Demo Tuesdays and on-demand webinars showcasing live demonstrations of the CrowdStrike Falcon® platform in action
See Falcon Intelligence in action
Video Demo
See Falcon Exposure Management In Action
Demo
Falcon Foundry Demo
Charlotte AI in Action
Demo Video
Falcon For IT in Action
Falcon Adversary Hunter In Action
Conversations with Charlotte AI: Credential Exposure on Win10 Hosts
Conversations with Charlotte AI: Vulnerabilities on Internet-Facing Hosts
Falcon Exposure Management Asset Criticality Rules: Demo Drill Down
Protecting Against Exposed Credentials with CrowdStrike: Demo Drill Down
Conversations with Charlotte AI: Writing Search Queries
Conversations with Charlotte AI: Assessing Potential Attacks
Conversations with Charlotte AI: Rapid Assessment of Critical Detections
Conversations with Charlotte AI: At-Risk User Accounts
Conversations with Charlotte AI: Selling Stolen Credentials
Conversations with Charlotte AI: Malware Families
Conversations with Charlotte AI: Failed Login Attempts
Conversations with Charlotte AI: Adversary Exploitation
Falcon Exposure Management Security Configuration Assessment: Demo Drill Down
Falcon Identity Protection Unified Identity Protection for Hybrid Environments: Demo Drill Down
CrowdStrike Falcon Go For Small And Medium Businesses
See Falcon Fusion in Action
Falcon Exposure Management Internet Exposure Identification: Demo Drill Down
Falcon Cloud Security Enforcing Compliance: Demo Drill Down
Falcon Platform Raptor Release
Falcon Endpoint Security Real Time Response: Demo Drill Down
CrowdStrike MITRE Engenuity ATT&CK Evaluations Round 5
Falcon Exposure Management Active Asset Scanning: Demo Drill Down
Falcon Cloud Security Kubernetes Admission Controller: Demo Drill Down
Falcon LogScale Live Dashboards: Demo Drill Down
Falcon LogScale Data Enrichment: Demo Drill Down
Falcon LogScale High Speed Search: Demo Drill Down
CrowdStrike ITP Kerberoasting & Golden Ticket Attack & Defend Demo
CrowdCast Demo
ON DEMAND
Falcon Identity Protection Lateral Movement: Demo Drill Down
Falcon Identity Protection Risk-Based Conditional Access: Demo Drill Down
Falcon Identity Protection Honeytokens: Demo Drill Down
See CrowdStrike Counter Adversary Operations in action
Falcon Cloud Security Attack Path Analysis: Demo Drill Down
Falcon Cloud Security IaC Scanning: Demo Drill Down
Falcon Cloud Security 1-click: Demo Drill Down
Falcon LogScale Demo
Falcon Cloud Security Demo
See Falcon Endpoint Security in Action
Falcon Identity Protection
Ransomware Live Attack & Defend Demo
On-Demand
AWS Lateral Movement Attack Demo
Falcon Identity Protection Demo
Demo Tuesdays: Shutting down BloodHound and Mimikatz
Demo Tuesday: Don’t Compromise User Convenience OR Security When Your Team is 100% Remote
Demo Tuesday: Conditional Access for On-Premises and the Cloud
Demo Tuesday: No Logs Lateral Movement Threat Detection
Demo Tuesdays: Ping Integration
Demo Tuesdays: Threat Hunting 101
Demo Tuesdays: Building Policies to Enforce Zero Trust
Demo Tuesdays: Falcon Zero Trust Coverage of the MITRE ATT&CK
Demonstration of Falcon Endpoint Protection Pro
Demonstration of Falcon Endpoint Protection Premium
Demonstration of Falcon Endpoint Protection Enterprise
CrowdStrike Falcon® Test Drive