Falcon Horizon CSPM

Cloud security posture management that detects and prevents misconfigurations and control plane threats, eliminates blind spots, and ensures compliance, across AWS, Azure, and Google Cloud.
Schedule a Demo


See More, Know More, Do More
with Falcon Horizon Agentless Protection

  • Unify visibility and security enforcement across multi-cloud environments

    Unify visibility and security enforcement across multi-cloud environments

    Falcon Horizon delivers continuous agentless discovery and visibility of cloud-native assets from the host to the cloud, providing valuable context and insights into the overall security posture and the actions required to prevent potential security incidents.

  • triage icon

    Prevent cloud misconfigurations and eliminate compliance violations

    Falcon Horizon provides intelligent agentless monitoring of cloud resources to detect misconfigurations, vulnerabilities and security threats, along with guided remediation to resolve security risks and enable developers with guardrails to avoid costly mistakes.

  • complex icon

    Continuously detect and prevent cloud control plane and identity-based threats

    Falcon Horizon’s adversary-focused approach provides real-time threat intelligence on 150+ adversary groups, 50+ IOA detections and guided remediation that improves investigation speed by up to 88%, enabling teams to respond faster and stop breaches.




Cloud Security Posture Management Discovery GiF


  • Single source of truth: Get up and running in minutes and access a single source of truth for all cloud assets and security configurations across multi- cloud environments and accounts.
  • See everything: Discover cloud resources and details automatically upon deployment, including misconfigurations, metadata, networking, security, access control and change activity, and eliminate security blind spots.
  • Simplified management and security policy enforcement: Manage and enforce security group policies across accounts, projects, regions and virtual networks from a single console to reduce the attack surface.
  • Monitor the control plane: Scale at will and gain insight into all control plane API calls and uncover security risks within managed Kubernetes clusters.
  • Identify unprotected resources: Identify cloud resources not protected by Falcon and take immediate action.
  • Supported Services: To see a complete list of all monitored services click here.

Read The Blog



  • Eliminate misconfigurations and compliance violations: Compare cloud application configurations to industry and organizational benchmarks, to identify violations and remediate in real time to ensure application availability.
  • Guided remediation from security experts: Find and fix issues that leave cloud resources exposed — such as misconfigurations, open IP ports and unauthorized modifications — with guided remediation and guardrails that enable developers to avoid critical mistakes.
  • Enforce permissions: Monitor storage to ensure permissions are secure and not publicly accessible.
  • Prevent identity-based threats: Reduces the number of tools required from 3 to 1 and prevent users from putting your organization at risk by automating the detection and remediation of identity-based risks in Azure and AWS.
  • Secure Azure AD: Ensure Azure AD groups, users and apps have the correct permissions using the new Identity Analyzer reports.
  • Reduce alert fatigue: Remediate issues faster and reduce SOC costs with enhanced policy management for cloud accounts, regions or specific resources.
  • Ensure resilience: Monitor database instances and verify that high availability, backups and encryption are enabled, as well as security groups to limit exposure.

Learn More

CSPM Real Time Threat Protection Image

Real-Time Threat Detection

  • Accelerate response: Reduce the time it takes to detect and mitigate a breach from months to minutes with an adversary-focused approach that cuts through the noise with 50 out-of-the-box IOA policies designed to stop breaches save time and allow DevSecOps teams to take the most effective action.
  • Confidence scoring and prioritization: Falcon Horizon’s patent-pending Confidence Scoring continuously aggregates, assesses and scores control plane threats and configurations to accurately identify malicious activity, reducing the time to understand and respond.
  • IOA for cloud with Integrated threat intelligence: Delivers real-time alerting and reporting on 150+ cloud adversaries based on CrowdStrike’s market leading threat intelligence and research, for more effective response.
  • Continuous control plane threat detection: Provides ML and behavior-based TTP/IOA detections and guided remediation for all cloud accounts, services and users across the cloud estate and improves investigation speed by up to 88%.
  • Self-service threat hunting: Provides cloud-scale data and analytics for all cloud activity, enabling security teams to proactively uncover hidden threats and take action.

Learn More

Falcon CSPM Continuous Compliance Image


  • Continuous compliance monitoring: Continuously monitor the compliance posture of all of your cloud resources from a single console.
  • CIS benchmark assurance: Enables you to assess the security of cloud accounts against Docker and Kubernetes CIS benchmarks with 250 out-of-the-box adversary-focused policies saving time and reducing operational costs.
  • Audit-ready compliance: Continuously monitor the compliance of all of your cloud resources and avoid costly fines from a single console for regulations including PCI, NIST and more.
  • Eliminate compliance violations: Identify policy violations and take immediate user-driven action to remediate.


  • Improve decision making: With SIEM integration, streamline visibility for security operations and provide insights and context into misconfigurations and policy violations for faster incident response.
  • Integrate at the speed of DevOps: Using the single API, achieve faster integration and remediation within the DevOps and collaboration tools you already use, such as email, Slack, PagerDuty and more.
  • Fuel business performance: Through reporting and dashboards, drive alignment and a shared understanding across security operations, DevOps and infrastructure teams.


Optimize your investments and get started faster

clarity in the cloud

Cloud Security Posture Management

Click the links below to visit the CrowdStrike Integration Center

falcon overwatch threat hunting process graphic

DevOps & Cloud-Native

Click the links below to visit the CrowdStrike Integration Center


  • triage icon

    Falcon Cloud Workload Protection

    Provides comprehensive breach protection across private, public, hybrid and multi-cloud environments, allowing customers to rapidly adopt and secure technology across any workload.

    Learn More

  • Container Security

    Container Security

    The Falcon platform and intelligent, lightweight Falcon agent offer unparalleled protection and real-time visibility. Specifically tailored for containers, Falcon provides detailed insight into both the host and container-specific data and events.

    Learn More

  • resources icon

    Cloud Security Assessment

    Test and evaluate your cloud infrastructure to determine if the appropriate levels of security and governance have been implemented to counter inherent security challenges.

    Learn More

Product Validation

Customers That Trust CrowdStrike


Tested and proven leader

CrowdStrike is proud to be recognized a leader by industry analyst and independent testing organizations.

  • Positioned as a Leader

    Download this complimentary report to learn the analysis behind CrowdStrike’s positioning as a Leader and what CrowdStrike believes it could mean for your organization’s cybersecurity posture.

    Read the Report

  • Named a Leader

    Read this critical report to learn why CrowdStrike was named a “Leader” in the 2019 Forrester Wave with the top ranking in strategy and high scores in 17 criteria.

    Read the Report


    Learn why CrowdStrike scores highest overall out of 20 vendors for use case Type A or “forward leaning” organizations.

    Read the Report

Visit our third-party evaluations page to see how CrowdStrike performed against the industry’s most rigorous tests and trials.

Secure your Cloud Workloads and Containers

Falcon Cloud Workload Protection