What does CrowdStrike Falcon do?
Falcon is the CrowdStrike platform purpose-built to stop breaches via a unified set of cloud-delivered technologies that prevent all types of attacks — including malware and much more. Today’s sophisticated attackers are going “beyond malware” to breach organizations, increasingly relying on exploits, zero days, and hard-to-detect methods such as credential theft and tools that are already part of the victim’s environment or operating system, such as PowerShell. CrowdStrike Falcon responds to those challenges with a powerful yet lightweight solution that unifies next-generation antivirus (NGAV), endpoint protection and response (EDR), managed threat hunting capabilities and security hygiene — all contained in a tiny 20MB sensor that is cloud-managed and delivered.
What solutions are offered within the CrowdStrike Falcon Platform?
The CrowdStrike Falcon Platform includes:
- Falcon Prevent — Next Generation Antivirus (NGAV)
- Falcon Insight — Endpoint Detection and Response (EDR)
- Falcon OverWatch — Managed Threat Hunting
- Falcon Discover — Security Hygiene
- Falcon Intelligence — Cyber Threat Intelligence
What is Falcon Prevent?
Falcon Prevent provides next generation antivirus (NGAV) capabilities, delivering comprehensive and proven protection to defend your organization against both malware and malware-free attacks. Incorporating identification of known malware, machine learning for unknown malware, exploit blocking and advanced Indicator of Attack (IOA) behavioral techniques, CrowdStrike Falcon Prevent allows organizations to confidently replace their existing legacy AV solutions.
What is Falcon Insight?
Falcon Insight provides endpoint detection and response (EDR) capabilities, allowing for continuous and comprehensive visibility to tell you what’s happening on your endpoints in real time. The extensive capabilities of Falcon Insight span across detection, response and forensics, to ensure nothing is missed, so potential breaches can be stopped before your operations are compromised.
What is Falcon Overwatch?
Falcon OverWatch is a managed threat hunting solution. To defeat sophisticated adversaries focused on breaching your organization, you need a dedicated team working for you 24/7 to proactively identify attacks. The global Falcon OverWatch team seamlessly augments your in-house security resources to pinpoint malicious activities at the earliest possible stage, stopping adversaries in their tracks.
What is Falcon Discover?
Falcon Discover is an IT hygiene solution that identifies unauthorized systems and applications, and monitors the use of privileged user accounts anywhere in your environment — all in real time, enabling remediation as needed to improve your overall security posture.
Can I use CrowdStrike Falcon to replace my current AV solution?
Yes, CrowdStrike Falcon Prevent allows organizations to confidently replace their existing legacy AV solutions. Incorporating identification and prevention of known malware, machine learning for unknown malware, exploit blocking and advanced Indicator of Attack (IOA) behavioral techniques, Falcon Prevent protects against attacks whether your endpoints are online or offline. Falcon Prevent also features integration with Windows System Center, for those organizations who need to prove compliance with appropriate regulatory requirements.
Is CrowdStrike Falcon certified for AV replacement?
Yes, CrowdStrike Falcon has been certified by independent third parties as an AV replacement solution.
Which Products can CrowdStrike Falcon Replace help me replace?
The extensive capabilities of CrowdStrike Falcon allows customers to consider replacing existing products and capabilities that they may already have, such as:
- Host intrusion prevention (HIPS) and/or exploit mitigation solutions
- Behavioral analytics
- Endpoint Detection and Response (EDR) tools
- Indicator of compromise (IOC) search tools
- Sandboxes or dynamic execution analysis
- Log analysis
- Managed Detection and Response
- Threat Intel services
- IT Hygiene tools
Can CrowdStrike Falcon be used for compliance requirements?
How does CrowdStrike Falcon compare to other “next-generation” endpoint protection solutions? What makes Falcon unique?
CrowdStrike is the pioneer of cloud-delivered endpoint protection. CrowdStrike Falcon has revolutionized endpoint security by being the first and only solution to unify next-generation antivirus, endpoint detection and response (EDR), and a 24/7 threat hunting service — all delivered via a single lightweight agent. Using its purpose-built cloud native architecture, CrowdStrike collects and analyzes more than 30 billion endpoint events per day from millions of sensors deployed across 176 countries. The unique benefits of this unified and lightweight approach include immediate time-to-value, better performance, reduced cost and complexity, and better protection that goes beyond detecting malware to stop breaches before they occur. These capabilities are based on a unique combination of prevention technologies such as machine learning, Indicators of Attack (IOA), exploit blocking, unparalleled real-time visibility and 24×7 managed hunting to discover and track even the stealthiest attackers before they do damage.
Can I use CrowdStrike Falcon for incident response?
Absolutely, CrowdStrike Falcon is used extensively for incident response. Falcon Insight provides remote visibility across endpoints throughout the environment, enabling instant access to the “who, what, when, where and how” of an attack. The cloud-based architecture of Falcon Insight enables significantly faster incident response and remediation times.
Can Falcon Prevent block attacks?
Yes, Falcon Prevent offers powerful and comprehensive prevention capabilities. Falcon Prevent can stop execution of malicious code, block zero-day exploits, kill processes and contain command and control callbacks.
Can CrowdStrike Falcon protect endpoints if they are not connected to the cloud?
Yes, indeed, the lightweight Falcon sensor that runs on each endpoint includes all the prevention technologies required to protect the endpoint, whether it is online or offline. Those technologies include machine learning to protect against known and zero-day malware, exploit blocking, hash blocking and CrowdStrike’s behavioral artificial intelligence heuristic algorithms, known as Indicators of Attack (IOAs).
Do I need a large staff to maintain my CrowdStrike Falcon environment?
No, CrowdStrike Falcon delivers next-generation endpoint protection via the cloud. A key element of “next gen” is reducing overhead, friction and cost in protecting your environment. There is no on-premises equipment to be maintained, managed or updated. The Falcon sensor is unobtrusive in terms of endpoint system resources and updates are seamless, requiring no re-boots. The Falcon web-based management console provides an intuitive and informative view of your complete environment.
Does the Falcon sensor interfere with other endpoint software?
No, Falcon was designed to interoperate without obstructing other endpoint security solutions, including third-party AV and malware detection systems.
How do I integrate with the Falcon Platform?
Falcon Connect has been created to fully leverage the power of Falcon Platform. Falcon Connect provides the APIs, resources and tools needed by customers and partners to develop, integrate and extend the use of the Falcon Platform itself, and to provide interoperability with other security platforms and tools. Find out more about the Falcon APIs:Falcon Connect and APIs.
Does CrowdStrike Falcon integrate with my SIEM?
Yes, Falcon offers two points of integration with SIEM solutions:
- Customers can import IOCs (Indicator of Compromise) from their SIEM into the Falcon Platform, using an API.
- Customers can forward CrowdStrike Falcon events to their SIEM using the Falcon SIEM Connector. The Falcon SIEM Connector enables integration with most SIEM offerings, such as HP ArcSight, IBM QRadar, and Splunk. Additionally, the Falcon Streaming API is available to customers who wish to build their own custom integration.
How long does it take to get started with CrowdStrike Falcon?
Literally minutes — a lightweight sensor (<20MB) is deployed to your endpoints as you monitor and manage your environment via a web console. With CrowdStrike Falcon there are no controllers to be installed, configured, updated or maintained: there is no on-premises equipment.
Is the Falcon sensor another agent? Will it slow down my endpoints?
The Falcon sensor’s design makes it extremely lightweight (consuming 1% or less of CPU) and unobtrusive: there’s no UI, no pop-ups, no reboots, and all updates are performed silently and automatically.
What operating systems does CrowdStrike Falcon support?
|Supported Platforms||Win Server 2008R2 SP1 and above||Win 7 SP1 and above||OSX 10.8 and above||– RHEL 7.0-7.2|
– RHEL 6.2-6.8
– CentOS 7.0-7.2
– CentOS 6.2-6.8
– Ubuntu 14.04 LTS (minimum kernel version 3.13.0-32)
– SUSE Linux Enterprise Server 11.3-11.4 (minimum kernel version 3.0.101-0.47.55.1)
– SUSE Linux Enterprise Server 12-12.1 (minimum kernel version 3.12.39-47)
Can CrowdStrike Falcon scale to protect large environments with 100,000-plus endpoints?
Yes, Falcon is a proven cloud-based platform enabling customers to scale seamlessly and with no performance impact across large environments. The platform’s “frictionless” deployment has been successfully verified across enterprise environments containing more than 100,000 endpoints.
Is CrowdStrike Falcon cloud-based or on-premises?
CrowdStrike Falcon is a 100 percent cloud-based solution, offering Security as a Service (SaaS) to customers. Falcon requires no servers or controllers to be installed, freeing you from the cost and hassle of managing, maintaining and updating on-premises software or equipment.
Is Falcon SOC2 compliant?
Yes,CrowdStrike is compliant with Service Organization Control 2 standards and provides its Falcon customers with an SOC 2® report. Additionally, we also are TRUSTe compliant.
How does the Falcon sensor talk to the cloud and how much data does it send?
All data transmitted from the sensor to the cloud is protected in an SSL/TLS-encrypted tunnel. On average, each sensor transmits about 5-8 MBs/day.
What data is sent to the CrowdStrike Cloud?
CrowdStrike Falcon is designed to maximize customer visibility into real-time and historical endpoint security events by gathering event data needed to identify, understand and respond to attacks — but nothing more. This default set of system events focused on process execution is continually monitored for suspicious activity. When such activity is detected, additional data collection activities are initiated to better understand the situation and enable a timely response to the event, as needed or desired. Note that the specific data collected changes as we advance our capabilities and in response to changes in the threat landscape. Information related to activity on the endpoint is gathered via the Falcon sensor and made available to the customer via the secure Falcon web management console.
How do you separate and safeguard data sent to your cloud?
All data sent from the CrowdStrike Falcon sensor is tagged with unique, anonymous identifier values. Data and identifiers are always stored separately. Once in our cloud, the data is heavily protected with strict data privacy and access control policies. All data access within the system is managed through constrained APIs that require a customer-specific token to access only that customer’s data. Our analysis engines act on the raw event data, and only leverage the anonymized identifier values for clustering of results.
What is an IOA?
While other security solutions rely solely on Indicators of Compromise (IOCs) — such as known malware signatures, hashes, domains, IPs and other clues left behind after a breach — CrowdStrike also can detect live Indicators of Attack (IOAs), identifying adversarial activity and behaviors across the entire attack timeline, all in real time. Falcon’s unique ability to detect IOAs allows you to stop attacksbeforea damaging breach occurs.
What detection capabilities does CrowdStrike Falcon have?
For known threats, Falcon provides cloud-based antivirus and IOC detection capabilities. For unknown and zero-day threats, Falcon applies IOA detection, using machine learning techniques to build predictive models that can detect never-before-seen malicious activities with high accuracy. Driven by the CrowdStrike Threat Graph™ data model, this IOA analysis recognizes behavioral patterns to detect new attacks, whether they use malware or not. The range and capability of Falcon’s detection techniques far surpass other security solutions on the market, particularly with regard to unknown and previously undetectable emerging threats.
Does Falcon provide malware prevention?
Falcon Prevent stops known and unknown malware by using an array of complementary methods:
- Machine learning
- Custom blocking (whitelisting and blacklisting)
- Exploit blocking
- IOA (Indicators of Attack) prevention
- Additional protection specific to ransomware
Customers can control and configure all of the prevention capabilities of Falcon within the configuration interface.
Is Falcon’s machine learning feature configurable?
Yes, Falcon includes a feature called the Machine Learning Slider, that offers several options to control thresholds for machine learning. In addition, this unique feature allows users to set up independent thresholds for detection and prevention.
Does Falcon Prevent protect against ransomware?
Falcon Prevent uses an array of complementary prevention and detection methods to protect against ransomware:
- Blocking of known ransomware
- Exploit blocking to stop the execution and spread of ransomware via unpatched vulnerabilities
- Machine learning for detection of previously unknown “zero-day” ransomware
- Indicators of Attack (IOAs) to identify and block additional unknown ransomware, as well as new categories of ransomware that do not use files to encrypt victims’ data
Can CrowdStrike Falcon detect in-memory attacks?
CrowdStrike Falcon is equally effective against attacks occurring on-disk or in-memory. The platform continuously watches for suspicious processes, events and activities, wherever they may occur.