This website uses cookies to enhance your browsing experience. Please note that by continuing to use this site you consent to the terms of our Privacy Notice.

ACCEPT

RESOURCE CENTER

  • CROWDCAST

    A Day in the Life of a SOC Analyst

    Streamlining security operations and incident investigations with Falcon X

    DOWNLOAD NOW
  • CROWDCAST

    Incident Response Declassified

    Key trends and lessons for cybersecurity attorneys and what it all means for your clients

    DOWNLAOD NOW
  • REPORT

    2018 FORRESTER WAVE™: EDR

    CrowdStrike named a “leader” with the top ranking in the “current offering,” “market presence” and “strategy”(tied) categories, and the highest possible score in 14 criteria

    DOWNLOAD NOW
  • REPORT

    2018 FORRESTER WAVE™: ENDPOINT SECURITY SUITES

    CrowdStrike a "Leader" in Forrester Wave™: Endpoint Security Suites, Q2 2018

    DOWNLOAD REPORT
  • GARTNER CRITICAL CAPABILITIES FOR EPP
    REPORT

    GARTNER CRITICAL CAPABILITIES FOR EPP

    CrowdStrike scores highest for use case Type A

    ACCESS REPORT
  • REPORT

    CrowdStrike Named Highest in Execution
    & Furthest in Vision

    In Visionaries Quadrant of 2018 Gartner Magic Quadrant for Endpoint Protection Platforms

    DOWNLOAD NOW
  • FREE TRIAL

    FALCON PREVENT 15-DAY FREE TRIAL

    Next-Generation Antivirus

    TRY FALCON PREVENT

TRY CROWDSTRIKE FALCON

CROWDSTRIKE FALCON
Cloud-Delivered Endpoint Protection

Join us to see how unified Next-Gen AV, EDR, and 24/7 threat hunting provides complete breach prevention.

CrowdStrike Falcon Platform
On-Demand Demo

START YOUR 15-DAY FREE TRIAL

FILTERS

By Resource Type:

  • ALL
  • Case Studies
  • Community Tools
  • CrowdCasts
  • Data Sheets
  • Demos
  • Free Trials
  • Infographics
  • Reports
  • Use Cases
  • Videos
  • White Papers

By Category:

  • ALL
  • Endpoint Protection
  • Incident Response
  • Managed Hunting
  • Proactive Services
  • Threat Intelligence
CrowdStrike Falcon Complete: Instant Cybersecurity Maturity For Organizations Of All Sizes

CrowdStrike Falcon Complete: Instant Cybersecurity Maturity for Organizations of all Sizes

WHITE PAPER

SC Media Falcon Platform Review

SC Media Falcon Platform Review

REPORT

Falcon Spotlight

Falcon Spotlight

DATA SHEET

The Menace Of Business Email Compromise

The Menace of Business Email Compromise

CROWDCAST

IDC Case Study: Enhancing Endpoint Security Efficacy: A Top 10 Global Financial Institution’s Experience

IDC Case Study: Enhancing Endpoint Security Efficacy: A Top 10 Global Financial Institution's Experience

CASE STUDY

Commercial Bank, Qatar CISO Edward Ganom On Why He Trusts CrowdStrike

Commercial Bank, Qatar CISO Edward Ganom On Why He Trusts CrowdStrike

VIDEO

CASE STUDY

A Day In The Life Of A SOC Analyst

A Day in the Life of a SOC Analyst

CROWDCAST

Supporting Government Missions

Supporting Government Missions

CROWDCAST

Law Firm Webcast: Incident Response Under Privilege

Law Firm Webcast: Incident Response Under Privilege

CROWDCAST

CrowdStrike Falcon On GovCloud

CrowdStrike Falcon on GovCloud

DATA SHEET

Falcon Device Control

Falcon Device Control

DATA SHEET

Seizing Control Of Software Supply Chain Security

Seizing Control of Software Supply Chain Security

REPORT

Falcon X

Falcon X

DATA SHEET

Getting On Board With Cybersecurity

Getting On Board with Cybersecurity

WHITE PAPER

VIDEO: Falcon Prevent Free Trial

VIDEO: Falcon Prevent Free Trial

VIDEO

Cybercrime, Cults And Confraternities: The Evolution Of Nigerian 419 Email Scams

Cybercrime, Cults and Confraternities: The Evolution of Nigerian 419 Email Scams

CROWDCAST

GDPR: Myths And Urban Legends

GDPR: Myths and Urban Legends

CROWDCAST

Falcon Discover For AWS Solution Brief

Falcon Discover for AWS Solution Brief

REPORT

Falcon Discover For AWS

Falcon Discover for AWS

DATA SHEET

The 1/10/60 Minute Challenge: A Framework For Stopping Breaches Faster

The 1/10/60 Minute Challenge: A Framework for Stopping Breaches Faster

CROWDCAST

Forrester Wave™:  Endpoint Detection And Response, Q3 2018

Forrester Wave™: Endpoint Detection and Response, Q3 2018

REPORT

TRY CROWDSTRIKE® FALCON® PREVENT™ FREE FOR 15 DAYS

TRY CROWDSTRIKE® FALCON® PREVENT™ FREE FOR 15 DAYS

VIDEO

2018 SANS Endpoint Protection And Response Survey

2018 SANS Endpoint Protection and Response Survey

REPORT

The Forrester Wave™: Endpoint Security Suites, Q2 2018

The Forrester Wave™: Endpoint Security Suites, Q2 2018

REPORT

Going Far Beyond Antivirus

Going Far Beyond Antivirus

CROWDCAST

Gartner Critical Capabilities For Endpoint Protection Platforms (EPP)

Gartner Critical Capabilities for Endpoint Protection Platforms (EPP)

REPORT

Cloud Security Assessment Datasheet

Cloud Security Assessment Datasheet

DATA SHEET

CrowdStrike CEO George Kurtz: Commitment In Business And On The Race Track

CrowdStrike CEO George Kurtz: Commitment in Business and on the Race Track

VIDEO

Rethinking Risk Management: How CrowdStrike Falcon Aligns With The CIS Critical Controls

Rethinking Risk Management: How CrowdStrike Falcon Aligns with the CIS Critical Controls

WHITE PAPER

How Real Time Response Empowers Incident Response

How Real Time Response Empowers Incident Response

VIDEO

Can Small And Midsize Organizations Get The Same Level Of Endpoint Protection As The Big Guys?

Can Small and Midsize Organizations Get the Same Level of Endpoint Protection as the Big Guys?

CROWDCAST

The Evolving World Of Threat Intelligence

The evolving world of threat intelligence

CROWDCAST

CrowdStrike Falcon Intelligence Report On Nigerian Business Email-Compromise Threat

CrowdStrike Falcon Intelligence Report on Nigerian Business Email-Compromise Threat

REPORT

SCHOOL DISTRICT STOPS MALWARE OUTBREAK WITH CROWDSTRIKE SERVICES

SCHOOL DISTRICT STOPS MALWARE OUTBREAK WITH CROWDSTRIKE SERVICES

VIDEO

CASE STUDY

Guidance For Maturing Your Cyber Defenses

Guidance For Maturing Your Cyber Defenses

WHITE PAPER

Cybersecurity For The SMB

Cybersecurity for the SMB

WHITE PAPER

CrowdStrike Antivirus Resource Monitor

CrowdStrike Antivirus Resource Monitor

COMMUNITY TOOL

Security At The Speed Of DevOps

Security at the speed of DevOps

CROWDCAST

You’ve Been Breached —  Now What?

You’ve Been Breached — Now What?

WHITE PAPER

How Falcon Sandbox Improves Threat Response

How Falcon Sandbox Improves Threat Response

VIDEO

Falcon Endpoint Protection Complete

Falcon Endpoint Protection Complete

DATA SHEET

Active Directory —  The “Keys To The Kingdom”

Active Directory — The “Keys to The Kingdom”

CROWDCAST

CrowdStrike Falcon For Financial Services

CrowdStrike Falcon for Financial Services

DATA SHEET

CrowdStrike – We Stop Breaches Brochure

CrowdStrike - We Stop Breaches Brochure

DATA SHEET

Falcon Prevent: Next-Generation Antivirus

Falcon Prevent: Next-Generation Antivirus

DATA SHEET

Understanding The GDPR And How It Will Impact Your Organization

Understanding the GDPR and How It Will Impact Your Organization

CROWDCAST

2018 CrowdStrike Global Threat Report

2018 CrowdStrike Global Threat Report

CROWDCAST

2018 CrowdStrike Global Threat Report

2018 CrowdStrike Global Threat Report

REPORT

Indiana Farm Bureau Relies On CrowdStrike Falcon To Protect More Than Crops

Indiana Farm Bureau Relies on CrowdStrike Falcon to Protect More Than Crops

VIDEO

CASE STUDY

2018 Gartner Magic Quadrant For Endpoint Protection Platforms

2018 Gartner Magic Quadrant for Endpoint Protection Platforms

REPORT

Hear From Zebra Technologies CISO Erik Hart

Hear from Zebra Technologies CISO Erik Hart

VIDEO

CASE STUDY

“Let’s Go Threat Hunting” — Expert Tips For Enhancing Hunting In Your Organization

“Let’s Go Threat Hunting” — Expert Tips for Enhancing Hunting in your Organization

CROWDCAST

Gartner: Redefining Endpoint Protection For 2017 And 2018

Gartner: Redefining Endpoint Protection for 2017 and 2018

REPORT

Try Falcon Prevent

Try Falcon Prevent

FREE TRIALS

IDC Vendor Profile: CrowdStrike

IDC Vendor Profile: CrowdStrike

REPORT

Securing The State: Wyoming’s Partnership With CrowdStrike

Securing the State: Wyoming's Partnership with CrowdStrike

VIDEO

CASE STUDY

CASE STUDY: State Of Wyoming

CASE STUDY: State of Wyoming

CASE STUDY

Falcon Insight: Endpoint Detection & Response (EDR)

Falcon Insight: Endpoint Detection & Response (EDR)

DATA SHEET

CASE STUDY: Transpak

CASE STUDY: Transpak

CASE STUDY

Threat Intelligence: Cybersecurity’s Best Kept Secret

Threat Intelligence: Cybersecurity’s Best Kept Secret

WHITE PAPER

Cyber Intrusion Services Casebook 2017

Cyber Intrusion Services Casebook 2017

CROWDCAST

Cyber Intrusion Services Casebook 2017

Cyber Intrusion Services Casebook 2017

REPORT

Falcon OverWatch – Managed Threat Hunting

Falcon OverWatch - Managed Threat Hunting

DATA SHEET

“I Want To Replace My Legacy AV – But How Do I Actually Do It?”

“I want to replace my legacy AV - but how do I actually do it?”

CROWDCAST

Maximizing Efficacy With Cloud-Delivered Endpoint Security

Maximizing Efficacy with Cloud-Delivered Endpoint Security

INFOGRAPHIC

How Fileless Ransomware Works

How Fileless Ransomware Works

INFOGRAPHIC

How An End-to-End Fileless Attack Unfolds

How an End-to-End Fileless Attack Unfolds

INFOGRAPHIC

The GDPR General Data Protection Regulation And Cybersecurity

The GDPR General Data Protection Regulation and Cybersecurity

WHITE PAPER

State Of The Endpoint 2017

State of the Endpoint 2017

WHITE PAPER

CROWDSTRIKE FALCON: SETTING THE NEW STANDARD IN ENDPOINT PROTECTION (EPP)

CROWDSTRIKE FALCON: SETTING THE NEW STANDARD IN ENDPOINT PROTECTION (EPP)

WHITE PAPER

Endpoint Detection And Response (EDR)

Endpoint Detection and Response (EDR)

WHITE PAPER

Protecting HIPAA PHI In The Age Of Advanced Targeted Cyber Threats

Protecting HIPAA PHI in the Age of Advanced Targeted Cyber Threats

WHITE PAPER

Trends In Endpoint Security: A State Of Constant Change

Trends in Endpoint Security: A State Of Constant Change

VIDEO

IT Hygiene: The “Who, What And Where” Of Endpoint Protection

IT Hygiene: The “Who, What and Where” of Endpoint Protection

WHITE PAPER

CrowdStrike Services

CrowdStrike Services

DATA SHEET

State Of The Endpoint: The Buyer Mindset

State of the Endpoint: The Buyer Mindset

CROWDCAST

How CrowdStrike Falcon Protects Against Ransomware

How CrowdStrike Falcon Protects Against Ransomware

VIDEO

The Maturing Of Endpoint Detection And Response (EDR): Choosing The Right Solution

The Maturing of Endpoint Detection and Response (EDR): Choosing the Right Solution

CROWDCAST

How Falcon Prevents Script-based Attacks

How Falcon Prevents Script-based Attacks

VIDEO

CrowdStrike Falcon MalQuery – The Faster, More Complete Malware Search Engine

CrowdStrike Falcon MalQuery – The faster, more complete malware search engine

VIDEO

NotPetya Postmortem: Ransomware, Ruse Or Targeted Takedown?

NotPetya Postmortem: Ransomware, Ruse or Targeted Takedown?

CROWDCAST

CrowdStrike Services – Incident Response

CrowdStrike Services - Incident Response

DATA SHEET

How CrowdStrike Falcon Prevents Infection And Spread Of The Destructive NotPetya Attack

How CrowdStrike Falcon Prevents Infection and Spread of the Destructive NotPetya Attack

VIDEO

Understanding Fileless Attacks And How To Stop Them

Understanding Fileless Attacks and How to Stop Them

CROWDCAST

CrowdStrike Customer Success Story: Williston Financial Group

CrowdStrike Customer Success Story: Williston Financial Group

VIDEO

CASE STUDY

How To Block Zero Day And Fileless Exploits With CrowdStrike Falcon

How to Block Zero Day and Fileless Exploits with CrowdStrike Falcon

VIDEO

Ransomware Defense: The Do’s And Don’ts

Ransomware Defense: The Do’s and Don’ts

WHITE PAPER

How To Install Falcon In The Datacenter

How to Install Falcon in the Datacenter

VIDEO

How To Navigate Falcon Discover

How to Navigate Falcon Discover

VIDEO

Cyber Extortion: Digital Shakedowns And How To Stop Them

Cyber Extortion: Digital Shakedowns and How to Stop Them

CROWDCAST

CrowdStrike Services – Proactive Services

CrowdStrike Services - Proactive Services

DATA SHEET

Falcon Discover

Falcon Discover

DATA SHEET

Who Needs Malware? How Adversaries Use Fileless Attacks To Evade Your Security

Who Needs Malware? How Adversaries use Fileless Attacks to Evade Your Security

WHITE PAPER

An Inside Look At The WannaCry Ransomware Outbreak

An Inside Look at the WannaCry Ransomware Outbreak

CROWDCAST

How To Stop WannaCry Ransomware With CrowdStrike Falcon Endpoint Protection

How To Stop WannaCry Ransomware with CrowdStrike Falcon Endpoint Protection

VIDEO

How Falcon Prevents File-less Attacks In Your Organization

How Falcon Prevents File-less Attacks in Your Organization

VIDEO

How To Get Next-Gen AV Protection On A Mac With Falcon

How to Get Next-Gen AV Protection on a Mac with Falcon

VIDEO

Self-Guided Interactive Tour

Self-Guided Interactive Tour

Watch An On-Demand Falcon Demo Sign Up Now

Watch An On-Demand Falcon Demo Sign Up Now

Request 1-1 Demo Of CrowdStrike Falcon

Request 1-1 Demo of CrowdStrike Falcon

CrowdStrike Falcon Test Drive

CrowdStrike Falcon Test Drive

Cloud-Delivered Endpoint Protection Overview

Cloud-Delivered Endpoint Protection Overview

VIDEO

CrowdStrike Falcon For Public Sector

CrowdStrike Falcon for Public Sector

DATA SHEET

SANS Product Review: A New Era In Endpoint Protection CrowdCast

SANS Product Review: A New Era in Endpoint Protection CrowdCast

CROWDCAST

The Modern Attack Landscape: Featuring Verizon

The Modern Attack Landscape: Featuring Verizon

CROWDCAST

CASE STUDY: Finance

CASE STUDY: Finance

CASE STUDY

How Falcon And The “Power Of One” Eliminate System Tray Bloat

How Falcon and the “Power of One” Eliminate System Tray Bloat

VIDEO

The Rise Of Machine Learning (ML)  In Cybersecurity

The Rise of Machine Learning (ML) in Cybersecurity

WHITE PAPER

Falcon OverWatch Tiers

Falcon OverWatch Tiers

DATA SHEET

CrowdStrike Falcon API

CrowdStrike Falcon API

DATA SHEET

CrowdStrike Falcon For Data Centers

CrowdStrike Falcon for Data Centers

DATA SHEET

IDC Endpoint MarketScape Names CrowdStrike® A “Leader”

IDC Endpoint MarketScape Names CrowdStrike® a "Leader"

REPORT

Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting

Proactive Threat Hunting: Game-Changing Endpoint Protection Beyond Alerting

CROWDCAST

Defending Against Threats Targeting The Mac Platform

Defending Against Threats Targeting the Mac Platform

CROWDCAST

Cybersecurity Assessment

Cybersecurity Assessment

DATA SHEET

CrowdStrike Compromise Assessment

CrowdStrike Compromise Assessment

DATA SHEET

Adversary Emulation

Adversary Emulation

DATA SHEET

SANS Product Review: A New Era In Endpoint Protection

SANS Product Review: A New Era In Endpoint Protection

REPORT

ANZ Security Breach Report Sponsored By CrowdStrike

ANZ Security Breach Report sponsored by CrowdStrike

REPORT

Is Ransomware Morphing Beyond The Ability Of Standard Approaches To Stop It?

Is Ransomware Morphing Beyond the Ability of Standard Approaches to Stop It?

CROWDCAST

CASE STUDY: MANUFACTURING

CASE STUDY: MANUFACTURING

CASE STUDY

CASE STUDY: HIGHER EDUCATION

CASE STUDY: HIGHER EDUCATION

CASE STUDY

Guide To AV Replacement

Guide to AV Replacement

WHITE PAPER

The Time Has Come To Replace Your Antivirus Solution

The Time Has Come to Replace Your Antivirus Solution

CROWDCAST

CASE STUDY: HEAR FROM TransPak

CASE STUDY: HEAR FROM TransPak

CASE STUDY

How Falcon Protects Off-line Hosts From New Threats

How Falcon Protects Off-line Hosts From New Threats

VIDEO

How To Get Five Second Visibility Across Your Organization With CrowdStrike Falcon Endpoint Protection

How to Get Five Second Visibility Across Your Organization with CrowdStrike Falcon Endpoint Protection

VIDEO

How CrowdStrike Stops Malicious PowerShell Downloads

How CrowdStrike Stops Malicious PowerShell Downloads

VIDEO

CrowdStrike Falcon For Healthcare

CrowdStrike Falcon for Healthcare

DATA SHEET

How Machine Learning On The Falcon Sensor Provides Better Protection

How machine learning on the Falcon sensor provides better protection

VIDEO

How To Replace Traditional AV With CrowdStrike

How to replace traditional AV with CrowdStrike

VIDEO

Cybersecurity Prescription For Healthcare Organizations

Cybersecurity Prescription for Healthcare Organizations

REPORT

Bear Hunting: History And Attribution Of Russian Intelligence Operations

Bear Hunting: History and Attribution of Russian Intelligence Operations

CROWDCAST

USE OF FANCY BEAR ANDROID MALWARE IN TRACKING OF UKRAINIAN FIELD ARTILLERY UNITS

USE OF FANCY BEAR ANDROID MALWARE IN TRACKING OF UKRAINIAN FIELD ARTILLERY UNITS

REPORT

Cloud-Enabled: The Future Of Endpoint Security

Cloud-Enabled: The Future of Endpoint Security

CROWDCAST

Installing A New CrowdStrike Falcon Sensor

Installing a New CrowdStrike Falcon Sensor

VIDEO

Intelligence App Walkthrough

Intelligence App Walkthrough

VIDEO

Activity App Walkthrough

Activity App Walkthrough

VIDEO

CROWDSTRIKE FALCON AND FFIEC COMPLIANCE

CROWDSTRIKE FALCON AND FFIEC COMPLIANCE

REPORT

CrowdStrike Cyber Intrusion Services Casebook 2016

CrowdStrike Cyber Intrusion Services Casebook 2016

REPORT

AV-Comparatives Certification: Approved NextGen Security Products

AV-Comparatives Certification: Approved NextGen Security Products

REPORT

Cyber Intrusion Services Casebook 2016

Cyber Intrusion Services Casebook 2016

CROWDCAST

Preventing Malware And Beyond

Preventing Malware and Beyond

DATA SHEET

CrowdStrike Falcon And NIST Compliance

CrowdStrike Falcon and NIST Compliance

REPORT

Stopping Breaches With Threat Graph

Stopping Breaches with Threat Graph

WHITE PAPER

CrowdStrike IR Reduces Losses For Insurance Claims

CrowdStrike IR Reduces Losses for Insurance Claims

DATA SHEET

The Forrester Wave™: Endpoint Security Suites, Q4 2016

The Forrester Wave™: Endpoint Security Suites, Q4 2016

REPORT

CASE STUDY: ENERGY

CASE STUDY: ENERGY

CASE STUDY

CASE STUDY: SEMICONDUCTOR AND ELECTRONIC COMPONENTS

CASE STUDY: SEMICONDUCTOR AND ELECTRONIC COMPONENTS

CASE STUDY

CASE STUDY: HEALTHCARE

CASE STUDY: HEALTHCARE

CASE STUDY

CASE STUDY: INSURANCE

CASE STUDY: INSURANCE

CASE STUDY

CASE STUDY: AIRLINE

CASE STUDY: AIRLINE

CASE STUDY

You Can’t Stop The Breach Without Prevention AND Detection

You Can’t Stop the Breach Without Prevention AND Detection

CROWDCAST

CrowdStrike Falcon And HIPAA Compliance

CrowdStrike Falcon and HIPAA Compliance

REPORT

Falcon Overwatch – Proactive Hunting

Falcon Overwatch - Proactive Hunting

WHITE PAPER

Cybersecurity: A Key Risk Factor In Mergers And Acquisitions

Cybersecurity: A Key Risk Factor in Mergers and Acquisitions

WHITE PAPER

Battling Unknown Malware With Machine Learning

Battling Unknown Malware with Machine Learning

CROWDCAST

CrowdStrike Falcon And PCI DSS Compliance

CrowdStrike Falcon and PCI DSS Compliance

REPORT

CrowdStrike Falcon Helps Customers Achieve Regulatory Compliance

CrowdStrike Falcon Helps Customers Achieve Regulatory Compliance

VIDEO

How To Prevent Malware With Custom Blacklisting

How to Prevent Malware With Custom Blacklisting

VIDEO

How “Next-Gen” Is Your Endpoint Protection?

How "Next-Gen" is your Endpoint Protection?

VIDEO

CrowdStrike Falcon Intelligence Report On “Boson Spider” (Core Bot Banking Trojan)

CrowdStrike Falcon Intelligence Report on “Boson Spider” (Core Bot Banking Trojan)

REPORT

Ransomware – A Growing Enterprise Threat

Ransomware - A Growing Enterprise Threat

WHITE PAPER

Next-Generation Endpoint Tool Kit

Next-Generation Endpoint Tool Kit

TOOL KIT

Using Advanced Graph Database Analytics In The Cloud To Revolutionize Endpoint Protection

Using Advanced Graph Database Analytics in the Cloud to Revolutionize Endpoint Protection

CROWDCAST

How "Next-Gen" Is Your Endpoint Protection?

How "Next-Gen" Is Your Endpoint Protection?

CROWDCAST

Solution Brief – Stakeholder Action Against Botnets

Solution Brief – Stakeholder Action Against Botnets

DATA SHEET

2015 Global Threat Report CrowdCast

2015 Global Threat Report CrowdCast

CROWDCAST

CASE STUDY: Tabletop Exercise

CASE STUDY: Tabletop Exercise

CASE STUDY

IR Policy & Playbooks

IR Policy & Playbooks

DATA SHEET

Red Team / Blue Team Exercise

Red Team / Blue Team Exercise

DATA SHEET

Orchestration And Automation (O&A)

Orchestration and Automation (O&A)

DATA SHEET

Falcon Orchestrator

Falcon Orchestrator

COMMUNITY TOOL

Ransomware Prevention

Ransomware Prevention

DATA SHEET

ACTIVE DIRECTORY SECURITY ASSESSMENT

ACTIVE DIRECTORY SECURITY ASSESSMENT

DATA SHEET

CrowdStrike Training And Education

CrowdStrike Training and Education

DATA SHEET

Falcon Connect – APIs & Integrations

Falcon Connect - APIs & Integrations

DATA SHEET

Falcon Connector

Falcon Connector

DATA SHEET

Mergers & Acquisitions – Cyber Risk Assessment

Mergers & Acquisitions - Cyber Risk Assessment

DATA SHEET

5 Reasons Endpoint Security Must Move To The Cloud

5 Reasons Endpoint Security Must Move To The Cloud

WHITE PAPER

Beyond PII & IP Theft: New Proactive Strategies For Stopping Damaging Breaches

Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches

WHITE PAPER

CASE STUDY: HEAR FROM TRIBUNE MEDIA

CASE STUDY: HEAR FROM TRIBUNE MEDIA

CASE STUDY

How To Prevent Malware With CrowdStrike Falcon

How to Prevent Malware With CrowdStrike Falcon

VIDEO

How Falcon Overwatch Works With You When A Breach Attempt Is Discovered

How Falcon Overwatch Works with You When a Breach Attempt is Discovered

VIDEO

How Falcon Overwatch Proactively Hunts For Threats In Your Environment

How Falcon Overwatch Proactively Hunts for Threats in Your Environment

VIDEO

IOC And SIEM Integrations With CrowdStrike Falcon

IOC and SIEM Integrations with CrowdStrike Falcon

VIDEO

How To Perform A Simple File Search With The CrowdStrike Falcon Investigate App

How to Perform a Simple File Search with the CrowdStrike Falcon Investigate App

VIDEO

How To Perform A Simple Machine Search With The CrowdStrike Falcon Investigate App

How to Perform a Simple Machine Search with the CrowdStrike Falcon Investigate App

VIDEO

How To Block Zero-Day And Known Exploits With CrowdStrike Falcon

How to Block Zero-Day and Known Exploits with CrowdStrike Falcon

VIDEO

How To Detect And Prevent Malware-Free Attacks With CrowdStrike Falcon

How to Detect and Prevent Malware-Free Attacks with CrowdStrike Falcon

VIDEO

Falcon Orchestrator Demo With Evan Burns

Falcon Orchestrator Demo With Evan Burns

VIDEO

CrowdStrike 2016 Spring Product Release

CrowdStrike 2016 Spring Product Release

VIDEO

How To Hunt For Threat Activity With CrowdStrike Falcon Endpoint Protection

How to Hunt for Threat Activity with CrowdStrike Falcon Endpoint Protection

VIDEO

How To Network Contain An Infected System With Falcon

How to Network Contain an Infected System with Falcon

VIDEO

How To Install The CrowdStrike Falcon Sensor

How to Install the CrowdStrike Falcon Sensor

VIDEO

CrowdStrike Falcon: The Breach Prevention Platform

CrowdStrike Falcon: The Breach Prevention Platform

VIDEO

CrowdStrike Launches Open Source Initiative

CrowdStrike Launches Open Source Initiative

VIDEO

CrowdStrike Falcon Ransomware Protection

CrowdStrike Falcon Ransomware Protection

VIDEO

Red Team Exercises And Simulations Overview

Red Team Exercises and Simulations Overview

DATA SHEET

International Republican Institute

International Republican Institute

CASE STUDY

CrowdStrike Cyber Intrusion Services Casebook

CrowdStrike Cyber Intrusion Services Casebook

REPORT

CrowdStrike Services – Tabletop Exercises

CrowdStrike Services - Tabletop Exercises

DATA SHEET

OPTIV Solution Spotlight – Next-Generation Endpoint Strategy

OPTIV Solution Spotlight – Next-Generation Endpoint Strategy

WHITE PAPER

Proactive Prevention: Getting Ahead Of The Adversary

Proactive Prevention: Getting Ahead of the Adversary

USE CASE

Beyond Malware: The Next-Generation In Endpoint Protection

Beyond Malware: The Next-Generation in Endpoint Protection

USE CASE

Enabling Proactive Hunting For Threats

Enabling Proactive Hunting for Threats

USE CASE

Achieving True Endpoint Visibility

Achieving True Endpoint Visibility

USE CASE

Cyber Attack Survival Checklist

Cyber Attack Survival Checklist

WHITE PAPER

Beyond Malware: Detecting The Undetectable

Beyond Malware: Detecting the Undetectable

WHITE PAPER

CASE STUDY: HEAR FROM CARDINAL INNOVATIONS

CASE STUDY: HEAR FROM CARDINAL INNOVATIONS

CASE STUDY

CASE STUDY: HEAR FROM RACKSPACE

CASE STUDY: HEAR FROM RACKSPACE

CASE STUDY

Indicators Of Attack Vs. Indicators Of Compromise

Indicators of Attack vs. Indicators of Compromise

WHITE PAPER

CASE STUDY: CARDINAL INNOVATIONS HEALTHCARE SOLUTIONS

CASE STUDY: CARDINAL INNOVATIONS HEALTHCARE SOLUTIONS

CASE STUDY

CrowdStrike Heartbleed Scanner

CrowdStrike Heartbleed Scanner

COMMUNITY TOOL

CrowdStrike ShellShock Scanner

CrowdStrike ShellShock Scanner

COMMUNITY TOOL

CrowdResponse

CrowdResponse

COMMUNITY TOOL

CrowdDetox

CrowdDetox

COMMUNITY TOOL

Tortilla

Tortilla

COMMUNITY TOOL

CrowdInspect

CrowdInspect

COMMUNITY TOOL

 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial