Listing Thumbnail

    CrowdStrike Falcon Cloud Security

     Info
    Deployed on AWS
    Vendor Insights
    CrowdStrike Cloud Security unifies cloud security posture management together with breach protection for cloud workloads and containers for any cloud, in a single platform. The cloud-native solution provides end-to-end protection from the host to the cloud and everywhere in between.

    Overview

    CrowdStrike Falcon Cloud Security provides threat detection and response, breach protection, and continuous posture management for any with our adversary-focused Cloud Native Application Protection Platform powered by holistic intelligence and end-to-end protection from the host to the cloud, delivering greater visibility, compliance and the industry's fastest threat detection and response to outsmart the adversary.

    CrowdStrike's Cloud Security Offerings Include:

    Falcon Cloud Security: Breach protection including threat intelligence, detection and response, workload runtime protection and cloud security posture management across AWS, Azure and GCP.

    Falcon Cloud Security for Containers: Includes the features and capabilities of Falcon Cloud Security, and also container and Kubernetes protection. It can be deployed across on-premises, hybrid and multi-cloud environments.

    Falcon for Managed Containers: Container security and runtime protection for cloud service providers managed containers, including threat intelligence, detection and response, container image security and Kubernetes protection.

    CrowdStrike Falcon Cloud Security leverages AWS Built-in for event-driven deployment automation in multi-account environments. Integrations with AWS services including CloudTrail, EventBridge, IAM, Systems Manager, AWS Control Tower, and AWS Organizations will dynamically keep your cloud resources protected. Use the AWS Built-in template for the simplest deployment path. Documentation and templates available at https://aws-abi.s3.amazonaws.com/guide/cfn-abi-crowdstrike-fcs/overview/index.html 

    Learn more at: https://www.crowdstrike.com/products/cloud-security/ 

    CrowdStrike Sensor Licensing FAQ: https://www.crowdstrike.com/crowdstrike-sensor-licensing-faq/ 

    Highlights

    • End-to-end Cloud Native Security: Gain real-time visibility, detection, and response to prevent data breaches, enforce security policies and ensure compliance, reduce alert fatigue creating less work for security teams and optimize cloud deployments
    • Discovery, Visibility and Compliance For Any Cloud: Gain visibility into your entire cloud infrastructure, continuously monitor for misconfigurations, ensure security policy and compliance enforcement, and proactively detect and prevent threats
    • Protect Workloads, Hosts and Containers: Get access to automated discovery, runtime protection, EDR for cloud workloads and containers, and managed threat hunting on a single lightweight agent enabling you to securely deploy applications in the cloud

    Details

    Categories

    Delivery method

    Deployed on AWS

    Unlock automation with AI agent solutions

    Fast-track AI initiatives with agents, tools, and solutions from AWS Partners.
    AI Agents

    Features and programs

    Trust Center

    Trust Center
    Access real-time vendor security and compliance information through their Trust Center powered by Drata. Review certifications and security standards before purchase.

    Buyer guide

    Gain valuable insights from real users who purchased this product, powered by PeerSpot.
    Buyer guide

    Financing for AWS Marketplace purchases

    AWS Marketplace now accepts line of credit payments through the PNC Vendor Finance program. This program is available to select AWS customers in the US, excluding NV, NC, ND, TN, & VT.
    Financing for AWS Marketplace purchases

    Vendor Insights

     Info
    Skip the manual risk assessment. Get verified and regularly updated security info on this product with Vendor Insights.

    Pricing

    Custom pricing options

    Pricing is based on your specific requirements and eligibility. Request a private offer to receive a custom quote. Sign in to view any offers that have been extended to you.

    How can we make this page better?

    We'd like to hear your feedback and ideas on how to improve this page.
    We'd like to hear your feedback and ideas on how to improve this page.

    Legal

    Content disclaimer

    Vendors are responsible for their product descriptions and other product content. AWS does not warrant that vendors' product descriptions or other product content are accurate, complete, reliable, current, or error-free.

    Usage information

     Info

    Delivery details

    Software as a Service (SaaS)

    SaaS delivers cloud-based software applications directly to customers over the internet. You can access these applications through a subscription model. You will pay recurring monthly usage fees through your AWS bill, while AWS handles deployment and infrastructure management, ensuring scalability, reliability, and seamless integration with other AWS services.

    Support

    Vendor support

    You can log a support ticket for any issues directly from the Falcon Portal or by emailing the support team at cloudmarketplaceoffers@crowdstrike.com  Basic support services such as email communications to the CrowdStrike Support team, access to the support portal and basic troubleshooting and technical assistance.

    AWS infrastructure support

    AWS Support is a one-on-one, fast-response support channel that is staffed 24x7x365 with experienced and technical support engineers. The service helps customers of all sizes and technical abilities to successfully utilize the products and features provided by Amazon Web Services.

    Product comparison

     Info
    Updated weekly

    Accolades

     Info
    Top
    25
    In Security
    Top
    100
    In Security
    Top
    10
    In Education & Research

    Customer reviews

     Info
    Sentiment is AI generated from actual customer reviews on AWS and G2
    Reviews
    Functionality
    Ease of use
    Customer service
    Cost effectiveness
    0 reviews
    Insufficient data
    Insufficient data
    Insufficient data
    Insufficient data
    Positive reviews
    Mixed reviews
    Negative reviews

    Overview

     Info
    AI generated from product descriptions
    Cloud Security Posture Management
    Unified cloud security management across AWS, Azure, and GCP with continuous monitoring and configuration assessment
    Threat Detection and Response
    Advanced threat intelligence and detection capabilities with real-time monitoring and response mechanisms for cloud environments
    Container and Kubernetes Protection
    Comprehensive security for containerized applications and Kubernetes environments with runtime protection and image security
    Multi-Cloud Workload Security
    End-to-end protection for cloud workloads across on-premises, hybrid, and multi-cloud infrastructure with a single lightweight agent
    Event-Driven Security Automation
    Dynamic cloud resource protection through integration with cloud service provider event and management services
    Multi-layered Protection
    Provides comprehensive security across on-premises, cloud, and disconnected environments using a single agent
    Advanced Threat Detection
    Utilizes Next Generation Antivirus, Adaptive Threat Protection, and Threat Intelligence Exchange for detecting sophisticated threats
    Generative AI Security Analytics
    Employs AI-powered capabilities for multi-lingual threat hunting, interactive threat investigation, and threat knowledge graph generation
    Endpoint Detection and Response
    Combines advanced detection, investigation, forensics, and response capabilities with unified platform for comprehensive threat management
    Security Control Integration
    Includes host firewall, web device control, application controls, and native security protection mechanisms across different deployment models
    Threat Detection Mechanism
    Advanced endpoint detection and response (EDR) capabilities with multi-stage threat identification across attack vectors
    Malware Prevention Technology
    Sophisticated prevention-first approach using advanced blocking technologies against broad range of cyber attacks
    Security Investigation Tools
    Unified XDR platform enabling comprehensive threat investigation, detection, and response capabilities
    Attack Vector Coverage
    Multi-layered protection mechanism targeting different stages and types of cybersecurity threats
    Endpoint Protection Framework
    Comprehensive security solution with default strong protection settings and drift identification capabilities

    Contract

     Info
    Standard contract
    No
    No
    No

    Customer reviews

    Ratings and reviews

     Info
    3.5
    2 ratings
    5 star
    4 star
    3 star
    2 star
    1 star
    0%
    0%
    100%
    0%
    0%
    2 AWS reviews
    |
    97 external reviews
    Star ratings include only reviews from verified AWS customers. External reviews can also include a star rating, but star ratings from external reviews are not averaged in with the AWS customer star ratings.
    Vijay T.

    It simplifies Incident analysis.. must to have in cloud infrastructure

    Reviewed on Sep 10, 2025
    Review provided by G2
    What do you like best about the product?
    Interactive dashboard, very detailed analysis of the incident, less false positives, easy integration with other tools
    What do you dislike about the product?
    Other than the cost factor, I don't see anything to dislike
    What problems is the product solving and how is that benefiting you?
    Cloud infrastructure is always prone to attack and data leakage, with CrowdStrike Falcon Cloud Security it makes the cloud infra safe, especially in a multi cloud environment.
    Gaurang A.

    Powerful and Feature-Rich, Yet Pricey

    Reviewed on Sep 09, 2025
    Review provided by G2
    What do you like best about the product?
    As marketed, complete protection from code to cloud, ideal for organizations of all sizes - highly efficient with minimal false positives. I found the interface to be very user-friendly and gives insightful data in any alert, which helps to investigate the incidents easily, and the ease of integration with AWS.
    What do you dislike about the product?
    While it is feature-rich but you have to consider that pricing is a bit on the higher side (even more if you request a custom quote), I highly doubt if small orgs would be able to afford it while being suitable at the same time. Also, you might face a higher learning curve if you are not well-versed in similar security tools.
    What problems is the product solving and how is that benefiting you?
    Mainly threat detection & protection, Cloud Security with AWS, and Cloud Misconfigurations identifier
    Felipe M.

    Excellent cybersecurity tool

    Reviewed on Aug 29, 2025
    Review provided by G2
    What do you like best about the product?
    Ease of implementation.....................
    What do you dislike about the product?
    so far it is a very good tool
    What problems is the product solving and how is that benefiting you?
    Protect the endpoints, servers, mobiles
    Luis S.

    EDR Best Product

    Reviewed on Jun 12, 2025
    Review provided by G2
    What do you like best about the product?
    Provides tools to customers that allow them to detect events well in advance of an incident being detected.
    What do you dislike about the product?
    The price lists are not clear as to the scope of each item. is only for a few clouds
    What problems is the product solving and how is that benefiting you?
    Validate the security posture of workloads across all clouds from a single platform
    Hospital & Health Care

    The ultimate monitoring tool

    Reviewed on May 23, 2025
    Review provided by G2
    What do you like best about the product?
    ease of use and works as expected, just install and let falcon handle all the hard work.
    What do you dislike about the product?
    we tend to have to restart the agent a few times since setting it up.
    What problems is the product solving and how is that benefiting you?
    we needed a tool to detect viruses/malwares/etc. this is what was recommended by our 3rd party HIPAA compliant vendor.
    View all reviews