How the Falcon Platform Simplifies Deployment and Enhances Security
Introduction Traditional requirements for security are overly complicated and brittle. The large number of pieces that are required not only complicate the…
Introduction Traditional requirements for security are overly complicated and brittle. The large number of pieces that are required not only complicate the…
Introduction Attacks that forego the use of malware in favor of more subtle techniques like PowerShell and other script based attacks have seen…
Introduction CrowdStrike Falcon strikes the balance needed in today’s data center: unrivaled protection from best-in-class prevention, detection and response along with security…
Introduction This article walks through installation of the Falcon Sensor on a Mac. Video Read Video Transcript Prerequisites Installing the CrowdStrike…
Introduction This video illustrates Falcon's ability to detect fileless webshell attacks, or attacks that don't rely on malware, instead relying on vulnerabilities.…
Introduction The Falcon Agent update is automated through policy and CrowdStrike. After setting an update policy, updating an agent takes no effort…
Introduction This document will cover the simple steps of replacing your traditional antivirus (AV) vendor with CrowdStrike. Video Read Video Transcript Step-by-step…
Introduction In this document and video we'll demonstrate CrowdStrike's ability to protect your endpoints from new threats, even when off-line. Video …
Introduction The Falcon Sensor updated is automated through CrowdStrike. Updating a sensor takes no effort on the part of the users. Allowing the…
How to Prevent Malware with Custom Blocking This document covers malware prevention via the custom blocking feature of Falcon. Falcon uses multiple methods…