CrowdStrike Falcon Endpoint Protection Pro

  • CrowdStrike Falcon Endpoint Protection Pro

    Code: CR000001
  • FALCON PRO

    Market-leading NGAV proven to stop malware with integrated threat intelligence and immediate response — with a single lightweight agent that operates without the need for constant signature updates, on-premises management infrastructure or complex integrations, making it fast and easy to replace your AV.



    Falcon Pro
    Replace legacy AV with market-leading NGAV and
    integrated threat intelligence and immediate response


    FALCON PREVENT
    Next-Generation Antivirus


    Read more...

    FALCON X
    Threat Intelligence


    Read more...

    FALCON DEVICE
    CONTROL
    USB Device Control


    Read more...

    FALCON FIREWALL MANAGEMENT
    Host Firewall Control


    Read more...

    FALCON INSIGHT
    Endpoint Detection & Responce
    AVAILABLE WITH
    FALCON ENTERPRISE
    AND FALCON ELITE
    Read more...

    FALCON OVERWATCH
    Threat hunting
    AVAILABLE WITH
    FALCON ENTERPRISE
    AND FALCON ELITE
    Read more...

    FALCON DISCOVER
    IT Hygiene
    AVAILABLE WITH
    FALCON ENTERPRISE
    AND FALCON ELITE
    Read more...

    FALCON IDENTITY PROTECTION
    Integrated Identity Security
    AVAILABLE WITH
    FALCON ENTERPRISE
    AND FALCON ELITE
    Read more...

    CROWDSTRIKE
    SERVICES
    Incident Response &
    Proactive Services
    LEARN MORE ABOUT
    CROWDSTRIKE SERVICES
    Read more...


    Flexible Bundles:  
    ✔ Included Component   ✚ Elective Component
     
    FALCON ENDPOINT PROTECTION PRO
    Full Attack Visibility
    Next Generation Antivirus
    Real Time Response Integrated Threat Intelligence

    BUSINESS VALUE

    Replace legacyantivirus suites
    Stop known and unknown malware
    Remediate incidents quickly
    Restore system performance and productivity
    Empower analysts to operate more efficiently
    FEATURES AND CAPABILITIES

    PREVENTION

    Machine learning
    IOA behavioral prevention
    Exploit blocking
    Custom hash blocking
    Protection on and off the network
    USB device control
    Firewall configuration management


    INTEGRATED INTELLIGENCE

    Automatic malware analysis
    Automatic attribution
    Exploit blocking
    Automatic IOC generation
    Automated investigations
    Prescribed actions

    CONTROL AND RESPOND

    Full attack visibility
    Real-time response and remediation
    Network containment
    File, information and memory retrieval
    USB device visibility
    Firewall visibility




    CLOUD NATIVE

    No infrastructure to deploy
    Infinitely scalable
    Reduce complexity
    Works on Day One
  • US IN SOCIAL NETWORKS