CrowdStrike Falcon Identity Protection

A full 80% of all breaches use compromised identities. Stop breaches faster by protecting workforce identities everywhere — for any user, location, application and deployment.
Request a Demo

Benefits

REDUCE COSTS AND RISK ACROSS THE ENTERPRISE

  • FRICTIONLESS </br>SECURITY

    FRICTIONLESS
    SECURITY

    Without adding staff and/or budget, deploy Zero Trust, extend MITRE ATT&CK® coverage and stop critical threats like ransomware faster.

  • triage icon

    INSTANT
    ROI

    Reduce risk and costs by eliminating security products or processes, immediately reducing engineering headcount requirements and increasing ROI from existing tools.

  • UNIFIED CONTROL OF EVERY IDENTITY

    UNIFIED CONTROL OF EVERY IDENTITY

    Accelerate key identity projects like Conditional Access and Adaptive Authentication, and ensure better Multifactor authentication (MFA) coverage and user experience everywhere — even for legacy systems, single sign-on (SSO) and remote users.

Capabilities

Make Stopping Breaches Personal: Choose the Right Strategy

  • Falcon Zero Trust

    Falcon Zero Trust

    Enable frictionless Zero Trust security with real-time threat prevention and IT policy enforcement using identity, behavioral and risk analytics. Perfect for organizations that want an end-to-end, automated solution.

    Learn More

  • Falcon Identity Threat Detection

    Falcon Identity Threat Detection

    Realize deeper visibility for identity-based attacks and anomalies in real time without requiring ingestion of log files. Ideal for organizations that want only identity-based threat incident alerts and threat hunting, but not analytics or automated prevention of threats.

    Learn More

Use Cases

How Falcon Identity Protection Works

Secure Active Directory (AD)

Secure Active Directory (AD)

  • Gain instant visibility into AD (on-premises and cloud) and identify shadow administrators, stale accounts, shared credentials and other AD attack paths. Learn more
  • Harden AD security and reduce risks by monitoring authentication traffic and user behavior, using policies to proactively detect anomalies. Download AD hardening guide
  • Improve AD security hygiene with continuous monitoring for credential weakness, access deviations and password compromises with dynamic risk scores for every user and service account. Learn more
Secure, Frictionless Remote Access

Secure, Frictionless Remote Access

  • Gain complete visibility into the authentication activity of all accounts and endpoints (managed and unmanaged), including location information, login type (human or service accounts), source and destination, including via SSL-VPN and RDP, across on-premises and cloud deployments
  • Reduce the attack surface by identifying stealthy admins, misused service accounts and anomalous user behavior in virtual desktop infrastructure (VDI) environments making unauthorized RDP attempts
  • Protect against insider threats, privileged user threats and credential compromise from lateral movement attacks. Learn more
Extend MFA Security Everywhere

Extend MFA Security Everywhere

  • Protect unmanaged endpoints with risk-based conditional access by leveraging existing Ping and Okta deployments. Learn how a Fortune 500 company accomplished secure remote access for thousands of users in weeks
  • Extend MFA protection to legacy applications and tools using proprietary analytics on user behavior and authentication traffic
  • Block access or trigger MFA only when risk increases, securing critical applications and data and making remote access frictionless for users. Read best practices: Frictionless Zero Trust Strategy for Your Hybrid Infrastructure for Conditional Access
Falcon Identity Protection Integrations Image

INTEGRATIONS

The Falcon Identity Protection solution ensures frictionless deployment by integrating with existing security architecture, and working with existing IAM solutions and IT tools.

  • SOAR: With pre-integrations with products like Splunk Phantom and Palo Alto Network’s Cortex XSOAR, the solution works around existing infrastructure and SOC run books
  • SIEM: While the solution does not require log ingestion, the taking in of logs from SIEM, VPN and other sources can provide additional context. And, of course, the system can output logs to SIEM for compliance needs
  • SSO: Pre-integrations with Okta and Ping ensure leverage of existing SSO infrastructure to stop identity-based threats faster
  • MFA: Leverage an existing MFA solution like Duo and challenge users only when required, avoiding MFA fatigue
  • Falcon Identity Protection integrates with CyberArk, Axonius and other critical IT security tools
  • With state-of-the-art, high-performance APIs, enterprises can leverage risk scoring and other data for other systems

Request Demo

Product Validation

Customers Trust CrowdStrike

Third-Party Validation

Since 2016, CrowdStrike has demonstrated a strong commitment to continuous industry collaboration, scrutiny and testing. Time and time again, CrowdStrike has been independently certified to replace legacy solutions.

  • Gartner Peer Insights

    Easy to deploy” – CSO, $500M company, Services Industry 

    Read the Review

  • Gartner Peer Insights

    “The best line of defense for privileged access.” – CISO, $3B company, Finance Industry

    Read the Review

  • Frost & Sullivan 

    “The overall savings using Falcon Zero Trust could be as much as $5,184,000.” – Frost and Sullivan, December 2020 Zero Trust Report

    Read the Report

Visit our third-party evaluations page to see how CrowdStrike performed against the industry’s most rigorous tests and trials.