CrowdStrike Falcon Host

Overview

Experienced a Breach?
NEED IMMEDIATE ASSISTANCE?
Contact Us for Pre and Post Incident Response Services
CrowdStrike Falcon Host protects against attacks — whether they use malware or not. This is achieved by unifying an array of best-of-breed protection methods:

COMPLETE PROTECTION
Falcon Host uniquely combines these powerful methods into an integrated approach that protects endpoints more effectively against both malware and breaches:

Known malware prevention
Blacklisting and whitelisting
Machine learning
Exploit mitigation to stop attacks that exploit vulnerabilities to compromise hosts
Indicators of Attack (IOAs) to look across both legitimate activity and malicious activity and detect stealthy chains of activities that indicate attacks. Learn more about IOAs

SEAMLESS MANAGEMENT
All of this protection capability is delivered without impacting the performance or management of the endpoint:

Smart and lightweight sensor — less than 5MB in size, invisible to end users, with no productivity impact

Signature-less technologies that do not require signature updates

Built-in endpoint detection and response (EDR) augments protection with unprecedented detection, visibility, and forensics abilities, without the need for additional agents

UNIQUELY POWERED BY THE TECHNOLOGIES OF THE FUTURE
Built on cutting-edge Cloud and Graph technologies that enable unprecedented levels of protection:

A 100% cloud-delivered solution deployed and instantly operational with no associated hardware or storage costs for the customer

The CrowdStrike Threat Graph™ enabling levels of protection and visibility at a speed and scale not previously achievable -

Key Features

  • Endpoint Security

Specifications

Pricing

Pricing model:

Alternatives to CrowdStrike Falcon Host

HaltDos

Cloud Security Software
No votes yet
0

Innkey POS

Cloud Security Software
No votes yet
0

Jamf Pro

IT Asset Management Software
No votes yet
0

HackEDU

Cloud Security Software
No votes yet
0