CrowdStrike Falcon Endpoint Protection Elite
Kodas: CR000003Šią prekę turime sandėlyje.GamintojasCrowdStrike-
FALCON ELITE

Take breach-stopping power to the next level with integrated endpoint and identity protection, expanded visibility, and elite threat-hunting.
Falcon Elite
Full endpoint and identity protection with
threat hunting and expanded visibility

FALCON PREVENT
Next-Generation Antivirus

Read more...
FALCON X
Threat Intelligence

Read more...
FALCON DEVICE
CONTROL
USB Device Control

Read more...
FALCON FIREWALL MANAGEMENT
Host Firewall Control

Read more...
FALCON INSIGHT
Endpoint Detection & Responce

Read more...
FALCON OVERWATCH
Threat hunting

Read more...
FALCON DISCOVER
IT Hygiene

Read more...
FALCON IDENTITY PROTECTION
Integrated Identity Security

Read more...
CROWDSTRIKE
SERVICES
Incident Response &
Proactive Services
LEARN MORE ABOUT
CROWDSTRIKE SERVICES
Read more...
Flexible Bundles: ✔ Included Component ✚ Elective Component
FALCON ENDPOINT AND IDENTITY PROTECTION ELITEIntegrated Threat Intelligence & IT Hygiene

Next Generation Antivirus & Endpoint Detection and Response
Managed Threat Hunting Real Time Identity Protection
BUSINESS VALUE
Protection that unifies NGAV, EDR, Identity and IT Hygiene
Enable threat hunting and real time visibility
Expanded visibility & control
Speed investigation and response
Discover unprotected systems, risky applications and users
FEATURES AND CAPABILITIESVISIBILITY & EDR
Continuous monitoring
Raw event capture
5 seconds searches
Real-time response
Complete visibility, context and attribution
USB device visibility
Firewall visibility
Asset, application, and account visibility
PREVENTION
Machine learning
IOAs behavioral prevention
Exploit blocking
Custom hash blocking
Protection on and off the network
USB device control
Firewall configuration management

MANAGED THREAT HUNTING
24/7 managed threat hunting
Expert threat hunters
Identify emerging threats
In-app and email notifications
INTEGRATED INTELLIGENCE
Automatic malware analysis
Automatic attribution
Automatic IOC generation
IDENTITY PROTECTION
Hybrid identity landscape visibility
Auto-classify Identity enterprise wide
Real-time lateral movement and anomalous authentication detection
Enables proactive identity based threat hunting





