CrowdStrike’s New Methodology for Tracking eCrime
At our inception, CrowdStrike coined the phrase, “You don’t have a malware problem, you have an adversary problem.” Behind every…
Five Second Enterprise Visibility
Introduction Visibility is an essential element in next generation endpoint protection. In this Article we’ll run through a series…
How Falcon OverWatch Proactively Hunts for Threats in Your Environment
Introduction Falcon OverWatch is a team of dedicated, proactive threat hunters that work on your behalf. They constantly search the…
How Falcon OverWatch Works with You When a Breach Attempt is Discovered
Introduction Falcon OverWatch is a team of dedicated, proactive threat hunters that work on your behalf. They constantly search the…
How to Network Contain an Endpoint with Falcon Endpoint Protection
Introduction This document and accompanying video will demonstrate how to network contain (quarantine) an endpoint with Falcon Endpoint Protection. When systems…
Heading to Black Hat 2016
Without a doubt, Black Hat is one of the marquee events that gathers together the entire security industry. Looking at…