Falcon on GovCloud
Public sector organizations are embracing SaaS-delivered solutions at a rapid pace, as part of IT modernization efforts and recent executive orders that encourage and streamline adoption of modern commercial technology.
Moving critical capabilities such as endpoint security into the cloud requires careful consideration of a wide range of privacy and security assurances.
WHY FALCON ON GOVCLOUD?
- UNMATCHED PROTECTION & VISIBILITY
- Prevent all attack types — both malware and malware-free
- Real time visibility and protection across all endpoints and identities
- Proactive human threat hunting
- SCALABILITY AND EFFICIENCY
- SaaS-based, operational in minutes, no on-premises infrastructure
- Single, lightweight agent
- No reboots or scans required
- READY FOR PUBLIC SECTOR
- FedRAMP authorized
- Delivered from AWS GovCloud (U.S.)
- Two separate GovCloud environments with provisional authorization for DoD IL-4 and IL-5 to meet stringent data security needs
Protects against both malware and malware-free attacks; third-party tested and certified, it allows organizations to confidently replace their existing legacy AV
Delivers continuous and comprehensive endpoint visibility across detection, response and forensics, so nothing is missed and potential breaches can be stopped
Identifies attacks and stops breaches with an elite team of experts who proactively hunt, investigate and advise on threat activity in your environment
Identifies unauthorized systems and applications, and alerts in real time to the use of privileged credentials in your environment, enabling faster remediation
*Coming soon on GovCloud2
Enables safe and accountable USB device usage with deep visibility and precise and granular control of USB device utilization
Delivers timely, zero-impact assessments of endpoint security posture and provides on-demand access to the results, enabling better, faster decisions
Protects against threats to iOS and Android devices, providing real-time visibility into cyber attacks — eliminating blind spots that lead to breaches