Respond:
Breach Services
Breach Services
CrowdStrike Services help you stop breaches, investigate incidents, and recover from attacks with speed and surgical precision.
Service offerings
Incident Response
Incident Response
The CrowdStrike® Incident Response (IR) team works collaboratively with organizations to handle critical security incidents and forensic investigations, resolve immediate issues and implement a long-term solution to stop recurrences. The CrowdStrike team is laser-focused on getting organizations back to business faster, while at the same time, drastically reducing the financial impact of an incident.
This is accomplished by leveraging the unique CrowdStrike Falcon® cloud-native platform to identify attackers and effectively eject them from your environment. This methodology and approach cover all aspects of an incident, including providing a thorough technical investigation and ensuring containment, recovery and reporting.
Compromise Assessment
Compromise Assessment
CrowdStrike Compromise Assessment is specifically designed to identify current and past attacker activity in your environment. The Services team brings years of experience in hunting and responding to the most sophisticated intrusions by the most advanced attackers around the world. The team leverages the CrowdStrike Falcon® platform along with unmatched cyber threat intelligence and 24/7 threat hunting.
Endpoint Recovery
Endpoint Recovery
CrowdStrike’s Endpoint Recovery Services uses the Real Time Response features of the Falcon platform to gain access to compromised endpoints to kill malicious processes, delete infected files and run recovery scripts from remote locations all with minimal disruption to your users and zero downtime for your business.
Network Security Monitoring
Network Security Monitoring
CrowdStrike Network Security Monitoring utilizes both the expertise of CrowdStrike Services threat hunters and a network appliance that detects threats present in an environment. It’s easy to provision, install and use, and provides the necessary visibility to prevent new attacks. Additionally, it detects unmanaged devices and services in your environment without the burden of having to manage another agent on your endpoints.
What our customers say
"The CrowdStrike team is highly competent and customer focused. Both the Services and technology delivered on the promises made to us during the sales engagement. "
Manufacturing: Husco International
Eric Hanson - Global Vice President, Information Technology
"The team assembled for our forensic assessment engagement was outstanding. From project management to technical engagement. Everyone was exceptional. "
Healthcare: LCMC Health
David Gates - Director, Technology Operations
"There is nothing like Endpoint Recovery Services on the market right now. Endpoint Recovery Services fills the vital need for an efficient and light-weight suite of protection and remediation services with the world-class tools deployed by CrowdStrike. "
Law Firm: Lewis Brisbois Bisgaard & Smith LLP
Christopher E. Ballod - Partner
"Provide excellent support during and after the assessment. "
Manufacturing: Eaton
Jason Koler - Senior Manager, Cyber Security Incident Response
"CrowdStrike's Services team helped us through a very tense recovery situation with professionalism and courtesy. "
Public Sector: City of Knoxville
Mark Parker - Chief Technology Officer
"It's rare that a vendor does more than they promise - CrowdStrike does! "
Manufacturing: Patrick Industries
Jonathan Beatty - Director of IT
"The CrowdStrike IR team's customer service is exceptional, attention to detail and time spent on ensuring that the requirement is met, at all times. "
Manufacturing: SIG plc
Carl Baron - CISO
"The CrowdStrike IR Retainer delivers a very thorough and well defined onboarding process to ensure maximum value from the services. "
Distribution: SiteOne Landscape Supply
David Black - CISO