How To Get Access To CrowdStrike APIs

How to Get Access to CrowdStrike APIs

Introduction CrowdStrike is developing its Falcon Platform as an “API first Platform”, meaning a lot of the features that are…

READ MORE
How To Setup The CrowdStrike Falcon SIEM Connector

How to Setup the CrowdStrike Falcon SIEM Connector

Introduction The Falcon SIEM Connector provides users a turnkey, SIEM-consumable data stream. The Falcon SIEM Connector: Transforms Falcon Streaming API…

READ MORE
How To Import IOCs Into The CrowdStrike Falcon Platform Via API

How to Import IOCs into the CrowdStrike Falcon Platform via API

Introduction As part of the CrowdStrike Falcon Query API, the “IOC import” allows you to retrieve, upload, update, search, and…

READ MORE
How Falcon OverWatch Proactively Hunts For Threats In Your Environment

How Falcon OverWatch Proactively Hunts for Threats in Your Environment

Introduction Falcon OverWatch is a team of dedicated, proactive threat hunters that work on your behalf. They constantly search the…

READ MORE
How Falcon OverWatch Works With You When A Breach Attempt Is Discovered

How Falcon OverWatch Works with You When a Breach Attempt is Discovered

Introduction Falcon OverWatch is a team of dedicated, proactive threat hunters that work on your behalf. They constantly search the…

READ MORE
How To Network Contain An Endpoint With Falcon Endpoint Protection

How to Network Contain an Endpoint with Falcon Endpoint Protection

Introduction This document and accompanying video will demonstrate how to network contain (quarantine) an endpoint with Falcon Endpoint Protection. When systems…

READ MORE
Heading To Black Hat 2016

Heading to Black Hat 2016

Without a doubt, Black Hat is one of the marquee events that gathers together the entire security industry. Looking at…

READ MORE
Toolkit Helps Evaluate “Next Generation” Endpoint Protection Platforms

Toolkit Helps Evaluate “Next Generation” Endpoint Protection Platforms

A growing number of products in the marketplace tout themselves as being part of the “next generation” in endpoint protection.…

READ MORE
CrowdStrike Evaluated In Gartner’s Comparison Of Endpoint Detection And Response Technologies And Solutions

CrowdStrike evaluated in Gartner’s Comparison of Endpoint Detection and Response Technologies and Solutions

Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*.…

READ MORE
Making Breach Prevention Easier And Simpler

Making Breach Prevention Easier and Simpler

‘Simplicity is the ultimate sophistication’ These wise words are attributed to Clare Boothe Luce, an American congresswoman, ambassador, and playwright.…

READ MORE
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial