Endpoint Security of the Future
Threat Graph is the brains behind the CrowdStrike prevention platform. It provides complete real-time visibility and insight into everything happening on your endpoints throughout your environment. Using powerful graph analytics to correlate billions of events in real time, Threat Graph draws links between security events across the global CrowdStrike Falcon Host™ sensor community to immediately detect and prevent adversary activity — at scale and with unprecedented speed.
How Threat Graph Finds the 'Unknown Unknowns'
Threat Graph is a powerful and massively scalable graph database model, custom built by CrowdStrike. It’s sophisticated architecture combines patented behavioral pattern matching techniques with machine learning and artificial intelligence to look beyond file features and actually track the behaviors of every executable in your environment. This potent combination protects you from the “unknown unknowns” by identifying and blocking previously undetectable attacks, whether or not they use malware.
PROCESS, CORRELATE AND ANALYZE MORE THAN 12 BILLION EVENTS PER DAY
INVESTIGATE PETABYTES OF HISTORICAL DATA
CAPABILITIES THAT ARE ORDERS OF MAGNITUDE BEYOND WHAT EXISTING ANALYSIS PLATFORMS OFFER
CrowdStrike Threat Graph™ and You
- Fast, accurate and comprehensive
identification of threat types —
known and unknown
The massive scope and crowdsourced design of Threat Graph ensures rapid response and low FPs (false positives) in response to threats.
- Enables a level of protection
not previously achievable
Handling constantly evolving techniques and data sets, Threat Graph spans the whole attack timeline — and with the power of crowdsourcing, it gets smarter over time
- Real-time visibility and
one version of the truth
A full and comprehensive record of security events — answering questions that were previously unanswerable
- Unlocks the value of your existing security
solutions and investments
Threat Graph API enables you to make your other tools better and smarter