UPDATE: NSS Labs Report Confirms Testing Of CrowdStrike Falcon Was Incomplete And Wrong

UPDATE: NSS Labs Report Confirms Testing of CrowdStrike Falcon was Incomplete and Wrong

February 15, 2017 NSS’ report plainly states that testing of CrowdStrike Falcon was incomplete, and therefore, the results are invalid.…

READ MORE
CrowdStrike Falcon Winter Release: Setting A New Standard In Endpoint Protection [VIDEO]

CrowdStrike Falcon Winter Release: Setting a New Standard in Endpoint Protection [VIDEO]

Today we announce new capabilities and features that provide customers with unmatched prevention against malware and malware-free attacks, and a…

READ MORE
Explore The “Power Of Opportunity” With CrowdStrike At RSA 2017

Explore the “Power of Opportunity” with CrowdStrike at RSA 2017

RSA 2017 is almost upon us, though it hardly seems possible, the year has gone by so quickly. For the…

READ MORE
Blocking Malicious PowerShell Downloads

Blocking Malicious PowerShell Downloads

As a next-gen endpoint protection solution, uniquely unifying next-gen antivirus with endpoint detection and response, CrowdStrike Falcon™ provides a unique…

READ MORE
CrowdStrike Named “Visionary” In Gartner Magic Quadrant

CrowdStrike Named “Visionary” in Gartner Magic Quadrant

"Visionaries not only believe that the impossible can be done, but that it must be done." — Bran Ferren. I…

READ MORE
How To Replace Traditional Antivirus (AV) With CrowdStrike Falcon

How to Replace Traditional Antivirus (AV) with CrowdStrike Falcon

Introduction This document will cover the simple steps of replacing your traditional antivirus (AV) vendor with CrowdStrike.   Video Prerequisites…

READ MORE
How CrowdStrike Falcon Protects Off-line Endpoints

How CrowdStrike Falcon Protects Off-line Endpoints

Introduction In this document and video we'll demonstrate CrowdStrike's ability to protect your endpoints from new threats, even when off-line.…

READ MORE
Enterprise Beware: Ransomware Continues To Evolve

Enterprise Beware: Ransomware Continues to Evolve

Ransomware attacks fall into two general categories – encrypting and non-encrypting. The first type encrypts files on your hard drive…

READ MORE
DNC Hack Exhibits One Of 3 Attack Trends To Watch For In 2017

DNC Hack Exhibits One of 3 Attack Trends To Watch for in 2017

The high-profile hack of the Democratic National Committee (DNC) was one of many damaging cyber attacks that plagued organizations in…

READ MORE
Danger Close: Fancy Bear Tracking Of Ukrainian Field Artillery Units

Danger Close: Fancy Bear Tracking of Ukrainian Field Artillery Units

In June CrowdStrike identified and attributed a series of targeted intrusions at the Democratic National Committee (DNC), and other political organizations…

READ MORE
 

See How You Can Stop Breaches request a live demo