X

Our website uses cookies to enhance your browsing experience.

CONTINUE TO SITE >

Falcon on GovCloud

Public sector organizations are embracing SaaS-delivered solutions at a rapid pace, as part of IT modernization efforts and recent executive orders that encourage and streamline adoption of modern commercial technology.

Moving critical capabilities such as endpoint security into the cloud requires careful consideration of a wide range of privacy and security assurances.

FALCON ON GOVCLOUD

FALCON PLATFORM
ON GOVCLOUD

FALCON PLATFORM ON GOVCLOUD

Falcon on GovCloud provides the industry’s first cloud-delivered endpoint security and IT hygiene solution. Each component is tailored for securing the U.S. public sector, FedRAMP authorized and delivered from AWS GovCloud (US). Falcon on GovCloud enables customers to prevent all types of modern attacks and significantly reduces the cost of operating security infrastructure.

Falcon on GovCloud is FedRAMP authorized, ensuring continuous compliance with the most stringent cybersecurity regulatory requirements without hindering end-user productivity — all through one, end-to-end solution.

GET ANSWERS TO COMMONLY ASKED QUESTIONS

WHY FALCON ON GOVCLOUD?

UNMATCHED PROTECTION & VISIBILITY
UNMATCHED PROTECTION & VISIBILITY
Prevent all attack types — both malware and malware-free
5-second visibility and protection across all endpoints
SCALABILITY AND EFFICIENCY
SCALABILITY AND EFFICIENCY
SaaS-based, operational in minutes, no on-premises infrastructure
Single, lightweight agent
No reboots or scans required
READY FOR PUBLIC SECTOR
READY FOR PUBLIC SECTOR
FedRAMP authorized
Delivered from
AWS GovCloud (U.S.).
COMPLETE SOLUTION
FOR ENDPOINT SECURITY

PREVENT.
DETECT.
RESPOND.

PREVENT THREATS WITH NEXT-GEN AV
Known malware prevention
Machine learning (ML)
Indicators of attack (IOAs)
Exploit mitigation
Whitelisting and blacklisting
Protection on or off the network
ENDPOINT DETECTION
AND RESPONSE (EDR)
Real-time visibility
Process tree analysis
Five-second search
Enriched with threat intelligence
UNDERSTAND YOUR ENVIRONMENT WITH IT HYGIENE
Visibility into assets, users and applications
Uncover rogue devices
Audit use and age of administrative credentials
Find unauthorized applications
CONNECT AND INTEGRATE
API-first platform
Falcon Data Replicator
CrowdStrike Threat Graph™ API
Query API
Streaming API