Falcon Insight relies on CrowdStrike’s revolutionary cloud-delivery architecture, providing a communications fabric unlike any other. Using an advanced graph data model, CrowdStrike Threat GraphTM collects and inspects event information in real time to prevent and detect attacks on your endpoints. As part of the Falcon endpoint protection platform, Falcon Insight records all activities of interest on an endpoint for deeper inspection - on-the-fly and after-the-fact - allowing users to quickly detect, investigate and respond to attacks - even those that evade standard prevention measures.
Indicator of Attack (IOA) Behavioral Protection:
Automatic detection of IOAs to identify attacker behavior and stop attacks, with prioritized alerts sent to Falcon web management console - eliminating the need for time-consuming manual searches.
Complete oversight of security-related endpoint activity, allowing you to “shoulder surf” adversary activities, even when they try to breach your environment.
Discover and investigate current and historic endpoint activity — go back one second, one day or even one year of activity — all at your fingertips.
Insight and Intelligence:
Events can be contextualized by threat intelligence, providing details on the attributed adversary and any other information known about the attack.
Act against adversaries in real time to stop attacks before they become breaches. Powerful response actions allow you to contain and investigate compromised systems, eradicate threats with surgical precision and get back to business quickly.
Zero Impact on Endpoints:
A cloud-delivered SaaS solution, Falcon Insight deploys in seconds with near zero impact on endpoint performance - even when analyzing, searching and investigating.
Other products from
Falcon Insight is assigned to following product groups:
- Products and Solutions for IT Security (247)
- Anti-eavesdropping solutions (27)
- Anti-spam solutions (83)
- Application security (226)
- APT protection (131)
- Asset management/ IT documentation (96)
- Awareness (188)
- Banking (IT security solutions) (204)
- Big data (91)
- BSI IT baseline protection (products and services) (166)
- CIP - Critical Infrastructure Protection (security solutions) (270)
- Cloud (computing) security (399)
- Compliance/GRC (products and services) (238)
- Computer emergency response team (CERT) (61)
- Cyber-physical systems security (62)
- Data leakage/loss prevention (198)
- Data protection (products and services) (426)
- Device management (82)
- Early warning for IT (91)
- Endpoint Security (282)
- Event management (75)
- Forensics (127)
- Health services (IT security solutions) (137)
- Industrial IT security (294)
- Internet providers (15)
- Intrusion detection/prevention (144)
- ISMS (ISO-IEC 2700x/BS 7799) (177)
- Mainframe security (88)
- Open source (software and services) (93)
- PCI-DSS (products and services) (96)
- Public key infrastructures (71)
- RFID (86)
- Secure software development (135)
- Storage solutions/ security (78)
- Threat analyses (268)
- USB storage media (66)
- Data center infrastructures (86)
- Services/Consulting/Research in IT Security (45)
- Education/training/qualification (141)