This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.

ACCEPT

RESOURCE CENTER

  • CROWDCAST

    Security at the speed of DevOps

    Best security practices in helping you move to the cloud

    REGISTER NOW
  • REPORT

    2018 CrowdStrike Global Threat Report

    Blurring the lines between Statecraft and Tradecraft

    DOWNLOAD REPORT
  • REPORT

    CrowdStrike Named Highest in Execution
    & Furthest in Vision

    In Visionaries Quadrant of 2018 Gartner Magic Quadrant for Endpoint Protection Platforms

    DOWNLOAD NOW
  • FREE TRIAL

    FALCON PREVENT 15-DAY FREE TRIAL

    Next-Generation Antivirus

    TRY FALCON PREVENT

TRY CROWDSTRIKE FALCON

CROWDSTRIKE FALCON
Cloud-Delivered Endpoint Protection

Join us to see how unified Next-Gen AV, EDR, and 24/7 threat hunting provides complete breach prevention.

JOIN A WEEKLY DEMO
START YOUR 15-DAY FREE TRIAL

FILTERS

By Resource Type:

  • ALL
  • Case Studies
  • Community Tools
  • CrowdCasts
  • Data Sheets
  • Demos
  • Free Trials
  • Infographics
  • Reports
  • Use Cases
  • Videos
  • White Papers

By Category:

  • ALL
  • Endpoint Protection
  • Incident Response
  • Managed Hunting
  • Proactive Services
  • Threat Intelligence
Security At The Speed Of DevOps

Security at the speed of DevOps

CROWDCAST

You’ve Been Breached —  Now What?

You’ve Been Breached — Now What?

WHITE PAPER

How Falcon Sandbox Improves Threat Response

How Falcon Sandbox Improves Threat Response

VIDEO

Falcon X

Falcon X

DATA SHEET

Falcon Endpoint Protection Complete

Falcon Endpoint Protection Complete

DATA SHEET

Active Directory —  The “Keys To The Kingdom”

Active Directory — The “Keys to The Kingdom”

CROWDCAST

CrowdStrike Falcon For Financial Services

CrowdStrike Falcon for Financial Services

DATA SHEET

CrowdStrike We Stop Breaches Brochure

CrowdStrike We Stop Breaches Brochure

DATA SHEET

Falcon Prevent: Next-Generation Antivirus

Falcon Prevent: Next-Generation Antivirus

DATA SHEET

Understanding The GDPR And How It Will Impact Your Organization

Understanding the GDPR and How It Will Impact Your Organization

CROWDCAST

2018 CrowdStrike Global Threat Report

2018 CrowdStrike Global Threat Report

CROWDCAST

2018 CrowdStrike Global Threat Report

2018 CrowdStrike Global Threat Report

REPORT

Indiana Farm Bureau Relies On CrowdStrike Falcon To Protect More Than Crops

Indiana Farm Bureau Relies on CrowdStrike Falcon to Protect More Than Crops

VIDEO

CASE STUDY

2018 Gartner Magic Quadrant For Endpoint Protection Platforms

2018 Gartner Magic Quadrant for Endpoint Protection Platforms

REPORT

Hear From Zebra Technologies CISO Erik Hart

Hear from Zebra Technologies CISO Erik Hart

VIDEO

CASE STUDY

“Let’s Go Threat Hunting” — Expert Tips For Enhancing Hunting In Your Organization

“Let’s Go Threat Hunting” — Expert Tips for Enhancing Hunting in your Organization

CROWDCAST

Gartner: Redefining Endpoint Protection For 2017 And 2018

Gartner: Redefining Endpoint Protection for 2017 and 2018

REPORT

Try Falcon Prevent

Try Falcon Prevent

FREE TRIALS

IDC Vendor Profile: CrowdStrike

IDC Vendor Profile: CrowdStrike

REPORT

Securing The State: Wyoming’s Partnership With CrowdStrike

Securing the State: Wyoming's Partnership with CrowdStrike

VIDEO

CASE STUDY

CASE STUDY: State Of Wyoming

CASE STUDY: State of Wyoming

CASE STUDY

CrowdStrike Falcon Insight: Endpoint Detection & Response (EDR)

CrowdStrike Falcon Insight: Endpoint Detection & Response (EDR)

DATA SHEET

CASE STUDY: Transpak

CASE STUDY: Transpak

CASE STUDY

Threat Intelligence: Cybersecurity’s Best Kept Secret

Threat Intelligence: Cybersecurity’s Best Kept Secret

WHITE PAPER

Cyber Intrusion Services Casebook 2017

Cyber Intrusion Services Casebook 2017

CROWDCAST

Cyber Intrusion Services Casebook 2017

Cyber Intrusion Services Casebook 2017

REPORT

Falcon OverWatch – Managed Threat Hunting

Falcon OverWatch - Managed Threat Hunting

DATA SHEET

Falcon Intelligence

Falcon Intelligence

DATA SHEET

“I Want To Replace My Legacy AV – But How Do I Actually Do It?”

“I want to replace my legacy AV - but how do I actually do it?”

CROWDCAST

Maximizing Efficacy With Cloud-Delivered Endpoint Security

Maximizing Efficacy with Cloud-Delivered Endpoint Security

INFOGRAPHIC

How Fileless Ransomware Works

How Fileless Ransomware Works

INFOGRAPHIC

How An End-to-End Fileless Attack Unfolds

How an End-to-End Fileless Attack Unfolds

INFOGRAPHIC

The GDPR General Data Protection Regulation And Cybersecurity

The GDPR General Data Protection Regulation and Cybersecurity

WHITE PAPER

State Of The Endpoint 2017

State of the Endpoint 2017

WHITE PAPER

CROWDSTRIKE FALCON: SETTING THE NEW STANDARD IN ENDPOINT PROTECTION (EPP)

CROWDSTRIKE FALCON: SETTING THE NEW STANDARD IN ENDPOINT PROTECTION (EPP)

WHITE PAPER

Endpoint Detection And Response (EDR)

Endpoint Detection and Response (EDR)

WHITE PAPER

Protecting HIPAA PHI In The Age Of Advanced Targeted Cyber Threats

Protecting HIPAA PHI in the Age of Advanced Targeted Cyber Threats

WHITE PAPER

Trends In Endpoint Security: A State Of Constant Change

Trends in Endpoint Security: A State Of Constant Change

VIDEO

IT Hygiene: The “Who, What And Where” Of Endpoint Protection

IT Hygiene: The “Who, What and Where” of Endpoint Protection

WHITE PAPER

CrowdStrike Services

CrowdStrike Services

DATA SHEET

State Of The Endpoint: The Buyer Mindset

State of the Endpoint: The Buyer Mindset

CROWDCAST

How CrowdStrike Falcon Protects Against Ransomware

How CrowdStrike Falcon Protects Against Ransomware

VIDEO

SC Media Falcon Platform Review

SC Media Falcon Platform Review

REPORT

The Maturing Of Endpoint Detection And Response (EDR): Choosing The Right Solution

The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution

CROWDCAST

How Falcon Prevents Script-based Attacks

How Falcon Prevents Script-based Attacks

VIDEO

CrowdStrike Falcon MalQuery – The Faster, More Complete Malware Search Engine

CrowdStrike Falcon MalQuery – The faster, more complete malware search engine

VIDEO

NotPetya Postmortem: Ransomware, Ruse Or Targeted Takedown?

NotPetya Postmortem: Ransomware, Ruse or Targeted Takedown?

CROWDCAST

CrowdStrike Services – Incident Response

CrowdStrike Services - Incident Response

DATA SHEET

How CrowdStrike Falcon Prevents Infection And Spread Of The Destructive NotPetya Attack

How CrowdStrike Falcon Prevents Infection and Spread of the Destructive NotPetya Attack

VIDEO

Understanding Fileless Attacks And How To Stop Them

Understanding Fileless Attacks and How to Stop Them

CROWDCAST

CrowdStrike Customer Success Story: Williston Financial Group

CrowdStrike Customer Success Story: Williston Financial Group

VIDEO

CASE STUDY

How To Block Zero Day And Fileless Exploits With CrowdStrike Falcon

How to Block Zero Day and Fileless Exploits with CrowdStrike Falcon

VIDEO

Ransomware Defense: The Do’s And Don’ts

Ransomware Defense: The Do’s and Don’ts

WHITE PAPER

How To Install Falcon In The Datacenter

How to Install Falcon in the Datacenter

VIDEO

How To Navigate Falcon Discover

How to Navigate Falcon Discover

VIDEO

Cyber Extortion: Digital Shakedowns And How To Stop Them

Cyber Extortion: Digital Shakedowns and How to Stop Them

CROWDCAST

CrowdStrike Services – Proactive Services

CrowdStrike Services - Proactive Services

DATA SHEET

Falcon Discover

Falcon Discover

DATA SHEET

Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

Who Needs Malware? How Adversaries use Fileless Attacks to Evade Your Security

WHITE PAPER

An Inside Look At The WannaCry Ransomware Outbreak

An Inside Look at the WannaCry Ransomware Outbreak

CROWDCAST

How To Stop WannaCry Ransomware With CrowdStrike Falcon Endpoint Protection

How To Stop WannaCry Ransomware with CrowdStrike Falcon Endpoint Protection

VIDEO

How Falcon Prevents File-less Attacks In Your Organization

How Falcon Prevents File-less Attacks in Your Organization

VIDEO

How To Get Next-Gen AV Protection On A Mac With Falcon

How to Get Next-Gen AV Protection on a Mac with Falcon

VIDEO

Self-Guided Interactive Tour

Self-Guided Interactive Tour

CrowdStrike Falcon Platform Weekly Demo

CrowdStrike Falcon Platform Weekly Demo

CrowdStrike Falcon Prevent Weekly Demo

CrowdStrike Falcon Prevent Weekly Demo

Request 1-1 Demo Of CrowdStrike Falcon

Request 1-1 Demo of CrowdStrike Falcon

CrowdStrike Falcon Test Drive

CrowdStrike Falcon Test Drive

Cloud-Delivered Endpoint Protection Overview

Cloud-Delivered Endpoint Protection Overview

VIDEO

CrowdStrike Falcon For Public Sector

CrowdStrike Falcon for Public Sector

DATA SHEET

SANS Product Review: A New Era In Endpoint Protection CrowdCast

SANS Product Review: A New Era in Endpoint Protection CrowdCast

CROWDCAST

The Modern Attack Landscape: Featuring Verizon

The Modern Attack Landscape: Featuring Verizon

CROWDCAST

CASE STUDY: Finance

CASE STUDY: Finance

CASE STUDY

How Falcon And The “Power Of One” Eliminate System Tray Bloat

How Falcon and the “Power of One” Eliminate System Tray Bloat

VIDEO

The Rise Of Machine Learning (ML)  In Cybersecurity

The Rise of Machine Learning (ML) in Cybersecurity

WHITE PAPER

Breach Prevention Packages

Breach Prevention Packages

DATA SHEET

CrowdStrike Falcon OverWatch Tiers

CrowdStrike Falcon OverWatch Tiers

DATA SHEET

CrowdStrike Falcon API

CrowdStrike Falcon API

DATA SHEET

CrowdStrike Falcon For Data Centers

CrowdStrike Falcon for Data Centers

DATA SHEET

IDC Endpoint MarketScape Names CrowdStrike® A “Leader”

IDC Endpoint MarketScape Names CrowdStrike® a "Leader"

REPORT

Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting

Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting

CROWDCAST

Defending Against Threats Targeting The Mac Platform

Defending Against Threats Targeting the Mac Platform

CROWDCAST

Cybersecurity Assessment

Cybersecurity Assessment

DATA SHEET

CrowdStrike Compromise Assessment

CrowdStrike Compromise Assessment

DATA SHEET

Adversary Emulation

Adversary Emulation

DATA SHEET

SANS Product Review: A New Era In Endpoint Protection

SANS Product Review: A New Era In Endpoint Protection

REPORT

ANZ Security Breach Report Sponsored By CrowdStrike

ANZ Security Breach Report sponsored by CrowdStrike

REPORT

Is Ransomware Morphing Beyond The Ability Of Standard Approaches To Stop It?

Is Ransomware Morphing Beyond the Ability of Standard Approaches to Stop It?

CROWDCAST

CASE STUDY: MANUFACTURING

CASE STUDY: MANUFACTURING

CASE STUDY

CASE STUDY: HIGHER EDUCATION

CASE STUDY: HIGHER EDUCATION

CASE STUDY

Guide To AV Replacement

Guide to AV Replacement

WHITE PAPER

The Time Has Come To Replace Your Antivirus Solution

The Time Has Come to Replace Your Antivirus Solution

CROWDCAST

CASE STUDY: HEAR FROM TransPak

CASE STUDY: HEAR FROM TransPak

CASE STUDY

How Falcon Protects Off-line Hosts From New Threats

How Falcon Protects Off-line Hosts From New Threats

VIDEO

How To Get Five Second Visibility Across Your Organization With CrowdStrike Falcon Endpoint Protection

How to Get Five Second Visibility Across Your Organization with CrowdStrike Falcon Endpoint Protection

VIDEO

How CrowdStrike Stops Malicious PowerShell Downloads

How CrowdStrike Stops Malicious PowerShell Downloads

VIDEO

CrowdStrike Falcon For Healthcare

CrowdStrike Falcon for Healthcare

DATA SHEET

How Machine Learning On The Falcon Sensor Provides Better Protection

How machine learning on the Falcon sensor provides better protection

VIDEO

How To Replace Traditional AV With CrowdStrike

How to replace traditional AV with CrowdStrike

VIDEO

Healthcare Solution Brief

Healthcare Solution Brief

REPORT

Bear Hunting: History And Attribution Of Russian Intelligence Operations

Bear Hunting: History and Attribution of Russian Intelligence Operations

CROWDCAST

USE OF FANCY BEAR ANDROID MALWARE IN TRACKING OF UKRAINIAN FIELD ARTILLERY UNITS

USE OF FANCY BEAR ANDROID MALWARE IN TRACKING OF UKRAINIAN FIELD ARTILLERY UNITS

REPORT

Cloud-Enabled: The Future Of Endpoint Security

Cloud-Enabled: The Future of Endpoint Security

CROWDCAST

Installing A New CrowdStrike Falcon Sensor

Installing a New CrowdStrike Falcon Sensor

VIDEO

Intelligence App Walkthrough

Intelligence App Walkthrough

VIDEO

Activity App Walkthrough

Activity App Walkthrough

VIDEO

CROWDSTRIKE FALCON AND FFIEC COMPLIANCE

CROWDSTRIKE FALCON AND FFIEC COMPLIANCE

REPORT

CrowdStrike Cyber Intrusion Services Casebook 2016

CrowdStrike Cyber Intrusion Services Casebook 2016

REPORT

AV-Comparatives Certification: Approved NextGen Security Products

AV-Comparatives Certification: Approved NextGen Security Products

REPORT

Cyber Intrusion Services Casebook 2016

Cyber Intrusion Services Casebook 2016

CROWDCAST

Preventing Malware And Beyond

Preventing Malware and Beyond

DATA SHEET

CrowdStrike Falcon And NIST Compliance

CrowdStrike Falcon and NIST Compliance

REPORT

Stopping Breaches With Threat Graph

Stopping Breaches with Threat Graph

WHITE PAPER

CrowdStrike IR Reduces Losses For Insurance Claims

CrowdStrike IR Reduces Losses for Insurance Claims

DATA SHEET

The Forrester Wave™: Endpoint Security Suites, Q4 2016

The Forrester Wave™: Endpoint Security Suites, Q4 2016

REPORT

CASE STUDY: ENERGY

CASE STUDY: ENERGY

CASE STUDY

CASE STUDY: SEMICONDUCTOR AND ELECTRONIC COMPONENTS

CASE STUDY: SEMICONDUCTOR AND ELECTRONIC COMPONENTS

CASE STUDY

CASE STUDY: HEALTHCARE

CASE STUDY: HEALTHCARE

CASE STUDY

CASE STUDY: INSURANCE

CASE STUDY: INSURANCE

CASE STUDY

CASE STUDY: AIRLINE

CASE STUDY: AIRLINE

CASE STUDY

You Can’t Stop The Breach Without Prevention AND Detection

You Can’t Stop the Breach Without Prevention AND Detection

CROWDCAST

CrowdStrike Falcon And HIPAA Compliance

CrowdStrike Falcon and HIPAA Compliance

REPORT

Falcon Overwatch – Proactive Hunting

Falcon Overwatch - Proactive Hunting

WHITE PAPER

Cybersecurity: A Key Risk Factor In Mergers And Acquisitions

Cybersecurity: A Key Risk Factor in Mergers and Acquisitions

WHITE PAPER

Battling Unknown Malware With Machine Learning

Battling Unknown Malware with Machine Learning

CROWDCAST

CrowdStrike Falcon And PCI DSS Compliance

CrowdStrike Falcon and PCI DSS Compliance

REPORT

CrowdStrike Falcon Helps Customers Achieve Regulatory Compliance

CrowdStrike Falcon Helps Customers Achieve Regulatory Compliance

VIDEO

How To Prevent Malware With Custom Blacklisting

How to Prevent Malware With Custom Blacklisting

VIDEO

How “Next-Gen” Is Your Endpoint Protection?

How "Next-Gen" is your Endpoint Protection?

VIDEO

CrowdStrike Falcon Intelligence Report On “Boson Spider” (Core Bot Banking Trojan)

CrowdStrike Falcon Intelligence Report on “Boson Spider” (Core Bot Banking Trojan)

REPORT

Ransomware – A Growing Enterprise Threat

Ransomware - A Growing Enterprise Threat

WHITE PAPER

Next-Generation Endpoint Tool Kit

Next-Generation Endpoint Tool Kit

TOOL KIT

Using Advanced Graph Database Analytics In The Cloud To Revolutionize Endpoint Protection

Using Advanced Graph Database Analytics in the Cloud to Revolutionize Endpoint Protection

CROWDCAST

How "Next-Gen" Is Your Endpoint Protection?

How "Next-Gen" Is Your Endpoint Protection?

CROWDCAST

Solution Brief – Stakeholder Action Against Botnets

Solution Brief – Stakeholder Action Against Botnets

DATA SHEET

2015 Global Threat Report CrowdCast

2015 Global Threat Report CrowdCast

CROWDCAST

CASE STUDY: Tabletop Exercise

CASE STUDY: Tabletop Exercise

CASE STUDY

IR Policy & Playbooks

IR Policy & Playbooks

DATA SHEET

Red Team / Blue Team Exercise

Red Team / Blue Team Exercise

DATA SHEET

Orchestration And Automation (O&A)

Orchestration and Automation (O&A)

DATA SHEET

Falcon Orchestrator

Falcon Orchestrator

COMMUNITY TOOL

Ransomware Prevention

Ransomware Prevention

DATA SHEET

ACTIVE DIRECTORY SECURITY ASSESSMENT

ACTIVE DIRECTORY SECURITY ASSESSMENT

DATA SHEET

CrowdStrike Training And Education

CrowdStrike Training and Education

DATA SHEET

Falcon Connect – APIs & Integrations

Falcon Connect - APIs & Integrations

DATA SHEET

Falcon Connector

Falcon Connector

DATA SHEET

Mergers & Acquisitions – Cyber Risk Assessment

Mergers & Acquisitions - Cyber Risk Assessment

DATA SHEET

5 Reasons Endpoint Security Must Move To The Cloud

5 Reasons Endpoint Security Must Move To The Cloud

WHITE PAPER

Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches

WHITE PAPER

CASE STUDY: HEAR FROM TRIBUNE MEDIA

CASE STUDY: HEAR FROM TRIBUNE MEDIA

CASE STUDY

How To Prevent Malware With CrowdStrike Falcon

How to Prevent Malware With CrowdStrike Falcon

VIDEO

How Falcon Overwatch Works With You When A Breach Attempt Is Discovered

How Falcon Overwatch Works with You When a Breach Attempt is Discovered

VIDEO

How Falcon Overwatch Proactively Hunts For Threats In Your Environment

How Falcon Overwatch Proactively Hunts for Threats in Your Environment

VIDEO

IOC And SIEM Integrations With CrowdStrike Falcon

IOC and SIEM Integrations with CrowdStrike Falcon

VIDEO

How To Perform A Simple File Search With The CrowdStrike Falcon Investigate App

How to Perform a Simple File Search with the CrowdStrike Falcon Investigate App

VIDEO

How To Perform A Simple Machine Search With The CrowdStrike Falcon Investigate App

How to Perform a Simple Machine Search with the CrowdStrike Falcon Investigate App

VIDEO

How To Block Zero-Day And Known Exploits With CrowdStrike Falcon

How to Block Zero-Day and Known Exploits with CrowdStrike Falcon

VIDEO

How To Detect And Prevent Malware-Free Attacks With CrowdStrike Falcon

How to Detect and Prevent Malware-Free Attacks with CrowdStrike Falcon

VIDEO

Falcon Orchestrator Demo With Evan Burns

Falcon Orchestrator Demo With Evan Burns

VIDEO

CrowdStrike 2016 Spring Product Release

CrowdStrike 2016 Spring Product Release

VIDEO

How To Hunt For Threat Activity With CrowdStrike Falcon Endpoint Protection

How to Hunt for Threat Activity with CrowdStrike Falcon Endpoint Protection

VIDEO

How To Network Contain An Infected System With Falcon

How to Network Contain an Infected System with Falcon

VIDEO

How To Install The CrowdStrike Falcon Sensor

How to Install the CrowdStrike Falcon Sensor

VIDEO

CrowdStrike Falcon: The Breach Prevention Platform

CrowdStrike Falcon: The Breach Prevention Platform

VIDEO

CrowdStrike Launches Open Source Initiative

CrowdStrike Launches Open Source Initiative

VIDEO

CrowdStrike Falcon Ransomware Protection

CrowdStrike Falcon Ransomware Protection

VIDEO

Red Team Exercises And Simulations Overview

Red Team Exercises and Simulations Overview

DATA SHEET

CASE STUDY: INTERNATIONAL REPUBLICAN INSTITUTE

CASE STUDY: INTERNATIONAL REPUBLICAN INSTITUTE

CASE STUDY

CrowdStrike Cyber Intrusion Services Casebook

CrowdStrike Cyber Intrusion Services Casebook

REPORT

CrowdStrike Services – Tabletop Exercises

CrowdStrike Services - Tabletop Exercises

DATA SHEET

OPTIV Solution Spotlight – Next-Generation Endpoint Strategy

OPTIV Solution Spotlight – Next-Generation Endpoint Strategy

WHITE PAPER

Proactive Prevention: Getting Ahead Of The Adversary

Proactive Prevention: Getting Ahead of the Adversary

USE CASE

Beyond Malware: The Next-Generation In Endpoint Protection

Beyond Malware: The Next-Generation in Endpoint Protection

USE CASE

Enabling Proactive Hunting For Threats

Enabling Proactive Hunting for Threats

USE CASE

Achieving True Endpoint Visibility

Achieving True Endpoint Visibility

USE CASE

Cyber Attack Survival Checklist

Cyber Attack Survival Checklist

WHITE PAPER

Beyond Malware: Detecting The Undetectable

Beyond Malware: Detecting the Undetectable

WHITE PAPER

CASE STUDY: HEAR FROM CARDINAL INNOVATIONS

CASE STUDY: HEAR FROM CARDINAL INNOVATIONS

CASE STUDY

CASE STUDY: HEAR FROM RACKSPACE

CASE STUDY: HEAR FROM RACKSPACE

CASE STUDY

Indicators Of Attack Vs. Indicators Of Compromise

Indicators of Attack vs. Indicators of Compromise

WHITE PAPER

CASE STUDY: CARDINAL INNOVATIONS HEALTHCARE SOLUTIONS

CASE STUDY: CARDINAL INNOVATIONS HEALTHCARE SOLUTIONS

CASE STUDY

CrowdStrike Heartbleed Scanner

CrowdStrike Heartbleed Scanner

COMMUNITY TOOL

CrowdStrike ShellShock Scanner

CrowdStrike ShellShock Scanner

COMMUNITY TOOL

CrowdResponse

CrowdResponse

COMMUNITY TOOL

CrowdDetox

CrowdDetox

COMMUNITY TOOL

Tortilla

Tortilla

COMMUNITY TOOL

CrowdInspect

CrowdInspect

COMMUNITY TOOL

 

Stop Breaches With CrowdStrike Falcon Request A Demo