
CrowdStrike
CrowdStrike delivers industry leading detection and remediation to stop known and emerging threats across endpoints, cloud, identity and data.
Overview
CrowdStrike is a global cybersecurity leader that has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity, and data.
The CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.
https://aws.amazon.com/partners/aws-and-crowdstrike/
Use cases
Endpoint Protection
Stop breaches with unified endpoint protection delivered from the cloud. CrowdStrike aims to revolutionize endpoint protection by unifying next-generation antivirus (AV), endpoint detection and response (EDR), and a 24/7 managed hunting service - all delivered via a single lightweight agent.
Endpoint Protection Products by Use Case
Breach Protection
Protect against all types of attacks from commodity malware to ransomware to sophisticated attacks — even when offline.
Exploit Blocking
Stop the execution and spread of threats via unpatched vulnerabilities
Automated IOA Remediation:
Clean up known artifacts left behind from blocked malicious activity
Continuous monitoring
Capture endpoint activity so you know exactly what’s happening - from a threat on a single endpoint to the threat level of the organization.
Application inventory
Understand all applications running in your environment, and search to see versions, hosts and users
Asset management
Explore detailed inventory of managed and rogue systems, and see which assets could easily be covered by the Falcon agent
Endpoint Protection Related Content
Cloud Security
CrowdStrike Cloud Security unifies cloud security posture management together with breach protection for cloud workloads and containers for any cloud, in a single platform. The cloud-native solution provides end-to-end protection from the host to the cloud and everywhere in between.
Cloud Security Products by Use Case
Cloud workload protection
Comprehensive breach protection for any cloud. Gain visibility, and protection against advanced threats while integrating seamlessly with DevOps and CI/CD pipelines, delivering an immutable infrastructure that optimizes cloud resources and ensures applications are always secure.
Cloud security posture management
Enables security teams to keep applications secure and proactively monitor and remediate misconfigurations while fast-moving DevOps teams build non-stop in the cloud.
Container security and runtime protection
Automates the secure development of cloud-native applications delivering full stack protection and compliance for containers, Kubernetes, and hosts across the container lifecycle.
Cloud Security Related Content
Download fileIdentity protection
Receive unified visibility and actionable insights on workforce identities across multidirectory environment while providing real-time prevention with conditional access policies
Identity protection Products by Use Case
Identity Verification
Defines and enforces policies in real time, based on authentication patterns, behavior baselines and individual risk scores to verify identities using step-up authentication such as multifactor authentication (.e.g MFA)
Multi-Directory Security
Provides continuous multi-directory visibility into the status, scope, and impact of access privileges for identities across Microsoft Active Directory (AD) Azure AD, and cloud single sign-on (SSO) solutions
Remote Access Security
Gain complete visibility into the authentication activity of all accounts and endpoints (managed and unmanaged), including location information, login type (human or service accounts), source and destination, including via SSL-VPN and RDP, across on-premises and cloud deployments.
Identity protection Related Content
Download file