Upcoming events
Sale | Nov 24 - Dec 5
Cyber Monday
50% off Falcon Go, Pro, and Enterprise.
Conference
CrowdTour
Find a city near you
Your Cart
Added to Cart
There's nothing in your cart
per endpoint / per year
In-depth guides to CrowdStrike’s endpoint security products, services, and today’s most important cybersecurity topics
CrowdStrike and the ACSC Essential Eight
White Paper
Maximize the Impact of Your Offensive Security Exercise
The Truth About Legacy AV: Busting Migration Myths and Misconceptions in the Move to Modern Cybersecurity
Cloud Detection and Response Survival Guide for the SOC
The SaaS Security Guide: 6 Approaches to a More Hardened SaaS Environment
The Cyber Maturity Journey: A Continuous Approach to Cyber Resilience
Healthcare Cybersecurity in 2025: Staying Ahead of Emerging Threats
The SSPM Justification Kit
Outpacing Adversaries: Defending Against Identity-Based Threats
Mitigating the Risk of Non-Human Identities in SaaS
CrowdStrike Provides Target and Advanced DoD Zero Trust Activities
Logged In and Undetected: Stop Identity Adversaries with Unified Identity and Endpoint Security
Averting the Breach: 5 Scenarios Where a Services Retainer Could Have Changed the Outcome
A Modern Approach to Confidently Stopping Data Exfiltration
Crafting a Battle-Tested Team with the CrowdStrike Adversary Emulation Exercise
Investigating Active Directory Certificate Services Abuse: ESC1
Proactive, Resilient Cybersecurity for Healthcare
Stay One Step Ahead of Identity Thieves
8 Things Your Next SIEM Must Do
Threats to Containers and Container Technology
Top Reasons to Add Falcon Identity Protection to Your Cyber Defense Portfolio Now
Modern Adversaries and Evasion Techniques: Why Legacy AV is an Easy Target
8 LOLBins Every Threat Hunter Should Know
Cybersecurity Survival Guide for Small and Medium Businesses
EBook: CrowdStrike Incident Response
Streamline Your Zero Trust Journey
Buyer’s Guide to Modern Endpoint Protection
CrowdStrike Falcon Platform for CMMC 2.0
CrowdStrike Falcon® Zero Trust Risk Score
Indicators of Attack vs. Indicators of Compromise
Endpoint Detection and Response (EDR)