Falcon Zero Trust

طرح سؤال
Falcon Zero Trust
اتصل بنا لمعرفة السعر
(السعر غير شامل الضريبة)
(excl, VAT)
متوفر بالمخزون
التوصيل
طرق الدفع
مميزاتنا

ضمان الوكيل .

SMS تنبيهات .

استبدال واسترجاع .

طرق دفع مختلفة .

أفضل الأسعار .

Falcon Zero Trust

CrowdStrike Falcon® Zero Trust enables frictionless Zero Trust security with real-time threat prevention and IT policy enforcement using identity, behavioral and risk analytics.

BENEFITS

FRICTIONLESS ZERO TRUST FOR WORKFORCE IDENTITIES EVERYWHERE

  • triage icon

    GAIN VISIBILITY OF WORKFORCE IDENTITIES ACROSS MULTI-DIRECTORY ENVIRONMENTS

    Falcon Zero Trust enables unified visibility and control of user access to applications, resources and identity stores, with actionable insights into user behavior and risks, eliminating security blindspots across hybrid environments.

  • Reduce threat detection & response times without using logs

    REDUCE THREAT DETECTION & RESPONSE TIMES WITHOUT USING LOGS

    Falcon Zero Trust reduces false positives, brings down the mean time to detect and resolve incidents by eliminating the need for complex, error-prone log analysis, and improves SOC analysts’ efficiencies by cutting down alert fatigue.

  • resources icon

    ENFORCE ZERO TRUST SECURITY WITH ZERO FRICTION

    Falcon Zero Trust enforces consistent risk-based policies to automatically block, allow, audit or step up authentication for every identity, at the same time ensuring a frictionless login experience for genuine users.

TECHNICAL FEATURES

HOW DOES FALCON ZERO TRUST HELP?

identity protection dashboard suspicious movement

SEGMENT WORKFORCE IDENTITIES

  • Provides continuous multi-directory visibility into the scope and the impact of access privileges for identities across Microsoft Active Directory (AD), Azure AD and cloud single sign-on (SSO) solutions.
  • Automatically classifies identities into hybrid (identities that are on on-premises and cloud AD) and cloud-only (identities that reside only on Azure AD).
  • Segments accounts into human, service, shared accounts and privileged accounts.
  • Provides a customizable attack surface overview with insights into user risk and behavior changes over time, like an increase in account lockouts, high-risk endpoints, compromised passwords, etc.

Watch Demo

AUTOMATE THREAT DETECTION AND RESPONSE

AUTOMATE THREAT DETECTION AND RESPONSE

  • Enables hybrid identity store protection with continuous inspection of live authentication traffic, including encrypted protocols such as LDAP/S.
  • Provides continuous assessment of security and incidents around identity threats without requiring the ingestion of logs or complex analysis.
  • Uncovers reconnaissance (e.g., LDAP, BloodHound, SharpHound, credential compromise attacks), lateral movement (e.g., RDP, Mimikatz tool, unusual endpoint usage, unusual service logins, etc), and persistence (e.g., Golden Ticket attack) with advanced analytics and patented machine learning technology.
  • Speeds up security investigations using intuitive threat hunting, with predefined search criteria, like but not limited to authentication events, unencrypted protocols, user roles, IP reputation and risk scores.
VERIFY IDENTITIES WITH ZERO FRICTION

VERIFY IDENTITIES WITH ZERO FRICTION

  • Defines and enforces policies in real time, based on authentication patterns, behavior baselines and individual risk scores to verify identities using step-up authentication such as multifactor authentication (.e.g MFA).
  • Automatically secures access to identity stores and applications, with improved user experience, by triggering identity verification only when the risk increases or if there’s a deviation from normal behavior.
  • Reduces the attack surface by extending MFA to any resource or application, including legacy/proprietary systems and tools — for example, desktops that are not covered by cloud-based MFA solutions, and tools like PowerShell and protocols like RDP over NTLM.
  • Automatically resolves security incidents that the user approves using identity verification methods such as 2FA/MFA, without involving security analysts and help desk tickets.

Download White Paper: A Frictionless Zero Trust Strategy

الشركة المصنعة
Crowd Strike

لم يتم العثور على أي تقييمات

خصومات / الأكثر مبيعاً

  • الأكثر مبيعاً
  • الخصومات
  • شوهد مؤخرا
 
التوصيل السريع والآمن

التوصيل داخل المملكة ودول الخليج

ضمان الخدمة والجودة

جميع منتجاتنا أصلية ذات جودة عالية

الاسترجاع خلال 7 أيام

لديك 7 أيام لاسترجاع المنتج