This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.

ACCEPT

Experienced a Breach?

NEED IMMEDIATE ASSISTANCE?
Contact Us for Pre and Post Incident Response Services

855.276.9347

Learn More

Falcon Host Next-Generation Antivirus

Complete Protection Against All Breach Vectors

Falcon Host protects against attacks — whether they use malware or not. This is achieved by unifying an array of best-of-breed protection methods:

Forrester Wave: Endpoint Security Suites, Q4 2016

The 15 Providers That Matter Most And How They Stack Up

Download Now

 

Complete Protection

Falcon Host uniquely combines these powerful methods into an integrated approach that protects endpoints more effectively against both malware and breaches:

Known malware prevention

Blacklisting and whitelisting

Machine learning

Exploit mitigation to stop attacks that exploit vulnerabilities to compromise hosts

Indicators of Attack (IOAs) to look across both legitimate activity and malicious activity and detect stealthy chains of activities that indicate attacks. Learn more about IOAs

Seamless management

All of this protection capability is delivered without impacting the performance or management of the endpoint:

Smart and lightweight sensor — less than 5MB in size, invisible to end users, with no productivity impact

Signature-less technologies that do not require signature updates

Built-in endpoint detection and response (EDR) augments protection with unprecedented detection, visibility, and forensics abilities, without the need for additional agents

Uniquely powered by the technologies of the future

Built on cutting-edge Cloud and Graph technologies that enable unprecedented levels of protection:

A 100% cloud-delivered solution deployed and instantly operational with no associated hardware or storage costs for the customer

The CrowdStrike Threat Graph™ enabling levels of protection and visibility at a speed and scale not previously achievable - learn more about Threat Graph™

Resources

To learn more about the other essential elements of Falcon Host, please visit the Falcon Host EDR and Falcon Overwatch pages.

WHITE PAPER

Three essential elements of
next-generation endpoint protection

 

See How You Can Stop Breaches request a live demo