CrowdStrike, Inc. is an American cybersecurity technology company based in Irvine, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services to customers in more than 170 countries. The company has been involved in response efforts to several high-profile cyber-attacks, including the Sony Pictures hack and the 2016 Democratic National Committee email leak, for which it concluded Russian state actors were responsible.

Wikipedia
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • Preventing Sophisticated Attacks: Tips From a Real-World Incident Responder
    Robin Jackson, principal consultant for CrowdStrike, has had extensive experience investigating some of today’s most prolific threat actors. He’s also done security research for a number of organizations and is well-versed in the kind of digital crimes that can victimize… The post Preventing Sophisticated Attacks: Tips From a Real-World Incident Responder appeared first on .
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • How to Configure Falcon Data Replicator
    Introductions Falcon Data Replicator is a service that provides raw CrowdStrike events in JSON format via Amazon Web Services Simple Storage Service (S3). You can ingest these events into your local data warehouse/data layer.  Having this data local allows for… The post How to Configure Falcon Data Replicator appeared first on .
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • CrowdStrike Falcon Endpoint Protection Receives Five Stars Across the Board in SC Magazine Evaluation
    The CrowdStrike Falcon platform recently participated in a group evaluation by SC Magazine’s testing team, a U.S.-based team that includes “SC Lab staff and a network of external experts who are respected industry-wide.” Their evaluation of Falcon’s endpoint protection capabilities… The post CrowdStrike Falcon Endpoint Protection Receives Five Stars Across the Board in SC Magazine Evaluation appea...
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • How Falcon Prevents Script-based and Other Fileless Attacks
    Introduction Fileless and script based attacks are on the rise.  The growth in this area is attributed to their avoidance capability.  These attacks avoid detection by traditional AV solutions.  In an article written by pentestlab.blog the author illustrates how a simple… The post How Falcon Prevents Script-based and Other Fileless Attacks appeared first on .
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

  • How to Get Next-Gen AV Protection on a Mac with Falcon
    This video demonstrates the Falcon sensor install for Mac. Once the sensor is installed we try to run multiple samples of malware to show product performance and effectiveness. Finally we show Falcon detecting malicious behavior using our Indicators of Attack.
CrowdStrike
CrowdStrike
YouTube Video
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • Four Steps to Choosing the Right Antivirus Replacement
    Few security experts would dispute the fact that legacy antivirus (AV) solutions are no match for today’s most stealthy and sophisticated cyberattacks. Stories of successful breaches seem to hit the headlines daily. The attacks may use different methods and be… The post Four Steps to Choosing the Right Antivirus Replacement appeared first on .
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

  • CrowdStrike Falcon MalQuery – The faster, more complete malware search engine
    Falcon MalQuery is an advanced, cloud-based malware research tool designed to enable security professionals and threat researchers to search a massive collection of malware samples with speed and efficiency. At the core of Falcon MalQuery is a massive, multi-year collection of malware samples that is uniquely indexed for rapid search. Learn more at https://www.crowdstrike.com/products/falcon-sea...
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • CrowdStrike Summer Release 2017: Falcon Search Engine Brings Speed and Agility to Cybersecurity
    Today we are proud to announce the CrowdStrike Falcon® Search Engine, the largest and fastest search engine exclusively for cybersecurity professionals. We recognize the transformative effects that search engines have had in other areas of our lives, and now were… The post CrowdStrike Summer Release 2017: Falcon Search Engine Brings Speed and Agility to Cybersecurity appeared first on .
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

  • New CrowdStrike Falcon® Search Engine
    Falcon Search Engine fundamentally changes the game with fast, real-time searches across CrowdStrike’s extensive threat database. Read more at https://www.crowdstrike.com/products/falcon-search-engine/
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

  • CrowdStrike Falcon MalQuery – The faster, more complete malware search engine
    Falcon MalQuery is an advanced, cloud-based malware research tool designed to enable security professionals and threat researchers to search a massive collection of malware samples with speed and efficiency. At the core of Falcon MalQuery is a massive, multi-year collection of malware samples that is uniquely indexed for rapid search. Learn more at https://www.crowdstrike.com/products/falcon-sea...
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

  • How Falcon Prevents Fileless Attacks in Your Organization
    In this video we’ll demonstrate an attack that doesn’t drop malware or require any user interaction. We have identified a vulnerable webserver and passed a command that will drop a webshell and provide access to the system. We then gain access to the system and do some simple reconnaissance to illustrate the visibility that Falcon can provide your organization. We then attempt to run an encoded...
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

  • How to Detect and Prevent Malware Free Attacks with CrowdStrike Falcon Host
    Traditional antivirus products and even application whitelisting products are completely blind to attacks that do not use malware. It is possible for an attacker to compromise a machine without ever writing a file to disk, or by abusing a legitimate system tool like PowerShell or WMI. It is also common for attackers to exploit a public-facing web server, and then use a web shell to move laterally ...
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

  • CrowdStrike Winter 2017 Release video blog from CEO and Co-founder George Kurtz
    CrowdStrike is setting a new standard in endpoint security – providing customers with the industry’s most effective solution to prevent, detect, respond to, and predict attacks from even the most sophisticated adversaries. Check out this video blog from CrowdStrike CEO and Co-founder George Kurtz to learn more about this expansion of the Falcon platform .
CrowdStrike
CrowdStrike
YouTube Video

New YouTube videos detected.

  • Customer Success Story: TransPak Inc.
    TransPak’s head of IT and security Mark Sauer explains why CrowdStrike Falcon has replaced traditional AV on all his company’s endpoints around the world, providing the highest levels of protection against ransomware, malware, and malware-free attacks.
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • Using Outlook Forms for Lateral Movement and Persistence
    By CrowdStrike Services: Tim Parisi, Doug Clendening and Jai Musunuri Background During a recent CrowdStrike Services investigation, we identified an adversary attack method, used for lateral movement and persistence, that we have not seen used before. The attack leveraged customized… The post Using Outlook Forms for Lateral Movement and Persistence appeared first on .
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • Webcast Unpacks Fileless Attacks and Explains What it Takes to Fight Them
    A new webcast, “Understanding Fileless Attacks and How to Stop Them,” explains the rise in fileless attacks and why this stealthy approach is enjoying such renewed interest among today’s adversaries. Fileless threats have not only gotten the attention of security… The post Webcast Unpacks Fileless Attacks and Explains What it Takes to Fight Them appeared first on .
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • NotPetya Technical Analysis – A Triple Threat: File Encryption, MFT Encryption, Credential Theft
    Update: Due to naming convention consistency in the industry, CrowdStrike is now calling this variant of Petya – NotPetya. Executive Summary This technical analysis provides an in-depth analysis and review of NotPetya.  For more information on CrowdStrike’s proactive protection features… The post NotPetya Technical Analysis – A Triple Threat: File Encryption, MFT Encryption, Credential Theft appea...
CrowdStrike
CrowdStrike
Blog Post

New blog articles detected.

  • CrowdStrike Protects Against NotPetya Attack
    Update: Due to naming convention consistency in the industry, CrowdStrike is now calling this variant of Petya – NotPetya. On June 27 at approximately 10:30 UTC, a new ransomware family began propagating across multiple countries. The family, referred to as… The post CrowdStrike Protects Against NotPetya Attack appeared first on .

Out-Market Your Competitors?

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account Log in

By signing up, you agree to the Terms of Service and Privacy Policy.

Out-Market Your Competitors

Get complete competitive insights on over 2.2 million companies to drive your marketing strategy.

Create Free Account

Already a user?  Log in

By signing up, you agree to the Terms of Service and Privacy Policy.