Sign in
Categories
Your Saved List Become a Channel Partner Sell in AWS Marketplace Amazon Web Services Home Help
CrowdStrike

CrowdStrike

CrowdStrike delivers industry leading detection and remediation to stop known and emerging threats across endpoints, cloud, identity and data.

Overview

CrowdStrike is a global cybersecurity leader that has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity, and data.

The CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

https://aws.amazon.com/partners/aws-and-crowdstrike/

Featured products

Use cases

  • Endpoint Protection

    Stop breaches with unified endpoint protection delivered from the cloud. CrowdStrike aims to revolutionize endpoint protection by unifying next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service - all delivered via a single lightweight agent.

    Endpoint Protection Products by Use Case

    Breach Protection

    Protect against all types of attacks from commodity malware to ransomware to sophisticated attacks — even when offline.

    Exploit Blocking

    Stop the execution and spread of threats via unpatched vulnerabilities

    Automated IOA Remediation:

    Clean up known artifacts left behind from blocked malicious activity

    Continuous monitoring

    Capture endpoint activity so you know exactly what’s happening - from a threat on a single endpoint to the threat level of the organization.

    Application inventory

    Understand all applications running in your environment, and search to see versions, hosts and users

    Asset management

    Explore detailed inventory of managed and rogue systems, and see which assets could easily be covered by the Falcon agent

  • Cloud Security

    CrowdStrike Cloud Security unifies cloud security posture management together with breach protection for cloud workloads and containers for any cloud, in a single platform. The cloud-native solution provides end-to-end protection from the host to the cloud and everywhere in between.

    Cloud Security Products by Use Case

    Cloud workload protection

    Comprehensive breach protection for any cloud. Gain visibility, and protection against advanced threats while integrating seamlessly with DevOps and CI/CD pipelines, delivering an immutable infrastructure that optimizes cloud resources and ensures applications are always secure.

    Cloud security posture management

    Enables security teams to keep applications secure and proactively monitor and remediate misconfigurations while fast-moving DevOps teams build non-stop in the cloud.

    Container security and runtime protection

    Automates the secure development of cloud-native applications delivering full stack protection and compliance for containers, Kubernetes, and hosts across the container lifecycle.

    Cloud Security Related Content

  • Identity protection

    Receive unified visibility and actionable insights on workforce identities across multidirectory environment while providing real-time prevention with conditional access policies

    Identity protection Products by Use Case

    Identity Verification

    Defines and enforces policies in real time, based on authentication patterns, behavior baselines and individual risk scores to verify identities using step-up authentication such as multifactor authentication (.e.g MFA)

    Multi-Directory Security

    Provides continuous multi-directory visibility into the status, scope, and impact of access privileges for identities across Microsoft Active Directory (AD) Azure AD, and cloud single sign-on (SSO) solutions

    Remote Access Security

    Gain complete visibility into the authentication activity of all accounts and endpoints (managed and unmanaged), including location information, login type (human or service accounts), source and destination, including via SSL-VPN and RDP, across on-premises and cloud deployments.

    Identity protection Related Content

View all products

Resources