CrowdStrike Falcon Description

The Falcon Platform is flexible, extensible, and adaptable when it comes to your endpoint security requirements. You can choose from the bundles listed above or any of these modules. Additional modules can be added to Falcon Endpoint Protection packages. Individual modules can be purchased without the need for a Falcon Endpoint Protection bundle. Customers who have more stringent compliance requirements or operational requirements will find our specialized products useful.

Pricing

Free Trial:
Yes

Integrations

Reviews

Total
ease
features
design
support

No User Reviews. Be the first to provide a review:

Write a Review

Company Details

Company:
CrowdStrike
Year Founded:
2011
Headquarters:
United States
Website:
www.crowdstrike.com/endpoint-security-products/

Media

Recommended Products
Twilio Segment - the Leading Customer Data Platform Icon
Twilio Segment - the Leading Customer Data Platform

Get started with a free Segment account and access 450+ integrations, features and capabilities.

We’ll show you how Segment helps 25,000+ businesses to collect, clean, and activate their data. Twilio is the #1 CDP for market share four years in a row per IDC (2019-2022).

Product Details

Platforms
SaaS
Type of Training
Documentation
Webinars
In Person
Customer Support
24/7 Live Support
Online

CrowdStrike Falcon Features and Options

Cloud Security Software

Antivirus
Application Security
Behavioral Analytics
Encryption
Endpoint Management
Incident Management
Intrusion Detection System
Threat Intelligence
Two-Factor Authentication
Vulnerability Management

Endpoint Protection Software

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Computer Security Software

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Detection and Response (EDR) Software

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Cloud Workload Protection Platform

Anomaly Detection
Asset Discovery
Cloud Gap Analysis
Cloud Registry
Data Loss Prevention (DLP)
Data Security
Governance
Logging & Reporting
Machine Learning
Security Audit
Workload Diversity