This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.


Experienced a Breach?

Contact Us for Pre and Post Incident Response Services


Learn More
Falcon Host

Falcon Host

Next-Generation Endpoint Protection

Continuous visibility protects your endpoints against all threat types — known and unknown, malware and malware-free. Nothing is missed, so you can respond in real-time to stop breaches.

Unique Indicator of Attack (IOA) behavioral blocking

Extensive prevention of privilege escalation, ransomware, zero-day exploits, and more

Sophisticated machine learning-driven malware protection

Real-time and historical analysis of key endpoint activity such as processes, threads and more

Falcon Host

Falcon Overwatch

Managed Hunting


To defeat sophisticated adversaries focused on breaching your organization, you need a dedicated team working for you 24/7 to proactively identify attacks.

A global team of expert adversary hunters, watching your back 24/7

Reduce alert fatigue with proactive notification and actionable alerts

Augment your existing in-house resources, improving your operational efficiency

Leverage the “power of the crowd” to identify new and emerging threats to your organization

Falcon Intel

Falcon Intelligence

Cyber Threat Intelligence

Track global adversary activity with customized and actionable intelligence. Understand adversary motives, anticipate their actions, and prevent them from breaching your organization.

In-depth cyber security analysis and reporting

Attack attribution and identification of unique adversary TTPs (tactics, techniques and procedures)

Customizable feeds and API supporting a wide range of formats

70+ Adversaries tracked around the clock, around the Globe

Tailored Intelligence providing visibility into events that matter to you


Falcon Architecture

Cloud-Delivered Endpoint Protection

CrowdStrike designed a new approach and architecture to overcome the limitations of existing endpoint security solutions and deliver true next-generation endpoint protection

Native cloud architecture gives you the scalability, adaptability and speed required to defeat attackers' ever-changing tools and techniques

Operationalize in hours and free your team from the treadmill of deployment, maintenance and updates

Powerful Graph Data Model instantly identifies new and emerging threats and protects all endpoints in your environment — on or off the network

Detects and stops attacks, from the commonplace to highly targeted and sophisticated malware-free intrusions

Seamlessly integrates people, process, technology and intelligence in concert for the most effective protection


Falcon Connect

Platform integration


Falcon Connect provides a rich set of resources, including APIs (Application Programming Interfaces), applications and tools to develop, integrate and extend the use of the Falcon Platform with existing security solutions.

A broad set of sophisticated and easy-to-use query and streaming APIs allow applications and other security solutions to connect to and interact with the Falcon Platform.

Falcon Orchestrator provides enhanced workflow automation and remediation capabilities for Falcon Host.

Falcon SIEM Connector streamlines and automates the process of gathering Falcon Host data into any SIEM or related system.

Community tools offer a collection of resources ranging across vulnerability scanning, forensic collection, deobfuscation, and process inspection.

Github repository provides a variety of scripts, source code, libraries and tools covering a range of security and CrowdStrike-related areas.


See How You Can Stop Breaches request a live demo