CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
+
+

Related Products

  • Orca Security
    522 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • Adaptive Security
    83 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website
  • ManageEngine ADAudit Plus
    509 Ratings
    Visit Website

About

CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.

About

Detect threats at any point in your workflow. Inspect your cloud infrastructure and the business logic of the data in your cloud apps. Validate your files and content with the latest threat intelligence and multiple dynamic machine learning, AI, and correlation engines. Easily integrate across your trusted cloud services, web applications, and collaboration tools. Scan files, hashes, and URLs for potential malware in a live virtual environment without risking your internal assets. Incorporate Detection as a Service into your SOC workflows, SIEM analytics, data repositories, applications and much more. Determine the possibility of secondary or combinatory effects across multiple phases of the cyber-attack chain to discover never-before-seen exploits and malware. Submit MD5 hashes or local files with our easy-to-use Chrome plug-in that easily integrates into existing toolsets or workflows.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Large and mid-sized enterprises across diverse industries, particularly those that require advanced threat detection and response, such as finance, healthcare, manufacturing, technology, and government. It is especially suited for organizations dealing with sensitive data and facing complex cyber threats, often with a large workforce and intricate IT infrastructure

Audience

Any user interested in a threat detection solution to protect their systems against security threats and ransomware

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.6 / 5
ease 4.4 / 5
features 4.6 / 5
design 4.4 / 5
support 4.3 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CrowdStrike
Founded: 2011
United States
www.crowdstrike.com/platform/

Company Information

Trellix
Founded: 2022
United States
www.trellix.com/products/detection/

Alternatives

Alternatives

EndaceProbe

EndaceProbe

Endace
SecBI XDR

SecBI XDR

SecBI
Trend Vision One

Trend Vision One

Trend Micro

Categories

Categories

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

Airlock Digital
BluVector Advanced Threat Detection
CYREBRO
Chronicle SOAR
CyberArk Secure Cloud Access
Dragos Platform
Elevate Security
Falcon Cloud Workload Protection
Hyperproof
Multi-Domain Security Management
NetWatch.ai
Orchid Security
Query Federated Search
Rewst
SIRP
TruSTAR
Vega
VirtualArmour
WatchTower Security Management App
runZero

Integrations

Airlock Digital
BluVector Advanced Threat Detection
CYREBRO
Chronicle SOAR
CyberArk Secure Cloud Access
Dragos Platform
Elevate Security
Falcon Cloud Workload Protection
Hyperproof
Multi-Domain Security Management
NetWatch.ai
Orchid Security
Query Federated Search
Rewst
SIRP
TruSTAR
Vega
VirtualArmour
WatchTower Security Management App
runZero
Claim CrowdStrike Falcon and update features and information
Claim CrowdStrike Falcon and update features and information
Claim Trellix Detection as a Service and update features and information
Claim Trellix Detection as a Service and update features and information