Complete breach protection and visibility for cloud workloads
Next Generation AntiVirus - tried and tested to replace your AV.
Cloud Security Posture Management
Endpoint Detection and Response (EDR)
Secure access to users and devices
Breach prevention for cloud workloads and containers.
Threat forensics and enhanced malware protection
By Mimecast Email Security
Integrated email and endpoint security
Enriched and actionable context across the attack surface.
End-to-end protection from device to application secures work beyond the perimeter.
Defense in depth with cloud-scale cybersecurity strategies.
Protection and visibility for your greatest cybersecurity risk—your people
Accelerate threat and vulnerability prioritization, response and remediation
Automated and customizable notifications with Slack to streamline IR and accelerate response based on threat detections.
Insight to empower security teams
File integrity monitoring that boosts compliance and offers relevant contextual data.
Enrich Falcon detections with automated threat intelligence to make better, faster decisions
Fast, effective real-time vulnerability management.
Ensure secure and fast access to any application and the Internet - from any device, anywhere.
Streamlining Triage Data Collection and Analysis
Frictionless Security for Workforce Identities, Everywhere
Connect with Confidence
By Dragos, Inc.
Detect Industrial Threats on Your CrowdStrike Falcon® Endpoints.
SaaS-delivered network detection and response that correlates endpoint and network insights to stop breaches faster.
Safeguard your organization with Application Allowlisting - effective endpoint protection.
Full-spectrum IT/OT visibility and threat detection.
Detect and investigate advanced attacks and insider threats with endpoint telemetry and behavior analytics.
Automated and customizable notifications with Microsoft Teams to streamline IR and accelerate response.
Seamless OS patching and full disk encryption across your devices, all from a single console.
Enable a micro-security perimeter around private applications
By Adaptive Shield
Enhance SaaS Security Assessments for Holistic Zero Trust
Intelligent solutions for the cloud era.
By DTEX Systems
Supercharge the CrowdStrike Falcon® platform with human behavioral intelligence & forensics
Seamless network-to-endpoint visibility and detection to stop attackers in their tracks.
Elevate protection with enriched threat intelligence for domains, URLs, and IP addresses
Automated and customizable notifications with PagerDuty to streamline IR and accelerate response based on threat detections.
By DoControl, Inc.
Cross-reference CrowdStrike® detections with the same files stored in SaaS applications to find and remediate malicious file...
Automated malware analysis.
Correlate network, endpoint, and threat insights to stop breaches fast.
Automated and customizable ServiceNow incident tickets to streamline response based on Falcon Fusion
Simplifies host firewall management
Ensuring safe and accountable device usage.
Bringing Answers to your IT Hygiene Questions.
Dark web monitoring to protect your brand, employees, and sensitive data
EDR solution for mobile devices - Android and iOS.
Gain visibility to your multi-directory or multi-cloud identity store and detect identity-based attacks.
By TrueFort Inc.
Get Zero Trust application protection that secures all your applications and cloud workloads.
Predictive risk scores and DNS intelligence for rapid in-context profiling of domain observables.
Detect and Respond to Advanced Threats
Modernize your security operations with a cloud SIEM
Cloud Network Detection and Response
Application Access Redefined: Secure, Simple, Fast
By Awake Security
Advanced network detection and response platform
Cyber Threat & Malware Search Engine.
By Vulcan Cyber
Manage the vulnerability and cyber risk lifecycle
Tines automates workflows across your security tools and lets you focus on what matters most.
Open XDR solution that harnesses adversary proficiency and ML to detect threats across all surfaces.
Network and Supply Chain Threat Detection.
By IBM Security
Manage defenses against growing threats
Automated and customizable notifications using webhooks to streamline IR and accelerate response based on threat detections
Automate data collection to speed up investigation and orchestrate response across all endpoints – within one interface.
Network Access Control for Wired, Wireless, and WAN.
By Obsidian Security
Start in minutes and protect SaaS applications with unified monitoring, detection and response
By CyberArk Software
Preventing the malicious use of privileged accounts and credentials.
Device Posture & Risk Policy.
Gain comprehensive and automated IOC enrichment powered by Cybersixgill’s data lake from the deep and dark web.
By CyberRes, A Micro Focus Line of Business
Detect Insider Threats with UEBA
By TruU, Inc.
The first continuous identity authentication and identification solution, powered by Presence™
Take Control of Cyber Risks
By InfoExpress Inc.
Simple & Secure Network Access Control
Advanced cybersecurity through Collective Defense
Gain Layered Asset Visibility
By Talon Cyber Security
Secure Your Unmanaged Devices
Automated and customizable notifications with Jira to streamline IR and accelerate response
The fast, trusted way to get compliant.
Get the right data to the right destinations in the right formats
Enable XDR response actions for Zscaler Internet Access in Falcon Insight XDR
Total Cloud Security
By SafeGuard Cyber
SafeGuard Cyber provides visibility and security to social, chat, and collaboration cloud apps.
By Perception Point
Preventing any malicious content identified in the endpoint from spreading across the organization
Quick and effective malware analysis using 20+ AV and 10+ reputation sources.
By Illusive Networks
Deterministic Threat Identification and Containment
By Acalvio Technologies
Comprehensive Identity Security, including Visibility and Management of Identity Security Posture
Democratizing Threat Intelligence.
By Kenna Security
Predictive, data-driven vulnerability management.
Platform for threat-centric security operations
Gain visibility with ML-based vulnerability risk prioritization and custom reporting & dashboards
Actively Defending the Enterprise of Things
Intelligence Led Network Protection.
By Axis Security
Zero Trust Access Made Simple.
Self-learning Cyber AI to discover unpredictable cyber-threats
Zero Trust authorization policies
By Beyond Identity
Identity and device assurance for continuous, risk-based authentication
Eliminate Security Black Holes Across your IT, IoT, IoMT, and OT Infrastructure
Healing the Devices that Heal
By Elevate Security
Automatically identify risky users and tailor safeguards to prevent attacks
Track and protect your data, anywhere
By Swimlane Inc
CrowdStrike® and Swimlane Automated EDR
Cloud-Native Logging & Security Analytics.
Bring Your Security Data to Life.
Everything you’ll need to start building on top of the Falcon Platform
An elite cybersecurity ecosystem delivers solutions and expertise to stop breaches