CrowdStrike Falcon Endpoint Protection Elite
CrowdStrike Falcon Endpoint Protection Elite
Kodas: CR000003Šią prekę turime sandėlyje.GamintojasCrowdStrike-
FALCON ELITE
Take breach-stopping power to the next level with integrated endpoint and identity protection, expanded visibility, and elite threat-hunting.
Falcon Elite
Full endpoint and identity protection with
threat hunting and expanded visibility
FALCON PREVENT
Next-Generation Antivirus
Read more...
FALCON X
Threat Intelligence
Read more...
FALCON DEVICE
CONTROL
USB Device Control
Read more...
FALCON FIREWALL MANAGEMENT
Host Firewall Control
Read more...
FALCON INSIGHT
Endpoint Detection & Responce
Read more...
FALCON OVERWATCH
Threat hunting
Read more...
FALCON DISCOVER
IT Hygiene
Read more...
FALCON IDENTITY PROTECTION
Integrated Identity Security
Read more...
CROWDSTRIKE
SERVICES
Incident Response &
Proactive Services
LEARN MORE ABOUT
CROWDSTRIKE SERVICES
Read more...
Flexible Bundles: ✔ Included Component ✚ Elective Component
FALCON ENDPOINT AND IDENTITY PROTECTION ELITEIntegrated Threat Intelligence & IT Hygiene
Next Generation Antivirus & Endpoint Detection and Response
Managed Threat Hunting Real Time Identity Protection
BUSINESS VALUE
Protection that unifies NGAV, EDR, Identity and IT Hygiene
Enable threat hunting and real time visibility
Expanded visibility & control
Speed investigation and response
Discover unprotected systems, risky applications and users
FEATURES AND CAPABILITIESVISIBILITY & EDR
Continuous monitoring
Raw event capture
5 seconds searches
Real-time response
Complete visibility, context and attribution
USB device visibility
Firewall visibility
Asset, application, and account visibility
PREVENTION
Machine learning
IOAs behavioral prevention
Exploit blocking
Custom hash blocking
Protection on and off the network
USB device control
Firewall configuration management
MANAGED THREAT HUNTING
24/7 managed threat hunting
Expert threat hunters
Identify emerging threats
In-app and email notifications
INTEGRATED INTELLIGENCE
Automatic malware analysis
Automatic attribution
Automatic IOC generation
IDENTITY PROTECTION
Hybrid identity landscape visibility
Auto-classify Identity enterprise wide
Real-time lateral movement and anomalous authentication detection
Enables proactive identity based threat hunting