50% off Falcon Go, Pro, or Enterprise — for a limited time only Claim my deal

Take control of your devices

CrowdStrike Falcon® Device Control

Take control of your devices

Complete visibility and control over devices to safeguard your data and your business

CrowdStrike State of Ransomware Survey: Reality Check on Readiness Download survey

Comprehensive device control that’s easy to manage


Immediate device visibility, granular control, and protection for removable media – right at your fingertips.

Mitigate malware risk

Mitigate malware risk

Gain the granular control needed to enable safe device use and prevent the spread of malware across all connection types, including USB, SD card, Bluetooth and Thunderbolt.

red icon of a desktop computer and a magnifying glass

Track every move

Track every move

Easily monitor and track approved device usage with visibility into data transfers and file activity across all supported removable media.

Streamline policy management

Streamline policy management

Easily manage unified policies through intuitive dashboards. Create consistent controls across environments with no extra sensors, software, or hardware required.

See all device activity


View comprehensive file metadata and activities across USB devices and SD cards, and Bluetooth and Thunderbolt devices on Mac to easily detect and investigate data loss and exfiltration. With detailed user and device information, ZIP archive introspection, and Microsoft sensitivity labels, you gain the visibility you need for a proactive defense.

CrowdStrike Falcon interface showing USB device activity with charts on blocked events, device types, and access permissions.
×
CrowdStrike Falcon security policy settings for USB device access, showing restrictions by device type and enhanced file metadata collection options.
×

Identify and safeguard source code


Detect source code movement with precision across all connected devices. Advanced machine learning watches over 40 source code languages, catching any sign of exfiltration through any supported connection type. Simple, effective, and relentless — your intellectual property is safeguarded against threats.

Precise and granular control


Implement granular access rights to ensure only approved external devices are used. Simple workflows accelerate policy creation and allow analysts to test policy impacts prior to enforcement, eliminating potential disruption across supported device types.

CrowdStrike Falcon USB device block policy settings with granular access controls, exceptions, and enforcement modes.
×
CrowdStrike Falcon security policy settings for USB device access, showing restrictions by device type and enhanced file metadata collection options.
×

Cross-platform protection


Secure devices across both Windows and Mac environments with consistent policies and visibility. Control USB and SD card readers across all endpoints, plus Bluetooth and Thunderbolt connections on Mac systems. Maintain security standards across your entire organization with unified management, regardless of operating system.

See Falcon Device Control in action

See why customers trust CrowdStrike

Norgine: Winning the cyberwar with CrowdStrike

Norgine: Winning the cyberwar with CrowdStrike

"We use CrowdStrike to lock down the USBs, because of the granular control."

Nick Prescot, CISO, Norgine

Try CrowdStrike free for 15 days

Try CrowdStrike free for 15 days

Total protection has never been easier. Take advantage of our free 15-day trial.

Featured resources

Find the adversaries targeting your industry

Find the adversaries targeting your industry

Discover the adversaries targeting your industry.