X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >

Falcon X: Automated Threat Intelligence

Falcon X combines automated analysis with human intelligence, enabling security teams, regardless of size or skill, to get ahead of the attacker's next move.
Download Data Sheet

Product Capabilities

CHOOSE THE OPTION THAT SUITS YOU BEST

  • Falcon X

    Falcon X

    Automatically investigate incidents and accelerate alert triage and response. Built into the Falcon platform, it is operational in seconds.

    See More Below

  • Falcon X Premium

    Falcon X Premium

    Premium adds threat intelligence reporting and research from CrowdStrike experts — enabling you to get ahead of nation-state, eCrime and hacktivist attacks.

    Find out more

  • Falcon X Elite

    Falcon X Elite

    Elite expands your team with access to an intelligence analyst to help defend against threats targeting your organization.

    Find out more

Falcon XFalcon X PremiumFalcon X Elite
Endpoint Integration tooltip checkcheckcheck
AUTOMATED INVESTIGATIONS tooltip checkcheckcheck
INDICATORS OF COMPROMISE (IOCs) tooltip checkcheckcheck
INTELLIGENCE REPORTS tooltip checkcheck
TAILORED INTELLIGENCE tooltip checkcheck
SNORT/YARA RULES tooltip checkcheck
ASSIGNED INTEL ANALYST tooltip check
REQUESTS FOR INFORMATION tooltip check
PRIORITY INTELLIGENCE REQUIREMENTS tooltip check

TECHNICAL FEATURES

How Does Falcon X Help?

AUTOMATED INVESTIGATIONS

AUTOMATED INVESTIGATIONS

  • Bring endpoint protection to the next level by combining malware sandbox analysis, malware search and threat intelligence in a single solution
  • Reduce the time and skills required to perform manual incident investigations
  • Identify and investigate related threats and block similar attacks in the future

Watch Demo

INDICATORS OF COMPROMISE (IOCs)

INDICATORS OF COMPROMISE (IOCs)

  • The Indicator Graph enables you to visualize relationships between IOCs, adversaries and your endpoints
  • Hunt for threats with IOCs enriched with context
  • Strengthen defenses with IOCs created from observed malware, and access CrowdStrike’s real-time global IOC feed
  • Pre-built integrations and APIs enable you to orchestrate defenses with existing security solutions

Watch Indicator Graph Demo

mummy spider threat profile

ATTACKER PROFILES

  • Access 130+ profiles of nation-state, eCrime and hacktivist adversaries
  • Identify adversaries focused on attacking your business, region, or industry
  • Learn about your adversaries’ intent and capabilities and predict their next move

Read our Threat Intel Blog

ENDPOINT INTEGRATION

ENDPOINT INTEGRATION

  • As part of the Falcon platform, there is nothing extra to deploy or maintain
  • Protected endpoints automatically forward all quarantined files to Falcon X for immediate investigation
  • Falcon detections are enriched with context so you can quickly understand an attack and deploy proactive countermeasures

Request Info

TECHNICAL CENTER

For technical information on the product capabilities and features, please visit the CrowdStrike Tech Center.

  • TECHNICAL CENTER
  • TECHNICAL CENTER
  • TECHNICAL CENTER
Get Started With CrowdStrike Intelligence

Our Customers

CUSTOMERS THAT TRUST CROWDSTRIKE

INTELLIGENCE REPORTS

CrowdStrike’s groundbreaking intelligence reports present customers and the global cybersecurity community with the latest developments and defenses for an increasingly dangerous threat landscape. Download these complimentary reports:

  • GLOBAL THREAT REPORT

    Read this critical report to learn how to defend against the quickening pace and increasing sophistication in adversary tactics, techniques and procedures.

    Read the Report

  • 2019 MOBILE THREAT LANDSCAPE REPORT

    Download this report to learn about adversary groups that target mobile devices and how their tactics — and the mobile threat landscape in general — are evolving. 

    Read the Report

GET ANSWERS TO FREQUENTLY ASKED QUESTIONS

Falcon X FAQ

PURCHASE FALCON X AS PART OF A BUNDLE

CrowdStrike bundles are specifically tailored to meet a wide range of endpoint security needs

Explore the Bundles

TRY FALCON PREVENT FREE FOR 15 DAYS

TRY FALCON PREVENT FREE FOR 15 DAYS Start Free Trial