This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.

ACCEPT
Experienced a Breach?

NEED IMMEDIATE ASSISTANCE?
Contact Us for Pre and Post Incident Response Services

855.276.9347

Learn More

RESOURCE CENTER

  • CROWDCAST

    Cloud-Enabled: The Future of Endpoint Security

    The Advantages of Endpoint Protection Purpose-Built For The Cloud

    REGISTER NOW
  • REPORT

    CrowdStrike Cyber Intrusion
    Services Casebook 2016

    Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016

    DOWNLOAD REPORT
  • REPORT

    FORRESTER WAVE: ENDPOINT SECURITY SUITES

    CrowdStrike Gets Perfect Score in Attack Detection, Threat Intel, & Architecture

    DOWNLOAD REPORT
  • WHITE PAPER

    RANSOMWARE: A GROWING ENTERPRISE THREAT

    A deep dive into ransomware's evolution and why businesses can't afford to ignore it

    DOWNLOAD WHITEPAPER

LIVE DEMOS

CROWDSTRIKE FALCON
Cloud - Delivered Endpoint Protection

Join us live to see how unified Next-Gen AV, EDR, and 24/7 threat hunting provides complete breach prevention

RESERVE YOUR SPOT NOW

FILTERS

By Resource Type:

  • ALL
  • Case Studies
  • Community Tools
  • CrowdCasts
  • Data Sheets
  • Reports
  • Tool Kit
  • Use Cases
  • Videos
  • White Papers

By Category:

  • ALL
  • Endpoint Protection
  • Incident Response
  • Managed Hunting
  • Proactive Services
  • Threat Intelligence
Healthcare Solution Brief

Healthcare Solution Brief

REPORT

Bear Hunting: History And Attribution Of Russian Intelligence Operations

Bear Hunting: History and Attribution of Russian Intelligence Operations

CROWDCAST

USE OF FANCY BEAR ANDROID MALWARE IN TRACKING OF UKRAINIAN FIELD ARTILLERY UNITS

USE OF FANCY BEAR ANDROID MALWARE IN TRACKING OF UKRAINIAN FIELD ARTILLERY UNITS

REPORT

Cloud-Enabled: The Future Of Endpoint Security

Cloud-Enabled: The Future of Endpoint Security

CROWDCAST

IDC Vendor Profile: CrowdStrike

IDC Vendor Profile: CrowdStrike

REPORT

The GUI Differences In The New Falcon Host UI (Release Nov 2016)

The GUI Differences in the new Falcon Host UI (Release Nov 2016)

VIDEO

Installing A New Falcon Host Sensor

Installing a New Falcon Host Sensor

VIDEO

Intelligence App Walkthrough

Intelligence App Walkthrough

VIDEO

Activity App Walkthrough

Activity App Walkthrough

VIDEO

The Time Has Come To Replace Your Antivirus Solution

The Time Has Come to Replace Your Antivirus Solution

CROWDCAST

CROWDSTRIKE FALCON HOST AND FFIEC COMPLIANCE

CROWDSTRIKE FALCON HOST AND FFIEC COMPLIANCE

REPORT

CrowdStrike Cyber Intrusion Services Casebook 2016

CrowdStrike Cyber Intrusion Services Casebook 2016

REPORT

AV-Comparatives Certification: Approved NextGen Security Products

AV-Comparatives Certification: Approved NextGen Security Products

REPORT

Cyber Intrusion Services Casebook 2016

Cyber Intrusion Services Casebook 2016

CROWDCAST

Preventing Malware And Beyond

Preventing Malware and Beyond

DATA SHEET

CrowdStrike Falcon Host And NIST Compliance

CrowdStrike Falcon Host and NIST Compliance

REPORT

Stopping Breaches With Threat Graph

Stopping Breaches with Threat Graph

WHITE PAPER

CrowdStrike IR Reduces Losses For Insurance Claims

CrowdStrike IR Reduces Losses for Insurance Claims

DATA SHEET

The Forrester Wave™: Endpoint Security Suites, Q4 2016

The Forrester Wave™: Endpoint Security Suites, Q4 2016

REPORT

CASE STUDY: ENERGY

CASE STUDY: ENERGY

CASE STUDY

CASE STUDY: SEMICONDUCTOR AND ELECTRONIC COMPONENTS

CASE STUDY: SEMICONDUCTOR AND ELECTRONIC COMPONENTS

CASE STUDY

CASE STUDY: HEALTHCARE

CASE STUDY: HEALTHCARE

CASE STUDY

CASE STUDY: INSURANCE

CASE STUDY: INSURANCE

CASE STUDY

CASE STUDY: AIRLINE

CASE STUDY: AIRLINE

CASE STUDY

You Can’t Stop The Breach Without Prevention AND Detection

You Can’t Stop the Breach Without Prevention AND Detection

CROWDCAST

CrowdStrike Falcon Host And HIPAA Compliance

CrowdStrike Falcon Host and HIPAA Compliance

REPORT

Falcon Overwatch – Proactive Hunting

Falcon Overwatch - Proactive Hunting

WHITE PAPER

Cybersecurity: A Key Risk Factor In Mergers And Acquisitions

Cybersecurity: A Key Risk Factor in Mergers and Acquisitions

WHITE PAPER

Battling Unknown Malware With Machine Learning

Battling Unknown Malware with Machine Learning

CROWDCAST

CrowdStrike Falcon Host And PCI DSS Compliance

CrowdStrike Falcon Host and PCI DSS Compliance

REPORT

CrowdStrike Falcon Helps Customers Achieve Regulatory Compliance

CrowdStrike Falcon Helps Customers Achieve Regulatory Compliance

VIDEO

How To Prevent Malware With Custom Blacklisting

How to Prevent Malware With Custom Blacklisting

VIDEO

Falcon Host Datasheet

Falcon Host Datasheet

DATA SHEET

CrowdStrike Falcon Intelligence Report On “Boson Spider” (Core Bot Banking Trojan)

CrowdStrike Falcon Intelligence Report on “Boson Spider” (Core Bot Banking Trojan)

REPORT

Ransomware – A Growing Enterprise Threat

Ransomware - A Growing Enterprise Threat

WHITE PAPER

Next-Generation Endpoint Tool Kit

Next-Generation Endpoint Tool Kit

TOOL KIT

Using Advanced Graph Database Analytics In The Cloud To Revolutionize Endpoint Protection

Using Advanced Graph Database Analytics in the Cloud to Revolutionize Endpoint Protection

CROWDCAST

The Three Essential Elements Of Next-Generation Endpoint Protection

The Three Essential Elements of Next-Generation Endpoint Protection

WHITE PAPER

Using Proactive Hunting To Reveal Human Motive & Defeat Targeted Attacks

Using Proactive Hunting to Reveal Human Motive & Defeat Targeted Attacks

CROWDCAST

Is There A Cure For The Ransomware Pandemic?

Is There A Cure for the Ransomware Pandemic?

CROWDCAST

How "Next-Gen" Is Your Endpoint Protection?

How "Next-Gen" Is Your Endpoint Protection?

CROWDCAST

Breach Prevention Packages

Breach Prevention Packages

DATA SHEET

2015 Global Threat Report CrowdCast

2015 Global Threat Report CrowdCast

CROWDCAST

CrowdStrike Cyber Intrusion Services Casebook CrowdCast

CrowdStrike Cyber Intrusion Services Casebook CrowdCast

CROWDCAST

CASE STUDY: Tabletop Exercise

CASE STUDY: Tabletop Exercise

CASE STUDY

IR Policy & Playbooks

IR Policy & Playbooks

DATA SHEET

Cybersecurity Assessment

Cybersecurity Assessment

DATA SHEET

Orchestration And Automation (O&A)

Orchestration and Automation (O&A)

DATA SHEET

Falcon Orchestrator

Falcon Orchestrator

COMMUNITY TOOL

CrowdStrike We Stop Breaches Brochure

CrowdStrike We Stop Breaches Brochure

DATA SHEET

CrowdStrike Falcon Platform

CrowdStrike Falcon Platform

DATA SHEET

CrowdStrike Services

CrowdStrike Services

DATA SHEET

CrowdStrike: Falcon Intelligence

CrowdStrike: Falcon Intelligence

DATA SHEET

Falcon Overwatch – Managed Hunting

Falcon Overwatch - Managed Hunting

DATA SHEET

CrowdStrike Services – Incident Response

CrowdStrike Services - Incident Response

DATA SHEET

CrowdStrike Services – Proactive Services

CrowdStrike Services - Proactive Services

DATA SHEET

Falcon Connect – APIs & Integrations

Falcon Connect - APIs & Integrations

DATA SHEET

Falcon Connector

Falcon Connector

DATA SHEET

Mergers & Acquisitions – Cyber Risk Assessment

Mergers & Acquisitions - Cyber Risk Assessment

DATA SHEET

5 Reasons Endpoint Security Must Move To The Cloud

5 Reasons Endpoint Security Must Move To The Cloud

WHITE PAPER

Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches

WHITE PAPER

CASE STUDY: HEAR FROM TRIBUNE MEDIA

CASE STUDY: HEAR FROM TRIBUNE MEDIA

CASE STUDY

Take Dwell-Time Out Of Incident Response

Take Dwell-Time out of Incident Response

CROWDCAST

How To Prevent Malware With Falcon Host

How to Prevent Malware With Falcon Host

VIDEO

How Falcon Overwatch Works With You When A Breach Attempt Is Discovered

How Falcon Overwatch Works with You When a Breach Attempt is Discovered

VIDEO

How Falcon Overwatch Proactively Hunts For Threats In Your Environment

How Falcon Overwatch Proactively Hunts for Threats in Your Environment

VIDEO

IOC And SIEM Integrations With CrowdStrike Falcon Host

IOC and SIEM Integrations with CrowdStrike Falcon Host

VIDEO

How To Perform A Simple File Search With The CrowdStrike Falcon Host Investigate App

How to Perform a Simple File Search with the CrowdStrike Falcon Host Investigate App

VIDEO

How To Perform A Simple Machine Search With The CrowdStrike Falcon Host Investigate App

How to Perform a Simple Machine Search with the CrowdStrike Falcon Host Investigate App

VIDEO

How To Block Zero-Day And Known Exploits With CrowdStrike Falcon Host

How to Block Zero-Day and Known Exploits with CrowdStrike Falcon Host

VIDEO

How To Detect And Prevent Malware-Free Attacks With CrowdStrike Falcon Host

How to Detect and Prevent Malware-Free Attacks with CrowdStrike Falcon Host

VIDEO

Falcon Orchestrator Demo With Evan Burns

Falcon Orchestrator Demo With Evan Burns

VIDEO

CrowdStrike 2016 Spring Product Release

CrowdStrike 2016 Spring Product Release

VIDEO

How To Hunt For Threat Activity With Falcon Host Endpoint Protection

How to Hunt for Threat Activity with Falcon Host Endpoint Protection

VIDEO

How To Network Contain An Infected System With Falcon Host

How to Network Contain an Infected System with Falcon Host

VIDEO

How To Install The CrowdStrike Falcon Host Sensor

How to Install the CrowdStrike Falcon Host Sensor

VIDEO

CrowdStrike Falcon: The Breach Prevention Platform

CrowdStrike Falcon: The Breach Prevention Platform

VIDEO

CrowdStrike Launches Open Source Initiative

CrowdStrike Launches Open Source Initiative

VIDEO

Falcon Host Ransomware Protection

Falcon Host Ransomware Protection

VIDEO

2015 Global Threat Report

2015 Global Threat Report

REPORT

CrowdStrike Compromise Assessment

CrowdStrike Compromise Assessment

DATA SHEET

CASE STUDY: INTERNATIONAL REPUBLICAN INSTITUTE

CASE STUDY: INTERNATIONAL REPUBLICAN INSTITUTE

CASE STUDY

CrowdStrike Cyber Intrusion Services Casebook

CrowdStrike Cyber Intrusion Services Casebook

REPORT

CrowdStrike Services – Tabletop Exercises

CrowdStrike Services - Tabletop Exercises

DATA SHEET

OPTIV Solution Spotlight – Next-Generation Endpoint Strategy

OPTIV Solution Spotlight – Next-Generation Endpoint Strategy

WHITE PAPER

Introduction To CrowdStrike Falcon Host

Introduction to CrowdStrike Falcon Host

USE CASE

Proactive Prevention: Getting Ahead Of The Adversary

Proactive Prevention: Getting Ahead of the Adversary

USE CASE

Beyond Malware: The Next-Generation In Endpoint Protection

Beyond Malware: The Next-Generation in Endpoint Protection

USE CASE

Enabling Proactive Hunting For Threats

Enabling Proactive Hunting for Threats

USE CASE

Achieving True Endpoint Visibility

Achieving True Endpoint Visibility

USE CASE

Should I Really Trust The Cloud With My Endpoint Protection?

Should I Really Trust the Cloud with My Endpoint Protection?

CROWDCAST

Cyber Attack Survival Checklist

Cyber Attack Survival Checklist

WHITE PAPER

Beyond Malware: Detecting The Undetectable

Beyond Malware: Detecting the Undetectable

WHITE PAPER

CASE STUDY: HEAR FROM CARDINAL INNOVATIONS

CASE STUDY: HEAR FROM CARDINAL INNOVATIONS

CASE STUDY

CASE STUDY: HEAR FROM RACKSPACE

CASE STUDY: HEAR FROM RACKSPACE

CASE STUDY

Indicators Of Attack Vs. Indicators Of Compromise

Indicators of Attack vs. Indicators of Compromise

WHITE PAPER

CASE STUDY: CARDINAL INNOVATIONS HEALTHCARE SOLUTIONS

CASE STUDY: CARDINAL INNOVATIONS HEALTHCARE SOLUTIONS

CASE STUDY

Global Threat Report 2014

Global Threat Report 2014

REPORT

CrowdStrike Heartbleed Scanner

CrowdStrike Heartbleed Scanner

COMMUNITY TOOL

CrowdStrike ShellShock Scanner

CrowdStrike ShellShock Scanner

COMMUNITY TOOL

CrowdResponse

CrowdResponse

COMMUNITY TOOL

CrowdDetox

CrowdDetox

COMMUNITY TOOL

Tortilla

Tortilla

COMMUNITY TOOL

CrowdInspect

CrowdInspect

COMMUNITY TOOL

 

See How You Can Stop Breaches request a live demo