SaaS-delivered network detection and response that correlates endpoint and network insights to stop breaches faster.
Full-Coverage Security Built for When Seconds Matter
Reveal(x) 360 performs full-stream analysis on network traffic from multi-cloud, on-premises and hybrid environments, and then uses cloud-scale machine learning to detect stealthy advanced attack behaviors across the entire network. Reveal(x) 360 pulls endpoint security event data from Threat Graph and correlates that data with observed network behavior and network threat detections in the Reveal(x) 360 console. Data can also be pushed from Reveal(x) 360 to the Falcon platform to trigger automated containment against active network-based threats.
Respond in real time to auto-contain network-based threats, including ransomware, command & control behavior, unauthorized data movement and remote access patterns, data exfiltration, credential abuse, and many others.
Correlate Reveal(x) 360 detections with Falcon X threat intelligence for fast, seamless IOC investigation.
Correlate network and endpoint attack details and forensics for full-coverage detection, investigation, and response.
Discover and identify all devices on the network, and identify those that are not yet instrumented with the CrowdStrike Falcon Agent.
Reveal(x) 360 + CrowdStrike Falcon X Free Trial App
The Reveal(x) 360 integration with Falcon X is a free trial app that correlates IPs and domains listed as IOCs in Falcon X with network behavior data about those IPs and domains, providing rapid investigation of potential attacks in progress.
Reveal(x) 360 + CrowdStrike Falcon Real Time Response
Reveal(x) 360 detects network-based threats that may soon impact specific endpoints but have not yet conducted malicious behavior on the endpoint itself. Reveal(x) 360 also detects threats that are actively conducting lateral movement, reconnaissance, command and control, and data exfiltration that generate network traffic from a compromised endpoint. Reveal(x) 360 can notify the Falcon agent about affected endpoints to contain the endpoint, preventing further spread of the threat.
Reveal(x) 360 + CrowdStrike Threat Graph
Reveal(x) 360 gathers network transaction metrics, transaction records and full packets and decrypts them in real time, providing complete network intelligence at cloud speed and scale.
Reveal(x) 360 for Unmanaged IoT, BYOD and Remote Connections
Reveal(x) 360 can discover and identify any device that communicates on the network and identify whether the Falcon agent is installed on the device by observing network traffic, helping customers assure complete coverage and security detection and response capabilities — even for unmanaged or unmanageable devices.