Data Sheet
Charlotte AI Data Sheet
View data sheetReports, white papers, crowdcasts, and more.
Uncover notable themes, trends and events across the cyber threat landscape.
Get the reportA Leader for the fourth consecutive time in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.
Get the reportAll resources
Filter by
CrowdCast
Introducing the Next Generation of IT Automation: CrowdStrike Falcon® for…
Listen to CrowdCastCrowdCast
Unstoppable Innovations CrowdCast Series: From Red-Hot Releases to Future Roadmap…
Listen to CrowdCastCrowdCast
Unstoppable Innovations CrowdCast Series: From Red-Hot Releases to Future Roadmap…
Listen to CrowdCastWhite Paper
Cinco ventajas de la consolidación de la ciberseguridad para las…
Leer el documento técnicoCrowdCast
Unstoppable Innovations CrowdCast Series From Red-Hot Releases to Future Roadmap…
Listen to CrowdCastWhite Paper
The Power of One: lotta alla frammentazione della sicurezza informatica…
Leggi il white paperWhite Paper
Cinque driver aziendali per il consolidamento della sicurezza informatica
Leggi il white paperCustomer Story
SA Power Networks: Securerly Delivering Reliable Energy to South Australia
View storyWhite Paper
Unlock Proactive Exposure Management: 5 Key Elements and Why Traditional…
Read whitepaperCrowdCast
SEC Readiness: Demystifying the Four-Day Breach Disclosure Requirement
Listen to CrowdCastData Sheet
Falcon Cloud Security: Cloud Infrastructure Entitlement Management (CIEM) Solution Brief
View data sheetDemo
Conversations with Charlotte AI: “Show me critical vulnerabilities on internet-facing…
Watch demoDemo
Conversations with Charlotte AI: Conducting In-depth Investigations with Follow-Up Questions
Watch demoWhite Paper
Application Security Posture Management: Securing Cloud-Native Applications at Scale
Read whitepaperCustomer Story
Commercial Bank of California: Hardening our cloud environments against data…
View storyCrowdCast
Top 2024 Cybersecurity Trends Series – Session #2: Cybersecurity Consolidation…
Listen to CrowdCastReporte
CrowdStrike reconocido como una solución "predominante para endpoints" con una…
Ver el informeDemo
Conversations with Charlotte AI: “Are adversaries selling credentials for travelairlines.com…
Watch demoVídeo
Mesa Redonda Virtual: Descifrando la Ciberseguridad: Estrategias de los Protectores
Vea el vídeoDemo
Falcon Identity Protection Unified Identity Protection for Hybrid Environments: Demo…
Watch demoWhite Paper
Mejores prácticas para proteger las aplicaciones nativas de la nube
Leer el documento técnicoWhite Paper
Configuraciones inadecuadas en la nube que son fácilmente explotadas y…
Leer el documento técnicoWhite Paper
Safeguarding Healthcare Mergers & Acquisitions (M&A) by Integrating Cybersecurity from…
Read whitepaperCrowdCast
The Convergence of AI+ Cybersecurity with CrowdStrike and Abnormal Security
Listen to CrowdCastCrowdCast
Unstoppable Innovations CrowdCast Series - Session #4: Rise Above SCATTERED…
Listen to CrowdCastWhite Paper
Crafting a Battle-Tested Team with the CrowdStrike Adversary Emulation Exercise
Read whitepaperReport
IDC MarketScape: Worldwide Risk-Based Vulnerability Management Platforms 2023 Vendor Assessment
View reportCustomer Story
Tabcorp Partners with CrowdStrike to Drive Stronger Security from Endpoint…
View storyGuide
CrowdStrike Falcon FileVantage Add-on for Splunk Installation and Configuration Guide
View guideCrowdCast
Unstoppable Innovations CrowdCast Series - Part 2: Shut Down Adversary…
Listen to CrowdCastCrowdCast
Unstoppable Innovations CrowdCast Series - Part 1: Defeat Cloud Adversaries…
Listen to CrowdCastWhite Paper
Reduce Active Directory Security Risks (Reducción de los riesgos para…
Leer el documento técnicoReport
2023 Frost Radar™ Leader: CrowdStrike’s Cloud-Native Application Protection Platform (CNAPP)
View reportWhite Paper
I principali motivi per aggiungere subito Falcon Identity Protection al…
Leggi il white paperWhite Paper
Principales razones para añadir ya Falcon Identity Protection a tu…
Leer el documento técnicoCustomer Story
CrowdStrike Helps Medium-Sized Business Build Robust Corporate-Class Cybersecurity Defense
View storyWhite Paper
The Power of One: Combating Cybersecurity Fragmentation with a Consolidated…
Read whitepaperWhite Paper
Errores de configuración de la nube fácilmente aprovechables y cómo…
Leer el documento técnicoCrowdCast
Cloud Threat SummitVirtual Event: The Rise of the Cloud-Conscious Adversary
Listen to CrowdCastWhite Paper
Configurazioni errate del cloud facili da sfruttare e come ridurne…
Leggi il white paperCrowdCast
MITRE Engenuity ATT&CK Evaluations: Inside the Enterprise Round 5 Results
Listen to CrowdCastCrowdCast
Securing Kubernetes Across the Enterprise Without Killing Productivity
Listen to CrowdCastWhite Paper
Las amenazas para los contenedores y la tecnología de contenedores
Leer el documento técnicoInfografica
Nessun posto dove nascondersi: Report sul threat hunting 2023 di…
Visualizza l’infograficaCustomer Story
University Health Network: Toronto Hospital Ensures Critical Protection with CrowdStrike
View storyVídeo
Protegiendo la industria financiera: Identificación de amenazas, soluciones y tendencias…
Vea el vídeoWhite paper
Razones para Agregar Ahora Falcon Identity Threat Protection a tu…
Leer el documento técnicoCrowdCast
Playing Defense: Lessons in Protecting Your Business Against Cyber Crime
Listen to CrowdCastWhite Paper
Los ciberdelincuentes y las técnicas de evasión actuales: por qué…
Leer el documento técnicoWhite paper
Adversarios Modernos y Técnicas de Evasión: Por qué legacy AV…
Leer el documento técnicoWhite Paper
Easily Exploited Cloud Misconfigurations and How to Minimize Their Risks
Read whitepaperCustomer Story
South Australian Utility Expands CrowdStrike Protections to Bolster Defence and…
View storyCrowdCast
2023 Global Threat Report Session 1: Understanding the Threat Landscape
Listen to CrowdCastData Sheet
CrowdStrike and Abnormal Security Integration Discovers and Remediates Compromised Email…
View data sheetCustomer Story
From Endpoint to Cloud, CoreWeave Consolidates Security Stack With CrowdStrike
View storyCustomer Story
U.K. University Gains 24/7 Protection, Visibility and Response with CrowdStrike…
View storyWhite Paper
Analysis: Breaking Down the 2022 MITRE Engenuity ATT&CK Evaluations for…
Read whitepaperData Sheet
Protecting your cloud workloads with defense-in-depth security from CrowdStrike and…
View data sheetWhite Paper
Guía de supervivencia sobre ciberseguridad para pequeñas y medianas empresas
Leer el documento técnicoWhite Paper
Guida di sopravvivenza per la sicurezza informatica delle piccole imprese
Leggi il white paperCustomer Story
International High-Tech Company Protects IT Infrastructure with Cloud-Native CrowdStrike Security
View storyRapporto
Leader 2022 Frost Radar™: La Cloud Native Application Protection Platform…
Visualizza il reportCustomer Story
Netlify Achieves Real-Time Observability at Scale with CrowdStrike Falcon LogScale
View storyCrowdCast
Best Practices for Protecting the Hybrid Workforce with a Comprehensive…
Listen to CrowdCastCrowdCast
Stop Modern Active Directory Threats with CrowdStrike, Okta, Zscaler and…
Listen to CrowdCastCustomer Story
Berkshire Bank Accelerates Digital Transformation and Multi-Channel Customer Services with…
View storyCustomer Story
Australian Utility Provider, Jemena, Chooses CrowdStrike Falcon Complete to Transform…
View storyCustomer Story
Leading Brazilian Automotive Business Saves Time and Increases Efficiency by…
View storyCustomer Story
Pella Augments In-House Security Team with CrowdStrike Managed Services and…
View storyReport
2022 Frost Radar™ Leader: Crowdstrike’s Cloud-native Application Protection Platform (CNAPP)
View reportCustomer Story
Europe Energy Protects Customer Data and Multimillion Euro Trading Transactions…
View storyCustomer Story
Brazilian Fashion and Retail Business Protects 30 Million Customers' Financial…
View storyCustomer Story
CrowdStrike Falcon LogScale at Remitly: Fintech Startup Transforms Raw Log…
View storyInfografica
Infografica Nessun posto dove nascondersi Report sul threat hunting di…
Visualizza l’infograficaInfographic
Nowhere to Hide 2022 Falcon OverWatch Threat Hunting Report Infographic
View infographicCrowdCast
CrowdCast: Nowhere to Hide: 2022 Falcon OverWatch Threat Hunting Report
Listen to CrowdCastGuide
IT Practitioner Guide: Defending Against Ransomware with CrowdStrike and ServiceNow
View guideWhite Paper
DETECCIÓN Y RESPUESTA GESTIONADAS DE FALCON COMPLETE - REGISTRO DE…
Leer el documento técnicoWhite Paper
Five Questions to Ask Before Choosing SentinelOne for Workforce Identity…
Read whitepaperRapporto
FALCON COMPLETE: SERVIZIO GESTITO DI RILEVAMENTO E RISPOSTA. CASI D’USO
Visualizza il reportCustomer Story
Global Data Analytics Company Builds Brand Reputation and “Bulletproof” Security…
View storyCustomer Story
Healthcare Solutions Provider Rolls Out CrowdStrike Falcon to Secure Extensive…
View storyCustomer Story
CrowdStrike Helps Engineering Consultancy Transform Protection and Reduce Time and…
View storyCrowdCast
Defeat the Adversary: Combat Advanced Supply Chain, Cloud and Identity-Based…
Listen to CrowdCastWhite paper
Libro De Casos De Falcon Complete Sobre Detección Y Respuesta…
Leer el documento técnicoWhite Paper
Falcon OverWatch Proactive Threat Hunting Unearths IceApple Post-Exploitation Framework
Read whitepaperWhite Paper
Ransomware Preparedness: Insights from IT and Cybersecurity Professionals
Read whitepaperInfographic
CrowdStrike and AWS: A defense-in-depth approach to protecting cloud workloads
View infographicCustomer Story
CrowdStrike Helps Leading Digital Recruitment Business Protect Personal Content for…
View storyWhite paper
Guía Del Comprador De La Plataforma De Protección De Workload…
Leer el documento técnicoWhite Paper
Cinco capacidades fundamentales para protegerse del riesgo de los endpoints
Leer el documento técnicoGuide
Guida All'acquisto di Cloud Workload Protection Platform (CWPP) di CrowdStrike…
Visualizza la guidaWhite Paper
Accelerate Your Cyber Insurance Initiatives with Falcon Identity Protection
Read whitepaperCustomer Story
Australian Utility Provider Partners With CrowdStrike to Transform Cybersecurity Defense…
View storyCrowdCast
Shared Responsibility Best Practices for Securing Public Cloud Platforms with…
Listen to CrowdCastCustomer Story
Banco Latinoamericano de Comercio Exterior, S.A. Finances LATAM Trade While…
View storyCustomer Story
Innovative HR Solutions Provider BIPO Strengthens Security Posture and Bolsters…
View storyWhite Paper
Todo lo que necesita saber para seleccionar una plataforma de…
Leer el documento técnicoWhite Paper
Cosa è necessario sapere per selezionare una piattaforma di protezione…
Leggi il white paperCustomer Story
Mercedes-AMG PETRONAS Formula One Team Accelerates Security Program with CrowdStrike
View storyCustomer Story
Cushman & Wakefield Extends Visibility Into Globally Distributed Endpoints
View storyCustomer Story
CrowdStrike Helps Inductive Automation Ensure Business Continuity for Critical Industry…
View storyCustomer Story
CrowdStrike Enables Bionexo to Deliver Essential Medical Supplies to Thousands…
View storyCustomer Story
Coventry University Achieves First-Class Results with Enhanced Endpoint Security Strategy
View storyCustomer Story
Navitas Centralizes Cybersecurity to Protect the Data of Students, Staff,…
View storyCustomer Story
European Construction Supplier Repels Ransomware, Rebuilds Security Defenses
View storyCrowdCast
Accelerating the Journey Towards Zero Trust with CrowdStrike and Zscaler
Listen to CrowdCastCrowdCast
How Effective Are Your Cybersecurity Solutions Against Today’s Threats?
Listen to CrowdCastCustomer Story
BOB Financial Digitally Transformed Security to Support Growth Leveraging Cloud…
View storyRapporto
Convalida tecnica ESG: riduzione del rischio con CrowdStrike Falcon® Identity…
Visualizza il reportCustomer Story
CTOS Protects Customer Data, Meets Strict Compliance and Expands Globally…
View storyCustomer Story
Greenhill Advises Global Finance Clients While Protecting Data With Leading…
View storyWhite Paper
CrowdStrike 2022 Falcon Cloud Security, Cloud Workload Protection Buyers Guide
Read whitepaperCustomer Story
Leading Eurasian Raw Materials, Building Materials and Ceramic Tile Producer…
View storyWhite paper
Detección y respuesta gestionada: la nueva clave para detener el…
Leer el documento técnicoWhite Paper
Reducing the Attack Surface: Network Segmentation vs. Identity Segmentation
Read whitepaperScheda Tecnica
Servizi Proattivi E Di Risposta Agli Incidenti Di CrowdStrike
Visualizza la scheda tecnicaWebinar/CrowdCast
Riesgo de ciberseguridad para pymes – Defendiendo su negocio frente…
Ver el webinarWhite Paper
ESG Technical Validation: Reduce Risk with CrowdStrike Falcon® Identity Protection
Read whitepaperWhite Paper
Guía para compradores de protección de endpoints de CrowdStrike
Leer el documento técnicoInfografica
Panoramica sulla Guida all'acquisto di una soluzione di protezione degli…
Visualizza l’infograficaWhite Paper
Guida all'acquisto di una soluzione di protezione degli endpoint di…
Leggi il white paperWhite paper
Guía del Comprador para la Protección de Endpoint de CrowdStrike
Leer el documento técnicoWebinar/CrowdCast
Falcon Y Zero Trust, Evolución De Las Plataformas De Ciberseguridad
Ver el webinarWhite paper
Falcon Complete: Detección Y Respuesta Gestionada, Profesional Y Comprobada
Leer el documento técnicoCrowdCast
The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure
Listen to CrowdCastCrowdCast
Extending Security Controls to OT Networks with Claroty and CrowdStrike
Listen to CrowdCastCrowdCast
Obsidian + CrowdStrike: Detection and Response Across Cloud and Endpoints
Listen to CrowdCastWhite Paper
GUÍA PARA COMPRADORES DE SERVICIOS GESTIONADOS DE DETECCIÓN Y RESPUESTA…
Leer el documento técnicoWhite Paper
Falcon Complete: Soluzione MDR Professionale di Comprovata Efficacia
Leggi il white paperWhite Paper
Falcon Complete: Detección y Respuesta Gestionada, Demostrada y Profesional
Leer el documento técnicoRapporto
2020 Threat Hunting Report: Insights From the CrowdStrike OverWatch Team
Visualizza il reportCrowdCast
Reconciling Cybersecurity Risks With Industrial Digital Transformation
Listen to CrowdCastReport
CrowdStrike Intelligence Report: A Technical Analysis of the NetWalker Ransomware
View reportWhite Paper
L'evoluzione del ransomware: come proteggere le aziende dai nuovi trend…
Leggi il white paperRapporto
La sicurezza informatica ai tempi del COVID-19: Suggerimenti per rendere…
Visualizza il reportCrowdCast
Beyond COVID-19: Protecting People and Preventing Breaches in the “New…
Listen to CrowdCastCrowdCast
Every Second Counts: Speed & Cybersecurity with Mercedes-AMG Petronas F1…
Listen to CrowdCastCrowdCast
The 1/10/60 Minute Challenge: A Framework for Stopping Breaches Faster
Listen to CrowdCastCrowdCast
Introducing the Next Generation of IT Automation: CrowdStrike Falcon® for…
Listen to CrowdCastFor technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Center.
Visit the Tech Hub