How Falcon OverWatch Proactively Hunts for Threats in Your Environment
Introduction Falcon OverWatch is a team of dedicated, proactive threat hunters that work on your behalf. They constantly search the…
How Falcon OverWatch Works with You When a Breach Attempt is Discovered
Introduction Falcon OverWatch is a team of dedicated, proactive threat hunters that work on your behalf. They constantly search the…
How to Network Contain an Endpoint with Falcon Endpoint Protection
Introduction This document and accompanying video will demonstrate how to network contain (quarantine) an endpoint with Falcon Endpoint Protection. When systems…
Heading to Black Hat 2016
Without a doubt, Black Hat is one of the marquee events that gathers together the entire security industry. Looking at…
Toolkit Helps Evaluate “Next Generation” Endpoint Protection Platforms
A growing number of products in the marketplace tout themselves as being part of the “next generation” in endpoint protection.…
CrowdStrike evaluated in Gartner’s Comparison of Endpoint Detection and Response Technologies and Solutions
Leading analyst firm Gartner has recently published a comparative assessment called Comparison of Endpoint Detection and Response Technologies and Solutions*.…
CrowdStrike’s Spring Release: The Core Four of Next-Generation Endpoint Security
When you’re the first company to deliver endpoint security from the cloud, you need to build the product on a…
CrowdResponse Release and new @Tasks modules
With the ongoing need to effectively and quickly detect and respond to attacks, CrowdStrike is excited to release a new…
State of the Criminal Address
Over the past few months CrowdStrike has conducted several investigations in the hospitality, food services, and gaming industries, helping organizations…