This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.

ACCEPT
Experienced a Breach?

NEED IMMEDIATE ASSISTANCE?

Contact Us for Pre and Post Incident Response Services

CONTACT US NOW

RESOURCE CENTER

  • CROWDCAST

    Proactive Threat Hunting: Game-Changing
    Endpoint Protection Beyond Alerting

    Falcon OverWatch Experts Hunt 24/7 To Stop Incidents Before They Become Breaches

    DOWNLOAD NOW
  • CROWDCAST

    Defending Against Threats
    Targeting the Mac Platform

    CrowdStrike Falcon with next-gen AV protects your Mac-based organization

    DOWNLOAD NOW
  • REPORT

    Gartner Magic Quadrant Report

    Gartner Names CrowdStrike a Visionary
    2017 Gartner Magic Quadrant Endpoint Protection Platforms

    GET REPORT
  • REPORT

    CrowdStrike Cyber Intrusion
    Services Casebook 2016

    Real-life examples drawn from notable CrowdStrike Services IR engagements in 2016

    DOWNLOAD REPORT

FALCON DEMO

CROWDSTRIKE FALCON
Cloud - Delivered Endpoint Protection

Join us to see how unified Next-Gen AV, EDR, and 24/7 threat hunting provides complete breach prevention

RESERVE YOUR SPOT NOW

FILTERS

By Resource Type:

  • ALL
  • Case Studies
  • Community Tools
  • CrowdCasts
  • Data Sheets
  • Reports
  • Tool Kit
  • Use Cases
  • Videos
  • White Papers

By Category:

  • ALL
  • Endpoint Protection
  • Incident Response
  • Managed Hunting
  • Proactive Services
  • Threat Intelligence
CASE STUDY: Finance

CASE STUDY: Finance

CASE STUDY

How Falcon And The “Power Of One” Eliminate System Tray Bloat

How Falcon and the “Power of One” Eliminate System Tray Bloat

VIDEO

The Rise Of Machine Learning (ML)  In Cybersecurity

The Rise of Machine Learning (ML) in Cybersecurity

WHITE PAPER

CrowdStrike Falcon Insight: Endpoint Detection & Response (EDR)

CrowdStrike Falcon Insight: Endpoint Detection & Response (EDR)

DATA SHEET

Falcon Prevent: Next-Generation Antivirus

Falcon Prevent: Next-Generation Antivirus

DATA SHEET

Falcon OverWatch – Managed Threat Hunting

Falcon OverWatch - Managed Threat Hunting

DATA SHEET

IDC Endpoint MarketScape Names CrowdStrike® A “Leader”

IDC Endpoint MarketScape Names CrowdStrike® a "Leader"

REPORT

Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting

Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting

CROWDCAST

Defending Against Threats Targeting The Mac Platform

Defending Against Threats Targeting the Mac Platform

CROWDCAST

Red Team / Blue Team Exercise

Red Team / Blue Team Exercise

DATA SHEET

Red Team Exercises And Simulations Overview

Red Team Exercises and Simulations Overview

DATA SHEET

Adversary Emulation

Adversary Emulation

DATA SHEET

ANZ Security Breach Report Sponsored By CrowdStrike

ANZ Security Breach Report sponsored by CrowdStrike

REPORT

Is Ransomware Morphing Beyond The Ability Of Standard Approaches To Stop It?

Is Ransomware Morphing Beyond the Ability of Standard Approaches to Stop It?

CROWDCAST

CASE STUDY: MANUFACTURING

CASE STUDY: MANUFACTURING

CASE STUDY

CASE STUDY: HIGHER EDUCATION

CASE STUDY: HIGHER EDUCATION

CASE STUDY

CrowdStrike We Stop Breaches Brochure

CrowdStrike We Stop Breaches Brochure

DATA SHEET

Guide To AV Replacement

Guide to AV Replacement

WHITE PAPER

The Time Has Come To Replace Your Antivirus Solution

The Time Has Come to Replace Your Antivirus Solution

CROWDCAST

CASE STUDY: HEAR FROM TransPak

CASE STUDY: HEAR FROM TransPak

CASE STUDY

How Falcon Protects Off-line Hosts From New Threats

How Falcon Protects Off-line Hosts From New Threats

VIDEO

How To Get Five Second Visibility Across Your Organization With CrowdStrike Falcon Endpoint Protection

How to Get Five Second Visibility Across Your Organization with CrowdStrike Falcon Endpoint Protection

VIDEO

How CrowdStrike Stops Malicious PowerShell Downloads

How CrowdStrike Stops Malicious PowerShell Downloads

VIDEO

How Machine Learning On The Falcon Sensor Provides Better Protection

How machine learning on the Falcon sensor provides better protection

VIDEO

How To Replace Traditional AV With CrowdStrike

How to replace traditional AV with CrowdStrike

VIDEO

Gartner Magic Quadrant Positions CrowdStrike As “Visionary”

Gartner Magic Quadrant Positions CrowdStrike as “Visionary”

REPORT

Healthcare Solution Brief

Healthcare Solution Brief

REPORT

Bear Hunting: History And Attribution Of Russian Intelligence Operations

Bear Hunting: History and Attribution of Russian Intelligence Operations

CROWDCAST

USE OF FANCY BEAR ANDROID MALWARE IN TRACKING OF UKRAINIAN FIELD ARTILLERY UNITS

USE OF FANCY BEAR ANDROID MALWARE IN TRACKING OF UKRAINIAN FIELD ARTILLERY UNITS

REPORT

Cloud-Enabled: The Future Of Endpoint Security

Cloud-Enabled: The Future of Endpoint Security

CROWDCAST

IDC Vendor Profile: CrowdStrike

IDC Vendor Profile: CrowdStrike

REPORT

Installing A New CrowdStrike Falcon Sensor

Installing a New CrowdStrike Falcon Sensor

VIDEO

Intelligence App Walkthrough

Intelligence App Walkthrough

VIDEO

Activity App Walkthrough

Activity App Walkthrough

VIDEO

CROWDSTRIKE FALCON AND FFIEC COMPLIANCE

CROWDSTRIKE FALCON AND FFIEC COMPLIANCE

REPORT

CrowdStrike Cyber Intrusion Services Casebook 2016

CrowdStrike Cyber Intrusion Services Casebook 2016

REPORT

AV-Comparatives Certification: Approved NextGen Security Products

AV-Comparatives Certification: Approved NextGen Security Products

REPORT

Cyber Intrusion Services Casebook 2016

Cyber Intrusion Services Casebook 2016

CROWDCAST

Preventing Malware And Beyond

Preventing Malware and Beyond

DATA SHEET

CrowdStrike Falcon And NIST Compliance

CrowdStrike Falcon and NIST Compliance

REPORT

Stopping Breaches With Threat Graph

Stopping Breaches with Threat Graph

WHITE PAPER

CrowdStrike IR Reduces Losses For Insurance Claims

CrowdStrike IR Reduces Losses for Insurance Claims

DATA SHEET

The Forrester Wave™: Endpoint Security Suites, Q4 2016

The Forrester Wave™: Endpoint Security Suites, Q4 2016

REPORT

CASE STUDY: ENERGY

CASE STUDY: ENERGY

CASE STUDY

CASE STUDY: SEMICONDUCTOR AND ELECTRONIC COMPONENTS

CASE STUDY: SEMICONDUCTOR AND ELECTRONIC COMPONENTS

CASE STUDY

CASE STUDY: HEALTHCARE

CASE STUDY: HEALTHCARE

CASE STUDY

CASE STUDY: INSURANCE

CASE STUDY: INSURANCE

CASE STUDY

CASE STUDY: AIRLINE

CASE STUDY: AIRLINE

CASE STUDY

You Can’t Stop The Breach Without Prevention AND Detection

You Can’t Stop the Breach Without Prevention AND Detection

CROWDCAST

CrowdStrike Falcon And HIPAA Compliance

CrowdStrike Falcon and HIPAA Compliance

REPORT

Falcon Overwatch – Proactive Hunting

Falcon Overwatch - Proactive Hunting

WHITE PAPER

Cybersecurity: A Key Risk Factor In Mergers And Acquisitions

Cybersecurity: A Key Risk Factor in Mergers and Acquisitions

WHITE PAPER

Battling Unknown Malware With Machine Learning

Battling Unknown Malware with Machine Learning

CROWDCAST

CrowdStrike Falcon And PCI DSS Compliance

CrowdStrike Falcon and PCI DSS Compliance

REPORT

CrowdStrike Falcon Helps Customers Achieve Regulatory Compliance

CrowdStrike Falcon Helps Customers Achieve Regulatory Compliance

VIDEO

How To Prevent Malware With Custom Blacklisting

How to Prevent Malware With Custom Blacklisting

VIDEO

CrowdStrike Falcon Intelligence Report On “Boson Spider” (Core Bot Banking Trojan)

CrowdStrike Falcon Intelligence Report on “Boson Spider” (Core Bot Banking Trojan)

REPORT

Ransomware – A Growing Enterprise Threat

Ransomware - A Growing Enterprise Threat

WHITE PAPER

Next-Generation Endpoint Tool Kit

Next-Generation Endpoint Tool Kit

TOOL KIT

Using Advanced Graph Database Analytics In The Cloud To Revolutionize Endpoint Protection

Using Advanced Graph Database Analytics in the Cloud to Revolutionize Endpoint Protection

CROWDCAST

The Three Essential Elements Of Next-Generation Endpoint Protection

The Three Essential Elements of Next-Generation Endpoint Protection

WHITE PAPER

Using Proactive Hunting To Reveal Human Motive & Defeat Targeted Attacks

Using Proactive Hunting to Reveal Human Motive & Defeat Targeted Attacks

CROWDCAST

How "Next-Gen" Is Your Endpoint Protection?

How "Next-Gen" Is Your Endpoint Protection?

CROWDCAST

Breach Prevention Packages

Breach Prevention Packages

DATA SHEET

2015 Global Threat Report CrowdCast

2015 Global Threat Report CrowdCast

CROWDCAST

CASE STUDY: Tabletop Exercise

CASE STUDY: Tabletop Exercise

CASE STUDY

IR Policy & Playbooks

IR Policy & Playbooks

DATA SHEET

Cybersecurity Assessment

Cybersecurity Assessment

DATA SHEET

Orchestration And Automation (O&A)

Orchestration and Automation (O&A)

DATA SHEET

Falcon Orchestrator

Falcon Orchestrator

COMMUNITY TOOL

CrowdStrike Falcon Platform

CrowdStrike Falcon Platform

DATA SHEET

CrowdStrike Services

CrowdStrike Services

DATA SHEET

CrowdStrike: Falcon Intelligence

CrowdStrike: Falcon Intelligence

DATA SHEET

CrowdStrike Services – Incident Response

CrowdStrike Services - Incident Response

DATA SHEET

CrowdStrike Services – Proactive Services

CrowdStrike Services - Proactive Services

DATA SHEET

Falcon Connect – APIs & Integrations

Falcon Connect - APIs & Integrations

DATA SHEET

Falcon Connector

Falcon Connector

DATA SHEET

Mergers & Acquisitions – Cyber Risk Assessment

Mergers & Acquisitions - Cyber Risk Assessment

DATA SHEET

5 Reasons Endpoint Security Must Move To The Cloud

5 Reasons Endpoint Security Must Move To The Cloud

WHITE PAPER

Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches

WHITE PAPER

CASE STUDY: HEAR FROM TRIBUNE MEDIA

CASE STUDY: HEAR FROM TRIBUNE MEDIA

CASE STUDY

Take Dwell-Time Out Of Incident Response

Take Dwell-Time out of Incident Response

CROWDCAST

How To Prevent Malware With CrowdStrike Falcon

How to Prevent Malware With CrowdStrike Falcon

VIDEO

How Falcon Overwatch Works With You When A Breach Attempt Is Discovered

How Falcon Overwatch Works with You When a Breach Attempt is Discovered

VIDEO

How Falcon Overwatch Proactively Hunts For Threats In Your Environment

How Falcon Overwatch Proactively Hunts for Threats in Your Environment

VIDEO

IOC And SIEM Integrations With CrowdStrike Falcon

IOC and SIEM Integrations with CrowdStrike Falcon

VIDEO

How To Perform A Simple File Search With The CrowdStrike Falcon Investigate App

How to Perform a Simple File Search with the CrowdStrike Falcon Investigate App

VIDEO

How To Perform A Simple Machine Search With The CrowdStrike Falcon Investigate App

How to Perform a Simple Machine Search with the CrowdStrike Falcon Investigate App

VIDEO

How To Block Zero-Day And Known Exploits With CrowdStrike Falcon

How to Block Zero-Day and Known Exploits with CrowdStrike Falcon

VIDEO

How To Detect And Prevent Malware-Free Attacks With CrowdStrike Falcon

How to Detect and Prevent Malware-Free Attacks with CrowdStrike Falcon

VIDEO

Falcon Orchestrator Demo With Evan Burns

Falcon Orchestrator Demo With Evan Burns

VIDEO

CrowdStrike 2016 Spring Product Release

CrowdStrike 2016 Spring Product Release

VIDEO

How To Hunt For Threat Activity With CrowdStrike Falcon Endpoint Protection

How to Hunt for Threat Activity with CrowdStrike Falcon Endpoint Protection

VIDEO

How To Network Contain An Infected System With Falcon

How to Network Contain an Infected System with Falcon

VIDEO

How To Install The CrowdStrike Falcon Sensor

How to Install the CrowdStrike Falcon Sensor

VIDEO

CrowdStrike Falcon: The Breach Prevention Platform

CrowdStrike Falcon: The Breach Prevention Platform

VIDEO

CrowdStrike Launches Open Source Initiative

CrowdStrike Launches Open Source Initiative

VIDEO

CrowdStrike Falcon Ransomware Protection

CrowdStrike Falcon Ransomware Protection

VIDEO

2015 Global Threat Report

2015 Global Threat Report

REPORT

CrowdStrike Compromise Assessment

CrowdStrike Compromise Assessment

DATA SHEET

CASE STUDY: INTERNATIONAL REPUBLICAN INSTITUTE

CASE STUDY: INTERNATIONAL REPUBLICAN INSTITUTE

CASE STUDY

CrowdStrike Cyber Intrusion Services Casebook

CrowdStrike Cyber Intrusion Services Casebook

REPORT

CrowdStrike Services – Tabletop Exercises

CrowdStrike Services - Tabletop Exercises

DATA SHEET

OPTIV Solution Spotlight – Next-Generation Endpoint Strategy

OPTIV Solution Spotlight – Next-Generation Endpoint Strategy

WHITE PAPER

Proactive Prevention: Getting Ahead Of The Adversary

Proactive Prevention: Getting Ahead of the Adversary

USE CASE

Beyond Malware: The Next-Generation In Endpoint Protection

Beyond Malware: The Next-Generation in Endpoint Protection

USE CASE

Enabling Proactive Hunting For Threats

Enabling Proactive Hunting for Threats

USE CASE

Achieving True Endpoint Visibility

Achieving True Endpoint Visibility

USE CASE

Cyber Attack Survival Checklist

Cyber Attack Survival Checklist

WHITE PAPER

Beyond Malware: Detecting The Undetectable

Beyond Malware: Detecting the Undetectable

WHITE PAPER

CASE STUDY: HEAR FROM CARDINAL INNOVATIONS

CASE STUDY: HEAR FROM CARDINAL INNOVATIONS

CASE STUDY

CASE STUDY: HEAR FROM RACKSPACE

CASE STUDY: HEAR FROM RACKSPACE

CASE STUDY

Indicators Of Attack Vs. Indicators Of Compromise

Indicators of Attack vs. Indicators of Compromise

WHITE PAPER

CASE STUDY: CARDINAL INNOVATIONS HEALTHCARE SOLUTIONS

CASE STUDY: CARDINAL INNOVATIONS HEALTHCARE SOLUTIONS

CASE STUDY

Global Threat Report 2014

Global Threat Report 2014

REPORT

CrowdStrike Heartbleed Scanner

CrowdStrike Heartbleed Scanner

COMMUNITY TOOL

CrowdStrike ShellShock Scanner

CrowdStrike ShellShock Scanner

COMMUNITY TOOL

CrowdResponse

CrowdResponse

COMMUNITY TOOL

CrowdDetox

CrowdDetox

COMMUNITY TOOL

Tortilla

Tortilla

COMMUNITY TOOL

CrowdInspect

CrowdInspect

COMMUNITY TOOL

 

Stop Breaches with CrowdStrike Falcon request a demo