Container Security with Real Time Response
Introduction CrowdStrike goes beyond traditional endpoint protection by providing extensive visibility and remediation capabilities across multiple platforms, such as Windows, MacOS, and…
Introduction CrowdStrike goes beyond traditional endpoint protection by providing extensive visibility and remediation capabilities across multiple platforms, such as Windows, MacOS, and…
Introduction As companies expand their use of public cloud infrastructure, not only does the attack surface grow so does the risk of…
Introduction With the rapid adoption of cloud deployments, many organizations are struggling to implement consistent security standards. This document and video will…
Introduction This document and video will demonstrate how to enable kernel exploit prevention to protect hosts from sophisticated attacks that attempt kernel…
Introduction As part of the CrowdStrike API, the “Custom IOC APIs” allows you to retrieve, upload, update, search, and delete custom Indicators…
Introduction The Falcon SIEM Connector provides users a turnkey, SIEM-consumable data stream. The Falcon SIEM Connector: Transforms Crowdstrike API data into a…
Introduction This document and video will demonstrate how to use Falcon Spotlight to find exploitable vulnerabilities in your environment to help prioritize…
Introduction Threat hunting leverages skilled defenders to hunt actively for the faintest signs of advanced attacks. OverWatch is CrowdStrike’s managed threat hunting…
Introduction Remote working has many employees not only working from home but really from anywhere. Services necessary to work remotely such as…
Introduction Threat hunting is the active search for new and novel attack behaviors that aren’t detected by current automated methods of prevention…