Endpoint Detection and Response (EDR).
By SecurityAdvisor from KnowBe4
Automated personalized security awareness lessons to employees, based on risk profile
Accelerate threat and vulnerability prioritization, response and remediation
Automated and customizable notifications with Slack to streamline IR and accelerate response based on threat detections.
Insight to empower security teams
File integrity monitoring that boosts compliance and offers relevant contextual data.
Fast, effective real-time vulnerability management.
Connect with Confidence
By Humio, A CrowdStrike Company
Log everything and answer anything, in real time and at scale.
Detect and investigate advanced attacks and insider threats with endpoint telemetry and behavior analytics.
Automated and customizable notifications with Microsoft Teams to streamline IR and accelerate response.
By Adaptive Shield
Enhance SaaS Security assessments by correlating devices with SaaS application access, enabling a holistic Zero Trust approa...
Intelligent solutions for the cloud era.
By DTEX Systems
Supercharge the Falcon platform with human behavioral intelligence & forensics
Elevate protection with enriched threat intelligence for domains, URLs, and IP addresses
Automated and customizable notifications with PagerDuty to streamline IR and accelerate response based on threat detections.
Extend Zero Trust Security to data on the endpoint
By DoControl, Inc.
Cross-reference CrowdStrike detections with the same files stored in SaaS applications to find and remediate malicious files.
Automated and customizable ServiceNow incident tickets to streamline response based on Falcon Fusion
Bringing Answers to your IT Hygiene Questions.
Gain visibility to your multi-directory or multi-cloud identity store and detect identity-based attacks.
Predictive risk scores and DNS intelligence for rapid in-context profiling of domain observables.
Detect and Respond to Advanced Threats
Modernize your security operations with a cloud SIEM
Streamlining Triage Data Collection and Analysis
By Vulcan Cyber
Orchestrate vulnerability remediation to automate the enforcement of scan-to-fix cyber hygiene.
Tines automates workflows across your security tools and lets you focus on what matters most.
Open XDR solution that harnesses adversary proficiency and ML to detect threats across all surfaces.
By IBM Security
Manage defenses against growing threats
Automated and customizable notifications using webhooks to streamline IR and accelerate response based on threat detections
Bridge contextual endpoint detections with user, network, and cloud findings for faster threat detections.
Automate data collection to speed up investigation and orchestrate response across all endpoints – within one interface.
By CyberRes, A Micro Focus Line of Business
Detect Insider Threats with UEBA
Take Control of Cyber Risks
Threat Intelligence Correlation from Network to Endpoint
Gain Layered Asset Visibility
By Kenna Security
Predictive, data-driven vulnerability management.
Gain visibility with ML-based vulnerability risk prioritization and custom reporting & dashboards
Self-learning Cyber AI to discover unpredictable cyber-threats
By Swimlane Inc
CrowdStrike and Swimlane Automated EDR
Cloud-Native Logging & Security Analytics.
Bring Your Security Data to Life.
Everything you’ll need to start building on top of the Falcon Platform
An elite cybersecurity ecosystem delivers solutions and expertise to stop breaches