top of page
CrowdStrike

ENDPOINT PROTECTION MANAGED IN THE CLOUD

INTRODUCING THE FALCON PLATFORM

Cloud Native

ENDPOINTS PROTECTION THROUGH THE CLOUD

Eliminate complexity, simplify your security model in layers, and deploy in record time, using collaborative data and cloud analytics to stop advanced threats.

threat Grapht

BASED ON ARTIFICIAL INTELLIGENCE

Take advantage of big data and artificial intelligence to provide your team with instant visibility and protection throughout the entire threat lifecycle.

Single Agent

THE PROTECTION YOU NEED

Get everything you need to stop cybersecurity incidents with a single lightweight agent. Replace antivirus, consolidate agents, and restore endpoint performance.

Mejor protección

Better protection

Protects against all threat vectors, not just malware - even when computers and servers aren’t connected to the internet.

Mejor Interpretación

Better Performance

Cloud-based architecture and no need for signature updates.

Tiempo de valorización inmediato

Immediate recovery time

No fine-tuning or costly infrastructure. Receive unmatched prevention from the moment you deploy.

CROWDSTRIKE PRODUCTS

ENDPOINT PROTECTION SOLUTIONS

Falcon Pro
CrowdStrike
Falcon Enterprise
CrowdStrike
Falcon Premium
CrowdStrike
Falcon Complete
CrowdStrike

CROWDSTRIKE
FALCON PLATFORM

Unified cloud-native framework that powers the next generation of enterprise security and IT operations to solve real-world customer problems.

SECURITY CLOUD ARCHITECTURE

CrowdStrike's Security Cloud is a pioneer in the next-generation enterprise security platform, spanning across endpoints, workloads, identities and applications, from the network edge to the cloud. Leverage the power and speed of the cloud, artificial intelligence (AI) and an intelligent, lightweight agent to defend against modern cyberattacks.

Endpoint Detection & Response

ENDPOINT DETECTION & RESPONSE

Endpoint Detection & Response

FALCON

INSIGHT

Next Gen Antivirus

NEXT GEN ANTIVIRUS

Next Gen Antivirus

FALCON

PREVENT

Firewall Management

FIREWALL

MANAGEMENT

Firewall Management

FALCON

FIREWALL

MANAGEMENT

Device Control

DEVICE

CONTROL

Device Control

FALCON

DEVICE

CONTROL

Endpoint

Security

Situational Awareness

SITUATIONAL AWARENESS

Situational Awareness

FALCON X

RECON

Threat Intelligence

THREAT

INTELLIGENCE

Threat Intelligence

FALCON

X

Falcon Search Engine

FALCON SEARCH ENGINE

Falcon Search Engine

FALCON

INSIGHT

Malware Analysis
Malware Analysis

FALCON

SANDBOX

MALWARE

ANALYSIS

Threat
Intel

Threat Hunting

THREAT

HUNTING

Threat Hunting

FALCON

OVERWHATCH

Turnkey Solution

TURNKEY

SOLUTIONS

Turnkey Solution

FALCON

COMPLETE

Managed
Services

IT HIGYENE

ITEM

HYGYENE

IT HIGYENE

FALCON

DISCOVER

Vulnerability Management

VULNERABILITY

MANAGEMENT

Vulnerability Management

FALCON

SPOTLIGHT

Forensics

FORENSICS

Forensics

FALCON

FORENSICS

Security & IT
Operations

Cloud Security Posture Management

CLOUD SECURITY

POSTURE MANAGEMENT

Cloud Security Posture Management

FALCON

HORIZON

Cloud Workload Protection

CLOUD WORKLOAD PROTECTION

Cloud Workload Protection

FALCON

CWP

Container Security

CONTAINER SECURITY

Container Security

FALCON

CONTAINER SECURITY

Cloud
Security

Identity Threat Detection

IDENTITY THREAT DETECTION

Identity Threat Detection

FALCON

ITD

Zero Trust

ZERO

TRUST

Zero Trust

FALCON

ZERO TRUST

Identity
Protection

CrowdStrike Threat Graph

Actualizaciones CrowdStrike

 
Schedule a call or request a demo
info2.png
bottom of page