CrowdStrike Threat Graph

The industry’s leading cloud-scale AI brains behind CrowdStrike’s Security Cloud predicts and prevents modern threats in real time
Download Data Sheet

Benefits

Advantages of Threat Graph

  • complex icon

    Comprehensive Data Sets

    Continuous high-fidelity telemetry with forensic-level detail across endpoints and workloads distributed across the network edge and hybrid cloud infrastructure — including Windows, macOS, and Linux, together with cloud-native storage for always-on data availability.

  • resources icon

    Cloud-Scale Analytics

    Contextual relationship derivation with ML algorithms and deep analytics across billions of disjoint and siloed data elements — allows for fast, on-demand search and query across real-time and historical data for speedy investigation and response.

  • triage icon

    Real-Time Attack Visibility

    Real-time visibility with instant access to enriched data and intuitive dashboards for advanced workflows and visualizations — covers ephemeral, online, offline and even end-of-life hosts to arm your responders with data so they can respond to threads immediately and act decisively

Technical Features

Purpose-built Graph Database for Cybersecurity

Power of Security Cloud

Power of Security Cloud

  • Fully Operational in Minutes: Complete turnkey solution with no additional hardware or deployments
  • Power of the Crowd: Use network effect to protect everyone against a new threat, regardless of where it is encountered
  • Zero Maintenance Overhead: See value from Day One, with no additional custom tuning, costly consulting, re-architecting or maintenance overhead
  • Scale and Elasticity: Automatically scales and grows with demand and change

Report: Total Economic Impact™ of CrowdStrike

Power of Data

Power of Data

  • Enriched Telemetry: Capture billions of raw endpoint and workload events and enrich with threat intelligence, context and correlation markers
  • Deep Analytics: Reveal contextual relationships between data elements to identify and respond to new and unusual threats in real time by applying graph analytics and ML algorithms
  • Powerful Search: The robust query and search engine provides current and historical forensic details to arm responders for threat investigations
  • Data Availability: On-demand access to enriched data with powerful visualization dashboards helps investigators understand the full context of the attack on any affected host, regardless of location

Blog: 3 Best Practices for Building a High-Performance Graph Database

Maximum Security Efficiency

Maximum Security Efficiency

  • Actionable Insights: The industry’s leading collection of powerful insights gathers 5 trillion events per week spanning across 2 trillion vertices and analyzing over 15 petabytes of data
  • Integrated Threat Intelligence: Telemetry is enriched with real-world threats and identifies new attacks associated with known threat actors
  • Accelerated Response: Real-time visualization and automated concurrent analysis lead to faster investigation and response times
  • Proactive Threat Hunting: Threat hunters can run ad hoc queries for successful and timely detections of unknown threats

Whitepaper: Stop Breaches with Threat Graph

Single Source of Truth

Single Source of Truth

  • Single Data Source: Gain rapid access to everything required to prevent, detect, investigate, and respond
  • Single Intelligent Agent: The lightweight agent provides smart-filtering capability streams relevant data for enrichment and correlation to the Threat Graph — with no performance impact
  • Robust Set of APIs: Powerful APIs allow for security orchestration, automation, response and other advanced workflows
  • Rich Integrations: APIs and bidirectional data flow enable tight integrations with third-party security and IT solutions to share insights from multiple data sources
  • Cloud-Delivered Resources: Threat Graph scales with demand and provides necessary storage, compute and rich analytics required, with up to a year of all detections encountered
  • Enriched Data Archive: Optional offline replica of enriched telemetry is available for archive, compliance requirements and additional analytics

Threat Graph Solution Brief

Technical Center

For technical information on the installation, policy configuration and more, please visit the CrowdStrike Tech Center.

  • Technical Center
  • Technical Center
  • Technical Center
Learn More

Product Validation

Customers Trust CrowdStrike

Third-Party Validation

Since 2016, CrowdStrike has demonstrated a strong commitment to continuous industry collaboration, scrutiny, and testing. Time and time again, CrowdStrike has been independently certified to replace legacy solutions.

  • Positioned as a Leader

    Download this complimentary report to learn the analysis behind CrowdStrike’s positioning as a Leader and what CrowdStrike believes it could mean for your organization’s cybersecurity posture.

    Read the Report

  • Named a Leader

    Read this critical report to learn why CrowdStrike was named a “Leader” in the 2019 Forrester Wave with the top ranking in strategy and high scores in 17 criteria.

    Read the Report

  • HIGHEST SCORE FOR TYPE A

    Learn why CrowdStrike scores highest overall out of 20 vendors for use case Type A or “forward leaning” organizations.

    Read the Report

Visit our third-party evaluations page to see how CrowdStrike performed against the industry’s most rigorous tests and trials.