Complete breach protection and visibility for cloud workloads
Next Generation AntiVirus - tried and tested to replace your AV.
Cloud security made simple...protect, optimize, and comply.
Endpoint Detection and Response (EDR).
By SecurityAdvisor from KnowBe4
Automated personalized security awareness lessons to employees, based on risk profile
Secure access to users and devices
Breach prevention for cloud workloads and containers.
Threat forensics and enhanced malware protection
By Mimecast Email Security
Integrated email and endpoint security
Enriched and actionable context across the attack surface.
End-to-end protection from device to application secures work beyond the perimeter.
Defense in depth with cloud-scale cybersecurity strategies.
Protection and visibility for your greatest cybersecurity risk—your people
Accelerate threat and vulnerability prioritization, response and remediation
Automated and customizable notifications with Slack to streamline IR and accelerate response based on threat detections.
Insight to empower security teams
File integrity monitoring that boosts compliance and offers relevant contextual data.
Enrich Falcon detections with automated threat intelligence to make better, faster decisions
Fast, effective real-time vulnerability management.
Ensure secure and fast access to any application and the Internet - from any device, anywhere.
Frictionless Security for Workforce Identities, Everywhere
Connect with Confidence
By Dragos, Inc.
Detect Industrial Threats on Your Falcon Endpoints.
SaaS-delivered network detection and response that correlates endpoint and network insights to stop breaches faster.
By Humio, A CrowdStrike Company
Log everything and answer anything, in real time and at scale.
Safeguard your organization with Application Allowlisting - effective endpoint protection.
Full-spectrum IT/OT visibility and threat detection.
Detect and investigate advanced attacks and insider threats with endpoint telemetry and behavior analytics.
Automated and customizable notifications with Microsoft Teams to streamline IR and accelerate response.
By Adaptive Shield
Enhance SaaS Security assessments by correlating devices with SaaS application access, enabling a holistic Zero Trust approa...
Intelligent solutions for the cloud era.
By DTEX Systems
Supercharge the Falcon platform with human behavioral intelligence & forensics
Seamless network-to-endpoint visibility and detection to stop attackers in their tracks.
Elevate protection with enriched threat intelligence for domains, URLs, and IP addresses
Automated and customizable notifications with PagerDuty to streamline IR and accelerate response based on threat detections.
Extend Zero Trust Security to data on the endpoint
By DoControl, Inc.
Cross-reference CrowdStrike detections with the same files stored in SaaS applications to find and remediate malicious files.
Automated malware analysis.
Correlate network, endpoint, and threat insights to stop breaches fast.
Automated and customizable ServiceNow incident tickets to streamline response based on Falcon Fusion
Provides central management for firewall on Windows.
Ensuring safe and accountable device usage.
Bringing Answers to your IT Hygiene Questions.
Dark web monitoring to protect your brand, employees, and sensitive data
EDR solution for mobile devices - Android and iOS.
Gain visibility to your multi-directory or multi-cloud identity store and detect identity-based attacks.
By TrueFort Inc.
Get Zero Trust application protection that secures all your applications and cloud workloads.
Predictive risk scores and DNS intelligence for rapid in-context profiling of domain observables.
Detect and Respond to Advanced Threats
Modernize your security operations with a cloud SIEM
Cloud Network Detection and Response
Application Access Redefined: Secure, Simple, Fast
By Awake Security
Advanced network detection and response platform
Streamline the collection of point-in-time and historic forensic triage data for robust analysis.
Cyber Threat & Malware Search Engine.
By Vulcan Cyber
Orchestrate vulnerability remediation to automate the enforcement of scan-to-fix cyber hygiene.
Tines automates workflows across your security tools and lets you focus on what matters most.
Open XDR solution that harnesses adversary proficiency and ML to detect threats across all surfaces.
Network and Supply Chain Threat Detection.
By IBM Security
Manage defenses against growing threats
Automated and customizable notifications using webhooks to streamline IR and accelerate response based on threat detections
Bridge contextual endpoint detections with user, network, and cloud findings for faster threat detections.
Automate data collection to speed up investigation and orchestrate response across all endpoints – within one interface.
Network Access Control for Wired, Wireless, and WAN.
By Obsidian Security
Start in minutes and protect SaaS applications with unified monitoring, detection and response
By CyberArk Software
Preventing the malicious use of privileged accounts and credentials.
Device Posture & Risk Policy.
Gain comprehensive and automated IOC enrichment powered by Cybersixgill’s data lake from the deep and dark web.
By CyberRes, A Micro Focus Line of Business
Detect Insider Threats with UEBA
By TruU, Inc.
The first continuous identity authentication and identification solution, powered by Presence™
Data Breach Detection and Prevention
Take Control of Cyber Risks
By InfoExpress Inc.
Simple & Secure Network Access Control
Advanced cybersecurity through Collective Defense
Discover and Secure Unmanaged Devices: IOT, BYOD, ASNs and more
Discover and Identify Devices Missing the Falcon agent
Correlate NDR Detections with Endpoint Behavior Details
Respond in Real-time based on Network Threats
Threat Intelligence Correlation from Network to Endpoint
Total Cloud Security
By SafeGuard Cyber
SafeGuard Cyber provides visibility and security to social, chat, and collaboration cloud apps.
By Perception Point
Preventing any malicious content identified in the endpoint from spreading across the organization
Quick and effective malware analysis using 20+ AV and 10+ reputation sources.
By Illusive Networks
Deterministic Threat Identification and Containment
By Acalvio Technologies
Deception-based rapid detection and containment of Ransomware, including Zero-day variants.
Democratizing Threat Intelligence.
By Kenna Security
Predictive, data-driven vulnerability management.
Platform for threat-centric security operations
Gain visibility with ML-based vulnerability risk prioritization and custom reporting & dashboards
Actively Defending the Enterprise of Things
Intelligence Led Network Protection.
By Axis Security
Zero Trust Access Made Simple.
Self-learning Cyber AI to discover unpredictable cyber-threats
By Swimlane Inc
CrowdStrike and Swimlane Automated EDR
Cloud-Native Logging & Security Analytics.
Bring Your Security Data to Life.
Everything you’ll need to start building on top of the Falcon Platform
An elite cybersecurity ecosystem delivers solutions and expertise to stop breaches