This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.

ACCEPT

Experienced a Breach?

NEED IMMEDIATE ASSISTANCE?

Contact Us for Pre and Post Incident Response Services

CONTACT US NOW

Falcon Insight: Endpoint Detection & Response (EDR)

The Complete EDR Solution

Regardless of how advanced your defenses are, there’s a chance that attackers will do an “end run” on your security solution and slip through to gain access to your environment. Conventional defenses don’t know and can’t see when this happens, resulting in “silent failure.” When silent failure occurs, it can allow attackers to dwell in your environment for days, weeks or even months without raising an alarm. The solution lies in continuous and comprehensive visibility into what is happening on your endpoints in real time.

CrowdStrike Falcon Insight eliminates silent failure by providing the highest level of real-time monitoring capabilities that span across detection, response and forensics to ensure nothing is missed, leaving attackers with no place to hide. Falcon Insight provides organizations with state-of-the-art endpoint detection and response (EDR), following an approach recommended by top analyst firms such as Gartner.

"Enterprises that know compromise is inevitable and are looking for endpoint-based approaches for advanced threat detection, investigation and response capabilities, should consider EDR solutions." — Neil MacDonald, VP Distinguished Analyst

Gartner scored CrowdStrike as "strong" in all endpoint detection & response use cases evaluated in a comparative assessment report called Comparison of Endpoint Detection and Response Technologies and Solutions, published in 2016.* The use cases include:

Incident Data Search and Investigation

Alert triage or Suspicious Activity Validation

Suspicious Activity Detection

Threat Hunting or Data Exploration

Stopping Malicious Activity

You can access the full report in our resource center.

*Source: Gartner Comparison of Endpoint Detection and Response (EDR) Technologies and Solutions 2016 at https://www.gartner.com/doc/3343417/comparison-endpoint-detection-response-technologies (account required)

The Power to Prevent Silent Failure and Stop Breaches

Falcon Insight relies on CrowdStrike’s revolutionary cloud-delivery architecture, providing a communications fabric unlike any other. Using an advanced graph data model, CrowdStrike Threat Graph™ collects and inspects event information in real time to prevent and detect attacks on your endpoints. As part of the Falcon endpoint protection platform, Falcon Insight records all activities of interest on an endpoint for deeper inspection — on-the-fly and after-the-fact — allowing users to quickly detect, investigate and respond to attacks -- even those that evade standard prevention measures.

Indicator of Attack (IOA) Behavioral Protection:
Automatic prevention and detection of IOAs to identify attacker behavior and stop attacks, with prioritized alerts sent to Falcon web management console -- eliminating the need for time-consuming manual searches

Real-Time Visibility:
Complete oversight of security-related endpoint activity, allowing you to “shoulder surf” adversary activities, even when they try to breach your environment

Five-Second Search:
Discover and investigate current and historic endpoint activity — go back one second, one day, or even one year of activity — all at your fingertips.

Insight and Intelligence:
Events can be contextualized by threat intelligence, providing details on the attributed adversary and any other information known about the attack.

Zero Impact on Endpoints:
A cloud-delivered SaaS solution, Falcon Insight deploys in seconds with near zero impact on endpoint performance - even when analyzing, searching and investigating

RESOURCES

Please visit the Falcon Prevent and Falcon OverWatch pages to learn how they complement Falcon Insight to stop breaches.

To see how CrowdStrike services use Falcon Insight to find and defeat adversaries in customers’ environments, read the CrowdStrike Cyber Intrusion Services Casebook.

WHITE PAPER

Three essential elements of
next-generation endpoint protection

 

See How You Can Stop Breaches request a demo