CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
+
+

Related Products

  • Orca Security
    495 Ratings
    Visit Website
  • Wiz
    1,106 Ratings
    Visit Website
  • Guardz
    106 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,231 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    98 Ratings
    Visit Website
  • ThreatLocker
    501 Ratings
    Visit Website
  • Safetica
    401 Ratings
    Visit Website
  • Adaptive Security
    83 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    487 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website

About

CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.

About

Identify vulnerabilities across your entire attack surface, covering both your technical and human assets. All in one unified platform. One risk model. One workflow. Keep up with current threats and protect your entire infrastructure, including cloud, operational technology, and remote workforce. Our all-in-one platform offers unparalleled insight and visibility, covering all your assets across your organization’s technical assets, including local and public systems, computers, cloud infrastructure and services, networks, web applications, APIs, and human assets - your users. Gain complete visibility and actionable context on your most critical misconfigurations, so your teams can proactively and continuously improve your cloud security posture. Reduce risk to your organization by maintaining least-privilege access for cloud workloads, data, and applications.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Large and mid-sized enterprises across diverse industries, particularly those that require advanced threat detection and response, such as finance, healthcare, manufacturing, technology, and government. It is especially suited for organizations dealing with sensitive data and facing complex cyber threats, often with a large workforce and intricate IT infrastructure

Audience

IT teams interested in a tool that helps find vulnerabilities

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.5 / 5
ease 4.4 / 5
features 4.5 / 5
design 4.5 / 5
support 4.2 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CrowdStrike
Founded: 2011
United States
www.crowdstrike.com/platform/

Company Information

Holm Security
Founded: 2015
Sweden
www.holmsecurity.com

Alternatives

Alternatives

Tenable One

Tenable One

Tenable
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

Azure Marketplace
AWS Marketplace
Axonius
BeyondCorp Enterprise
CYREBRO
CloudNuro
Complyance
CrowdStrike Falcon Exposure Management
Google Digital Risk Protection
IBM Verify
Jenkins
JupiterOne
NetBird
Orchid Security
PassiveTotal
Proofpoint Emerging Threat (ET) Intelligence
Silent Push
Sola Security
ThreatConnect Threat Intelligence Platform
WatchTower Security Management App

Integrations

Azure Marketplace
AWS Marketplace
Axonius
BeyondCorp Enterprise
CYREBRO
CloudNuro
Complyance
CrowdStrike Falcon Exposure Management
Google Digital Risk Protection
IBM Verify
Jenkins
JupiterOne
NetBird
Orchid Security
PassiveTotal
Proofpoint Emerging Threat (ET) Intelligence
Silent Push
Sola Security
ThreatConnect Threat Intelligence Platform
WatchTower Security Management App
Claim CrowdStrike Falcon and update features and information
Claim CrowdStrike Falcon and update features and information
Claim Holm Security and update features and information
Claim Holm Security and update features and information