Data Sheet
Falcon Application Security Posture Management (ASPM)
View data sheetReports, white papers, crowdcasts, and more.
Uncover notable themes, trends and events across the cyber threat landscape.
Get the reportA Leader for the fourth consecutive time in the 2023 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.
Get the reportAll resources
Filter by
CrowdCast
Unstoppable Innovations CrowdCast Series From Red-Hot Releases to Future Roadmap
Listen to CrowdCastWhite Paper
The Power of One: lotta alla frammentazione della sicurezza informatica…
Read white paperWhite Paper
Cinque driver aziendali per il consolidamento della sicurezza informatica
Read white paperCustomer Story
SA Power Networks: Securerly Delivering Reliable Energy to South Australia
View storyWhite Paper
Unlock Proactive Exposure Management: 5 Key Elements and Why Traditional…
Read white paperCrowdCast
SEC Readiness: Demystifying the Four-Day Breach Disclosure Requirement
Listen to CrowdCastData Sheet
Falcon Cloud Security: Cloud Infrastructure Entitlement Management (CIEM) Solution Brief
View data sheetWhite Paper
Application Security Posture Management: Securing Cloud-Native Applications at Scale
Read white paperCustomer Story
Commercial Bank of California: Hardening our cloud environments against data…
View storyCrowdCast
Top 2024 Cybersecurity Trends Series – Session #2: Cybersecurity Consolidation…
Listen to CrowdCastVideo
Mesa Redonda Virtual: Descifrando la Ciberseguridad: Estrategias de los Protectores
Watch videoDemo
Falcon Identity Protection Unified Identity Protection for Hybrid Environments: Demo…
Watch demoWhite Paper
Configuraciones inadecuadas en la nube que son fácilmente explotadas y…
Read white paperWhite Paper
Safeguarding Healthcare Mergers & Acquisitions (M&A) by Integrating Cybersecurity from…
Read white paperCrowdCast
The Convergence of AI+ Cybersecurity with CrowdStrike and Abnormal Security
Listen to CrowdCastCrowdCast
Unstoppable Innovations CrowdCast Series - Session #4: Rise Above SCATTERED…
Listen to CrowdCastWhite Paper
Crafting a Battle-Tested Team with the CrowdStrike Adversary Emulation Exercise
Read white paperReport
IDC MarketScape: Worldwide Risk-Based Vulnerability Management Platforms 2023 Vendor Assessment
View reportCustomer Story
Tabcorp Partners with CrowdStrike to Drive Stronger Security from Endpoint…
View storyGuide
CrowdStrike Falcon FileVantage Add-on for Splunk Installation and Configuration Guide
View guideCrowdCast
Unstoppable Innovations CrowdCast Series - Part 2: Shut Down Adversary…
Listen to CrowdCastCrowdCast
Unstoppable Innovations CrowdCast Series - Part 1: Defeat Cloud Adversaries…
Listen to CrowdCastReport
2023 Frost Radar™ Leader: CrowdStrike’s Cloud-Native Application Protection Platform (CNAPP)
View reportWhite Paper
I principali motivi per aggiungere subito Falcon Identity Protection al…
Read white paperCustomer Story
CrowdStrike Helps Medium-Sized Business Build Robust Corporate-Class Cybersecurity Defense
View storyWhite Paper
The Power of One: Combating Cybersecurity Fragmentation with a Consolidated…
Read white paperCrowdCast
Cloud Threat SummitVirtual Event: The Rise of the Cloud-Conscious Adversary
Listen to CrowdCastCrowdCast
MITRE Engenuity ATT&CK Evaluations: Inside the Enterprise Round 5 Results
Listen to CrowdCastCrowdCast
Securing Kubernetes Across the Enterprise Without Killing Productivity
Listen to CrowdCastCustomer Story
University Health Network: Toronto Hospital Ensures Critical Protection with CrowdStrike
View storyVideo
Protegiendo la industria financiera: Identificación de amenazas, soluciones y tendencias…
Watch videoCrowdCast
Playing Defense: Lessons in Protecting Your Business Against Cyber Crime
Listen to CrowdCastWhite Paper
Easily Exploited Cloud Misconfigurations and How to Minimize Their Risks
Read white paperCustomer Story
South Australian Utility Expands CrowdStrike Protections to Bolster Defence and…
View storyCrowdCast
2023 Global Threat Report Session 1: Understanding the Threat Landscape
Listen to CrowdCastData Sheet
CrowdStrike and Abnormal Security Integration Discovers and Remediates Compromised Email…
View data sheetCustomer Story
From Endpoint to Cloud, CoreWeave Consolidates Security Stack With CrowdStrike
View storyCustomer Story
U.K. University Gains 24/7 Protection, Visibility and Response with CrowdStrike…
View storyWhite Paper
Analysis: Breaking Down the 2022 MITRE Engenuity ATT&CK Evaluations for…
Read white paperData Sheet
Protecting your cloud workloads with defense-in-depth security from CrowdStrike and…
View data sheetWhite Paper
Guía de supervivencia sobre ciberseguridad para pequeñas y medianas empresas
Read white paperWhite Paper
Guida di sopravvivenza per la sicurezza informatica delle piccole imprese
Read white paperCustomer Story
International High-Tech Company Protects IT Infrastructure with Cloud-Native CrowdStrike Security
View storyCustomer Story
Netlify Achieves Real-Time Observability at Scale with CrowdStrike Falcon LogScale
View storyCrowdCast
Best Practices for Protecting the Hybrid Workforce with a Comprehensive…
Listen to CrowdCastCrowdCast
Stop Modern Active Directory Threats with CrowdStrike, Okta, Zscaler and…
Listen to CrowdCastCustomer Story
Berkshire Bank Accelerates Digital Transformation and Multi-Channel Customer Services with…
View storyCustomer Story
Australian Utility Provider, Jemena, Chooses CrowdStrike Falcon Complete to Transform…
View storyCustomer Story
Leading Brazilian Automotive Business Saves Time and Increases Efficiency by…
View storyCustomer Story
Pella Augments In-House Security Team with CrowdStrike Managed Services and…
View storyReport
2022 Frost Radar™ Leader: Crowdstrike’s Cloud-native Application Protection Platform (CNAPP)
View reportCustomer Story
Europe Energy Protects Customer Data and Multimillion Euro Trading Transactions…
View storyCustomer Story
Brazilian Fashion and Retail Business Protects 30 Million Customers' Financial…
View storyCustomer Story
CrowdStrike Falcon LogScale at Remitly: Fintech Startup Transforms Raw Log…
View storyInfographic
Infografica Nessun posto dove nascondersi Report sul threat hunting di…
View infographicInfographic
Nowhere to Hide 2022 Falcon OverWatch Threat Hunting Report Infographic
View infographicCrowdCast
CrowdCast: Nowhere to Hide: 2022 Falcon OverWatch Threat Hunting Report
Listen to CrowdCastGuide
IT Practitioner Guide: Defending Against Ransomware with CrowdStrike and ServiceNow
View guideWhite Paper
Five Questions to Ask Before Choosing SentinelOne for Workforce Identity…
Read white paperCustomer Story
Global Data Analytics Company Builds Brand Reputation and “Bulletproof” Security…
View storyCustomer Story
Healthcare Solutions Provider Rolls Out CrowdStrike Falcon to Secure Extensive…
View storyCustomer Story
CrowdStrike Helps Engineering Consultancy Transform Protection and Reduce Time and…
View storyCrowdCast
Defeat the Adversary: Combat Advanced Supply Chain, Cloud and Identity-Based…
Listen to CrowdCastWhite Paper
Falcon OverWatch Proactive Threat Hunting Unearths IceApple Post-Exploitation Framework
Read white paperWhite Paper
Ransomware Preparedness: Insights from IT and Cybersecurity Professionals
Read white paperInfographic
CrowdStrike and AWS: A defense-in-depth approach to protecting cloud workloads
View infographicCustomer Story
CrowdStrike Helps Leading Digital Recruitment Business Protect Personal Content for…
View storyInfographic
Seis Puntos Fundamentales Para Proteger Aplicaciones Nativas De La Nube…
View infographicWhite Paper
Cinco capacidades fundamentales para protegerse del riesgo de los endpoints
Read white paperWhite Paper
Accelerate Your Cyber Insurance Initiatives with Falcon Identity Protection
Read white paperCustomer Story
Australian Utility Provider Partners With CrowdStrike to Transform Cybersecurity Defense…
View storyCrowdCast
Shared Responsibility Best Practices for Securing Public Cloud Platforms with…
Listen to CrowdCastCustomer Story
Banco Latinoamericano de Comercio Exterior, S.A. Finances LATAM Trade While…
View storyCustomer Story
Innovative HR Solutions Provider BIPO Strengthens Security Posture and Bolsters…
View storyWhite Paper
Cosa è necessario sapere per selezionare una piattaforma di protezione…
Read white paperCustomer Story
Mercedes-AMG PETRONAS Formula One Team Accelerates Security Program with CrowdStrike
View storyCustomer Story
Cushman & Wakefield Extends Visibility Into Globally Distributed Endpoints
View storyCustomer Story
CrowdStrike Helps Inductive Automation Ensure Business Continuity for Critical Industry…
View storyCustomer Story
CrowdStrike Enables Bionexo to Deliver Essential Medical Supplies to Thousands…
View storyCustomer Story
Coventry University Achieves First-Class Results with Enhanced Endpoint Security Strategy
View storyCustomer Story
Navitas Centralizes Cybersecurity to Protect the Data of Students, Staff,…
View storyCustomer Story
European Construction Supplier Repels Ransomware, Rebuilds Security Defenses
View storyCrowdCast
Accelerating the Journey Towards Zero Trust with CrowdStrike and Zscaler
Listen to CrowdCastCrowdCast
How Effective Are Your Cybersecurity Solutions Against Today’s Threats?
Listen to CrowdCastCustomer Story
BOB Financial Digitally Transformed Security to Support Growth Leveraging Cloud…
View storyCustomer Story
CTOS Protects Customer Data, Meets Strict Compliance and Expands Globally…
View storyCustomer Story
Greenhill Advises Global Finance Clients While Protecting Data With Leading…
View storyWhite Paper
CrowdStrike 2022 Falcon Cloud Security, Cloud Workload Protection Buyers Guide
Read white paperCustomer Story
Leading Eurasian Raw Materials, Building Materials and Ceramic Tile Producer…
View storyWhite Paper
Reducing the Attack Surface: Network Segmentation vs. Identity Segmentation
Read white paperWhite Paper
ESG Technical Validation: Reduce Risk with CrowdStrike Falcon® Identity Protection
Read white paperInfographic
Panoramica sulla Guida all'acquisto di una soluzione di protezione degli…
View infographicWhite Paper
Falcon Complete: Detección Y Respuesta Gestionada, Profesional Y Comprobada
Read white paperCrowdCast
The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure
Listen to CrowdCastCrowdCast
Extending Security Controls to OT Networks with Claroty and CrowdStrike
Listen to CrowdCastCrowdCast
Obsidian + CrowdStrike: Detection and Response Across Cloud and Endpoints
Listen to CrowdCastWhite Paper
GUÍA PARA COMPRADORES DE SERVICIOS GESTIONADOS DE DETECCIÓN Y RESPUESTA…
Read white paperWhite Paper
Falcon Complete: Detección y Respuesta Gestionada, Demostrada y Profesional
Read white paperCrowdCast
Reconciling Cybersecurity Risks With Industrial Digital Transformation
Listen to CrowdCastReport
CrowdStrike Intelligence Report: A Technical Analysis of the NetWalker Ransomware
View reportWhite Paper
L'evoluzione del ransomware: come proteggere le aziende dai nuovi trend…
Read white paperCrowdCast
Beyond COVID-19: Protecting People and Preventing Breaches in the “New…
Listen to CrowdCastCrowdCast
Every Second Counts: Speed & Cybersecurity with Mercedes-AMG Petronas F1…
Listen to CrowdCastCrowdCast
The 1/10/60 Minute Challenge: A Framework for Stopping Breaches Faster
Listen to CrowdCastFor technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Center.
Visit the Tech Hub