Falcon X: Automated Threat Intelligence

Falcon X: Automated Threat Intelligence
اتصل بنا لمعرفة السعر
(السعر غير شامل الضريبة)
(excl, VAT)
متوفر بالمخزون
التوصيل
طرق الدفع
مميزاتنا

ضمان الوكيل .

SMS تنبيهات .

استبدال واسترجاع .

طرق دفع مختلفة .

أفضل الأسعار .

PRODUCT CAPABILITIES

Falcon X: Automated Threat Intelligence

Falcon X combines automated analysis with human intelligence, enabling security teams, regardless of size or skill, to get ahead of the attacker's next move.

CHOOSE THE OPTION THAT SUITS YOU BEST

  • Falcon X

    FALCON X

    Automatically investigate incidents and accelerate alert triage and response. Built into the Falcon platform, it is operational in seconds.

    See More Below

  • Falcon X Premium

    FALCON X PREMIUM

    Premium adds threat intelligence reporting and research from CrowdStrike experts — enabling you to get ahead of nation-state, eCrime and hacktivist attacks.

    Visit Falcon X Premium Page

  • Falcon X Elite

    FALCON X ELITE

    Elite expands your team with access to an intelligence analyst to help defend against threats targeting your organization.

    Visit Falcon X Elite Page

FALCON X
FALCON X PREMIUM
FALCON X ELITE
(Requires Falcon X Premium)
ENDPOINT INTEGRATIONtooltipcheckcheckcheck
AUTOMATED INVESTIGATIONStooltipcheckcheckcheck
INDICATORS OF COMPROMISE (IOCS)tooltipcheckcheckcheck
INTELLIGENCE REPORTStooltipcheckcheck
TAILORED INTELLIGENCEtooltipcheckcheck
SNORT/YARA RULEStooltipcheckcheck
ASSIGNED INTEL ANALYSTtooltipcheck
REQUESTS FOR INFORMATIONtooltipcheck
PRIORITY INTELLIGENCE REQUIREMENTStooltipcheck

TECHNICAL FEATURES

HOW DOES FALCON X HELP?

AUTOMATED INVESTIGATIONS

AUTOMATED INVESTIGATIONS

  • Bring endpoint protection to the next level by combining malware sandbox analysis, malware search and threat intelligence in a single solution
  • Reduce the time and skills required to perform manual incident investigations
  • Identify and investigate related threats and block similar attacks in the future

Watch Demo

INDICATORS OF COMPROMISE (IOCs)

INDICATORS OF COMPROMISE (IOCs)

  • The Indicator Graph enables you to visualize relationships between IOCs, adversaries and your endpoints
  • Hunt for threats with IOCs enriched with context
  • Strengthen defenses with IOCs created from observed malware, and access CrowdStrike’s real-time global IOC feed
  • Pre-built integrations and APIs enable you to orchestrate defenses with existing security solutions

Watch Indicator Graph Demo

mummy spider threat profile

ACTOR PROFILES

  • Access 130+ profiles of nation-state, eCrime and hacktivist adversaries
  • Identify adversaries focused on attacking your business, region, or industry
  • Learn about your adversaries’ intent and capabilities and predict their next move

Read our Threat Intel Blog

ENDPOINT INTEGRATION

ENDPOINT INTEGRATION

  • As part of the Falcon platform, there is nothing extra to deploy or maintain
  • Protected endpoints automatically forward all quarantined files to Falcon X for immediate investigation
  • Falcon detections are enriched with context so you can quickly understand an attack and deploy proactive countermeasures

Request Info

TECHNICAL CENTER

For technical information on the product capabilities and features, please visit the CrowdStrike Tech Center.

  • TECHNICAL CENTER
  • TECHNICAL CENTER
  • TECHNICAL CENTER

Get Started With CrowdStrike Intelligence

الشركة المصنعة
Crowd Strike

لم يتم العثور على أي تقييمات

منتجات قد تهمك
  • الأحدث
  • الخصومات
  • تمت مشاهدته مؤخرا
 
التوصيل السريع والآمن

التوصيل داخل المملكة ودول الخليج

ضمان الخدمة والجودة

جميع منتجاتنا أصلية ذات جودة عالية

الاسترجاع خلال 7 أيام

لديك 7 أيام لاسترجاع المنتج