Falcon Cloud Workload ProtectionBy CrowdStrikeBreach prevention for cloud workloads and containersCloud SecurityEndpoint Security
Falcon Device ControlBy CrowdStrikeEnsuring safe and accountable device usageNetwork and Infrastructure SecurityExtended Detection and ResponseEndpoint Security
Falcon DiscoverBy CrowdStrikeBringing answers to your IT hygiene questionsIT and Security OperationsCloud SecurityEndpoint Security
Falcon FileVantageBy CrowdStrikeFile integrity monitoring that boosts compliance and offers relevant contextual dataIT and Security OperationsThreat Intelligence
Falcon Firewall ManagementBy CrowdStrikeSimple firewall policy managementNetwork and Infrastructure SecurityExtended Detection and ResponseEndpoint Security
Falcon for MobileBy CrowdStrikeEndpoint detection and response for mobile devices – Android and iOSExtended Detection and ResponseEndpoint Security
Falcon ForensicsBy CrowdStrikeStreamlining triage data collection and analysisIT and Security Operations
Falcon Identity Threat DetectionBy CrowdStrikeGain visibility to your multi-directory or multi-cloud identity store and detect identity-based attacksIT and Security OperationsIdentity Security
Falcon Identity Threat ProtectionBy CrowdStrikeFrictionless security for workforce identities everywhereIdentity SecurityEndpoint Security
Falcon Insight XDRBy CrowdStrikeExtended detection and response (XDR)Network and Infrastructure SecurityIT and Security OperationsExtended Detection and ResponseEndpoint Security
Falcon IntelligenceBy CrowdStrikeEnrich Falcon detections with automated threat intelligence to make better, faster decisionsThreat Intelligence
Falcon Intelligence ReconBy CrowdStrikeDark web monitoring to protect your brand, employees, and sensitive dataThreat Intelligence
Falcon PreventBy CrowdStrikeNext generation antivirus (NGAV) – tried and tested to replace your AVNetwork and Infrastructure SecurityExtended Detection and ResponseEndpoint Security
Falcon SpotlightBy CrowdStrikeFast, effective real-time vulnerability managementIT and Security OperationsEndpoint Security
Falcon SurfaceBy CrowdStrikeEliminate risk from unknown internet exposure with adversary-driven EASMIT and Security OperationsThreat Intelligence