CrowdStrike Falcon Endpoint Protection Elite

  • CrowdStrike Falcon Endpoint Protection Elite

    Code: CR000003
    Manufacturer
    CrowdStrike
  • FALCON ELITE

    Take breach-stopping power to the next level with integrated endpoint and identity protection, expanded visibility, and elite threat-hunting.



    Falcon Elite
    Full endpoint and identity protection with
    threat hunting and expanded visibility


    FALCON PREVENT
    Next-Generation Antivirus


    Read more...

    FALCON X
    Threat Intelligence


    Read more...

    FALCON DEVICE
    CONTROL
    USB Device Control


    Read more...

    FALCON FIREWALL MANAGEMENT
    Host Firewall Control


    Read more...

    FALCON INSIGHT
    Endpoint Detection & Responce


    Read more...

    FALCON OVERWATCH
    Threat hunting


    Read more...

    FALCON DISCOVER
    IT Hygiene


    Read more...

    FALCON IDENTITY PROTECTION
    Integrated Identity Security


    Read more...

    CROWDSTRIKE
    SERVICES
    Incident Response &
    Proactive Services
    LEARN MORE ABOUT
    CROWDSTRIKE SERVICES
    Read more...


    Flexible Bundles:  
    ✔ Included Component   ✚ Elective Component
     
    FALCON ENDPOINT AND IDENTITY PROTECTION ELITE
    Integrated Threat Intelligence & IT Hygiene
    Next Generation Antivirus & Endpoint Detection and Response
    Managed Threat Hunting Real Time Identity Protection

    BUSINESS VALUE

    Protection that unifies NGAV, EDR, Identity and IT Hygiene
    Enable threat hunting and real time visibility
    Expanded visibility & control
    Speed investigation and response
    Discover unprotected systems, risky applications and users
    FEATURES AND CAPABILITIES

    VISIBILITY & EDR

    Continuous monitoring
    Raw event capture
    5 seconds searches
    Real-time response
    Complete visibility, context and attribution
    USB device visibility
    Firewall visibility
    Asset, application, and account visibility


    PREVENTION

    Machine learning
    IOAs behavioral prevention
    Exploit blocking
    Custom hash blocking
    Protection on and off the network
    USB device control
    Firewall configuration management

    MANAGED THREAT HUNTING

    24/7 managed threat hunting
    Expert threat hunters
    Identify emerging threats
    In-app and email notifications

    INTEGRATED INTELLIGENCE

    Automatic malware analysis
    Automatic attribution
    Automatic IOC generation

    IDENTITY PROTECTION

    Hybrid identity landscape visibility
    Auto-classify Identity enterprise wide
    Real-time lateral movement and anomalous authentication detection
    Enables proactive identity based threat hunting
  • US IN SOCIAL NETWORKS