EXPERTISE



We embed human expertise into every facet of our products, services, and design.
We’ve pioneered a new delivery model for cybersecurity where our experts work
hand-in-hand with you to deliver better security outcomes.



Learn more


A UNIFIED PLATFORM APPROACH TO STOPPING BREACHES





Comprehensive visibility and protection across your critical areas of risk:
endpoints, workloads, data, and identity




ENDPOINTS AND XDR



CrowdStrike's expanded endpoint security solution suite leverages cloud-scale AI
and deep link analytics to deliver best-in-class XDR, EDR, next-gen AV, device
control, and firewall management. Our endpoint security offerings are truly
industry-leading, highly regarded by all three of the top analyst firms:
Gartner, Forrester, and IDC.



All endpoint solutionsFalcon Insight XDR




 * 
 * 




CLOUD SECURITY



CrowdStrike's powerful suite of CNAPP solutions provides an adversary-focused
approach to Cloud Security that stops attackers from exploiting modern
enterprise cloud environments. By combining agent-based and agentless protection
in a single, unified platform experience with integrated threat intelligence,
the Falcon platform delivers comprehensive visibility, detection and remediation
to secure cloud workloads with coverage from development to runtime.



All cloud security solutions






 * 
 * 




THREAT INTELLIGENCE



CrowdStrike’s threat intel offerings power an adversary-focused approach to
security and takes protection to the next level delivering meaningful context on
the who, what, and how behind a security alert. CrowdStrike Falcon® Intelligence
threat intelligence is integrated throughout Falcon modules and is presented as
part of the incident workflow and ongoing risk scoring that enables
prioritization, attack attribution, and tools to dive deeper into the threat via
malware search and analysis.

 * 
 * 

All threat intelligence solutions



IDENTITY PROTECTION



Falcon Identity Protection – fully integrated with the CrowdStrike Falcon®
Platform – is the ONLY solution in the market to ensure comprehensive protection
against identity-based attacks in real-time. With a simple, light-weight sensor,
the Falcon Platform gathers and analyzes all your identity and configuration
data providing instant visibility into your identity landscape.



All identity protection solutions




 * 
 * 




SECURITY AND IT OPERATIONS



CrowdStrike Falcon® delivers security and IT operations capabilities including
IT hygiene, vulnerability management, and patching. All of this gets enriched by
world-class threat intelligence, including capabilities to conduct malware
searching and sandbox analysis that are fully integrated and automated to
deliver security teams deep context and predictive capabilities.



Falcon FileVantageFalcon Discover



 * 
 * 




OBSERVABILITY



CrowdStrike Falcon® LogScale and its family of products and services provide
unrivaled visibility of your infrastructure. Powered by a unique index-free
architecture and advanced compression techniques that minimizes hardware
requirements, CrowdStrike’s observability technology allows DevOps, ITOps and
SecOps teams to aggregate, correlate and search live log data with sub-second
latency — all at a lower total cost of ownership than legacy log management
platforms.



View all observability products



 * 
 * 




TESTED AND PROVEN LEADER


THE FORRESTER WAVE™: ENDPOINT DETECTION AND RESPONSE PROVIDERS, Q2 2022
CrowdStrike named a “Leader” in The Forrester Wave™: Endpoint Detection and
Response Providers.
Read the Report
CrowdStrike is a CNAPP Leader
CrowdStrike is recognized by Frost & Sullivan as a leader in the 2022 Frost
Radar™️: Cloud-Native Application Protection Platform, 2022 report."
Learn more
MITRE Engenuity ATT&CK Evaluation
CrowdStrike achieved 100% prevention with comprehensive visibility and
actionable alerts – demonstrating the power of the Falcon platform to stop
today’s most sophisticated threats.
Read the Blog


TRUSTED BY CUSTOMERS EVERYWHERE



Read All Customer Stories


“Thanks to CrowdStrike, we know exactly what we're dealing with, which is a
visibility I never had before.”

Rob Thomas, COO
Mercedes-AMG Petronas Formula One Team

Read the Story


The CrowdStrike platform lets us forget about malware and move onto the stuff we
need to do.”

Dawn Armstrong, VP of IT
Virgin Hyperloop

Read the Story


START YOUR FREE TRIAL NOW



ONE CLOUD-NATIVE PLATFORM, FULLY DEPLOYED IN MINUTES TO PROTECT YOUR
ORGANIZATION


ProductsFalcon Pro Falcon Enterprise Falcon Elite Falcon Complete ALL PRODUCTS
TECHNOLOGYFalcon Platform Threat Graph CrowdStrike Store Humio Hybrid Analysis
Why CrowdStrike?Why CrowdStrike? Industry Validation Our Customers
COMPANYCrowdStrike's Story Executive Team Events Investors Careers News &
Releases Customer Support Partners
ResourcesCrowdcasts Cybersecurity 101 Free Tools Reports Videos ALL RESOURCES
RansomwareRansomware Solutions How to Prevent Ransomware How Ransomware Actors
are Evolving Ransomware-as-a-Service Explained
Blog January 2023 Patch Tuesday: 98 Vulnerabilities with 11 Rated Critical and 1
Zero-Day Under Active Attack SCATTERED SPIDER Exploits Windows Security
Deficiencies with Bring-Your-Own-Vulnerable-Driver Tactic in Attempt to Bypass
Endpoint Security How to visualize your data using the LogScale API – Part One
Latest Blog Posts
English (US)
 * Deutsch
 * English (AU)
 * English (UK)
 * Español
 * Français
 * Italiano
 * Português
 * LatAm
 * 繁體中文
 * 日本語
 * 한국어
 * عربى

 * Copyright © 2023
 * Contact Us
 * Privacy
 * Cookies
 * Cookie Settings
 * Terms of Use
 * Candidate Privacy Notices

 * 
 * 
 * 
 * 
 * 



 X




$H2

$hl

X


COOKIE PREFERENCE CENTER




 * YOUR PRIVACY


 * STRICTLY NECESSARY COOKIES


 * PERFORMANCE COOKIES


 * FUNCTIONAL COOKIES


 * TARGETING COOKIES

YOUR PRIVACY

When you visit any website, it may store or retrieve information on your
browser, mostly in the form of cookies. This information might be about you,
your preferences or your device and is mostly used to make the site work as you
expect it to. The information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies. Click on the
different category headings to find out more and change our default settings.
However, blocking some types of cookies may impact your experience of the site
and the services we are able to offer.
More information

STRICTLY NECESSARY COOKIES

Always Active

These cookies are necessary for the website to function and cannot be switched
off in our systems. This includes diagnostic functions such as identifying 404
errors and monitoring page load speed. They are usually only set in response to
actions made by you which amount to a request for services, such as setting your
privacy preferences, logging in or filling in forms. You can set your browser to
block or alert you about these cookies, but some parts of the site will not then
work. These cookies do not store any personally identifiable information.

Cookies Details‎

PERFORMANCE COOKIES

Performance Cookies


These cookies allow us to count visits and traffic sources so we can measure and
improve the performance of our site. They help us to know which pages are the
most and least popular and see how visitors move around the site. All
information these cookies collet is aggregated and therefore anonymous. If you
do not allow these cookies we will not know when you have visited our site, and
will not be able to monitor its performance.

Cookies Details‎

FUNCTIONAL COOKIES

Functional Cookies


These cookies enable the website to provide enhanced functionality and
personalisation. They may be set by us or by third party providers whose
services we have added to our pages. If you do not allow these cookies then some
or all of these services may not function properly.

Cookies Details‎

TARGETING COOKIES

Targeting Cookies


These cookies may be set through our site by our advertising partners. They may
be used by those companies to build a profile of your interests and show you
relevant adverts on other sites. They do not store directly personal
information, but are based on uniquely identifying your browser and internet
device. If you do not allow these cookies, you will experience less targeted
advertising.

Cookies Details‎
Back Button


BACK

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

 * View Third Party Cookies
    * Name
      cookie name


Clear
checkbox label label
Apply Cancel
Confirm My Choices
Allow All