Upcoming events
Sale | Nov 24 - Dec 5
Cyber Monday
50% off Falcon Go, Pro, and Enterprise.
Your Cart
Added to Cart
There's nothing in your cart
per endpoint / per year
Virtual Event
Best of Fal.Con 2025: The biggest moments from the cybersecurity event of the year
Accelerate Your Agentic SOC Transformation with Onum
CrowdCast
Defeating BLOCKADE SPIDER: An Interactive Ransomware Response Simulation
Redefining Cloud Security with Agentic AI
2025 Cyber Frontline Insights: Transforming Reactive Response into Prevention
Securing the AI Era with Pangea and CrowdStrike AIDR
How Platform Consolidation Cuts Costs and Accelerates AI-Driven Defense
Preventing Identity-Based Attacks on Healthcare Organizations
Outdated and Outmatched: Why Legacy AV Can’t Keep Up
Falcon Privileged Access Saves the Day
Ransomware and Extortion Attacks in Healthcare: Understanding the Threat, Strengthening Defenses, and Improving Resilience
Beyond the Perimeter 2025 with CrowdStrike, Okta and Zscaler
Stopping the Enemy Within: Detect and Defeat Insider Threats Before They Strike
Cloud Under Siege: How to Outsmart Today’s Most Dangerous Adversaries
The Next Era of MDR: AI, Automation & Human Expertise
Outpace the Adversary. Take Control of Your Exposure.
Future-Ready Identity Security: Innovations for Hybrid Environments
Harnessing the Power of GenAI with a Platform-Centric Approach
Modernize Cloud Security with CDR: Unifying Cloud Posture and Protection
CISO Perspectives: Modernizing Your SOC with Next-Gen SIEM
The Business of Cybercrime: Year of the Enterprising Adversary
Enhance Zero Trust Coverage Across Government Endpoints, Identities, and Clouds
SaaS Threat Simulation: Detecting and Stopping SCATTERED SPIDER
Winning the Fight Against Evolving Ransomware Threats
Insider Threat Simulation: Detecting and Stopping FAMOUS CHOLLIMA
Harness the power of AI: Modernize your health system's SOC with next-gen SIEM
From Reactive to Proactive: Transforming Your Cybersecurity Program
Redefining Security for the Cloud AI Era
Accelerate Your SIEM Replacement with CrowdStrike
Fast-Tracking Cloud Security with CrowdStrike and Google Cloud
Enhancing Cybersecurity for Education: Leveraging the FCC Schools and Libraries Pilot Program with CrowdStrike
Beyond Boundaries: Revolutionizing Identity Security from On-Premises Environments to the Cloud
Don't Just Manage Your Attack Surface — Master It
Best of Fal.Con 2024: Hits and highlights from this year’s event
Identity Threat Protection Live Attack and Defend Demo
Introducing the Next Generation of IT Automation: CrowdStrike Falcon® for IT
Tales from the Battlefield: Stop Breaches by SCATTERED SPIDER and More
NIS2 & Ensuring Cloud Security is Compliant
Unstoppable Innovations CrowdCast Series: From Red-Hot Releases to Future Roadmap Session #3
Under the Radar: The Year of Stealth
Enterprise-Scale Honeytokens for CrowdStrike Identity Protection
Future Proof Your Observability Strategy with CrowdStrike and Cribl
Accelerating Incident Response with CrowdStrike and ServiceNow
How to Protect Your Small Business from Cyber Attacks
Fast Track Your Cyber Insurance Initiatives With Identity Protection
Google Cloud Security and CrowdStrike: Transforming Security Together
Shift Left - Improving The Security Posture of Applications
Defending Your Small Business From Big Threats
Unstoppable Innovations CrowdCast Series: From Red-Hot Releases to Future Roadmap Session #2
Unstoppable Innovations CrowdCast Series From Red-Hot Releases to Future Roadmap Session #1
Beyond the Perimeter 2024 with CrowdStrike, Okta and Zscaler
SEC Readiness: Demystifying the Four-Day Breach Disclosure Requirement
Effective data protection solves security, not just compliance
COZY BEAR on the Prowl
Top 2024 Cybersecurity Trends Series – Session #3: Cloud Security Consolidation Extends Protection from Code to Runtime
Top 2024 Cybersecurity Trends Series – Session #2: Cybersecurity Consolidation – Perspectives from Intel’s CISO & New Research
Top Cybersecurity Trends for 2024 Series - Session #1: Generative AI Accelerates Protection and Investigation
2020 CrowdStrike Global Security Attitude Survey
The 1/10/60 Minute Challenge: A Framework for Stopping Breaches Faster
Security at the speed of DevOps
Stop Them: Combating Identity Attacks on Your Health System
Redefining Endpoint Security to Stop Modern Cyberattacks
Beyond Compliance: Hardening Your Host OS with CIS Benchmarks to Stop Breaches
Harness total enterprise visibility and protection with Next-Gen MDR
AI-Native SOC Summit: The Next Generation of SIEM, Here Today