CrowdStrike Falcon Endpoint Protection Pro
-
FALCON PRO
Market-leading NGAV proven to stop malware with integrated threat intelligence and immediate response — with a single lightweight agent that operates without the need for constant signature updates, on-premises management infrastructure or complex integrations, making it fast and easy to replace your AV.
Falcon Pro
Replace legacy AV with market-leading NGAV and
integrated threat intelligence and immediate response
FALCON PREVENT
Next-Generation Antivirus
Read more...
FALCON X
Threat Intelligence
Read more...
FALCON DEVICE
CONTROL
USB Device Control
Read more...
FALCON FIREWALL MANAGEMENT
Host Firewall Control
Read more...
FALCON INSIGHT
Endpoint Detection & Responce
AVAILABLE WITH
FALCON ENTERPRISE
AND FALCON ELITE
Read more...
FALCON OVERWATCH
Threat hunting
AVAILABLE WITH
FALCON ENTERPRISE
AND FALCON ELITE
Read more...
FALCON DISCOVER
IT Hygiene
AVAILABLE WITH
FALCON ENTERPRISE
AND FALCON ELITE
Read more...
FALCON IDENTITY PROTECTION
Integrated Identity Security
AVAILABLE WITH
FALCON ENTERPRISE
AND FALCON ELITE
Read more...
CROWDSTRIKE
SERVICES
Incident Response &
Proactive Services
LEARN MORE ABOUT
CROWDSTRIKE SERVICES
Read more...
Flexible Bundles: ✔ Included Component ✚ Elective Component
FALCON ENDPOINT PROTECTION PROFull Attack Visibility
Next Generation Antivirus
Real Time Response Integrated Threat Intelligence
BUSINESS VALUE
Replace legacyantivirus suites
Stop known and unknown malware
Remediate incidents quickly
Restore system performance and productivity
Empower analysts to operate more efficiently
FEATURES AND CAPABILITIESPREVENTION
Machine learning
IOA behavioral prevention
Exploit blocking
Custom hash blocking
Protection on and off the network
USB device control
Firewall configuration management
INTEGRATED INTELLIGENCE
Automatic malware analysis
Automatic attribution
Exploit blocking
Automatic IOC generation
Automated investigations
Prescribed actions
CONTROL AND RESPOND
Full attack visibility
Real-time response and remediation
Network containment
File, information and memory retrieval
USB device visibility
Firewall visibility
CLOUD NATIVE
No infrastructure to deploy
Infinitely scalable
Reduce complexity
Works on Day One