CrowdStrike

CrowdStrike

Key features that represent CrowdStrike

Key features that represent CrowdStrike

【NGAV】Falcon Prevent / Falcon USB Device Control / Falcon Firewall Management

By combining machine learning, AI, behavior detection, etc., it detects and blocks unknown attacks that cannot be detected by conventional antivirus.

  • Block fileless attacks
  • Detect and block even offline
  • Easy process tree

[Point] Thorough cause investigation is possible with detailed logs

Detailed logs enable thorough cause investigation

CrowdStrike Falcon provides a screen that allows you to check the operation and behavior in a flow based on detailed logs. You can quickly find out when, where, and what happened without having to worry about "running out of logs and not knowing the cause".

Click here for product details

【EDR】Falcon Insight

Detect attacks that slip through NGAV by monitoring actual behavior based on logs. All logs are uploaded to the cloud, so even if the logs in the device are deleted by an attacker, they can be investigated.

  • Real-time raw log visualization
  • Integrity that attackers cannot delete logs
  • It is also possible to isolate terminals remotely

Click here for product details

[Threat Hunting] Falcon Overwatch

  • Detecting everything... Too many alerts increase the operational burden
  • If you give up on detection, the risk of not noticing the intrusion of threats increases.

Pinpoint detection of attacks and threats through human monitoring

  • File-based detection
  • Behavior-based detection
  • Threat hunting detects attacks that slip through NGAV/EDR

Windows standard commands used in daily work are also checked by human eyes.

[MDR Service] Falcon Complete

The MDR service “Falcon Complete” provided by CwordStrike is a 24/365 MDR service. The Falcon Complete team carries out the entire management, prevention, monitoring and response process for you.

Click here for product details

Diverse lineup of functions

Diverse lineup of functions

[Cloud Security (CNAPP)] Falcon Horizon/Cloud Workload Protection

Horizon assesses cloud service configurations and activities to identify potential misconfigurations (IOMs) and suspicious behavior/attack patterns (IOAs). Cloud Workload Protection provides visibility into data related to instances/virtual machines (VMs) and containers in multi-cloud and hybrid environments.

Click here for product details

[Host Firewall Integrated Management] Falcon Firewall Management

Manage Windows Firewall functionality on Falcon. Visualize and control communications that match pre-created rules. Firewall policies can be set/applied for each host group.

Click here for product details

[Threat Intelligence] Falcon X

Ability to profile cyber attackers, provide information and reports on attack operations, and query the IOC's database. By deploying it in-house, you can enhance security.

Click here for product details

[Automatic Malware Analysis] Falcon Sandbox

Analyze the malware found in the company in the Box and acquire IOC information such as URL and Hash value. Regardless of malignancy judgment, a report of the analyzed sample is generated after analysis, and can be viewed and obtained.

Falcon Sandbox

[Vulnerability Management] Falcon Spotlight

Collect and visualize vulnerabilities in OS and third-party applications. Real-time visualization is achieved by utilizing Flacon agent logs. Prevent exploitative attacks by quickly detecting and patching vulnerabilities.

Click here for product details

[USB device control] Falcon Device Control

Visualize and control USB device usage status for terminals with Falcon agent installed. Get real-time logs of who, when, and what device was used. Policies such as usage prohibition can also be set collectively.

Click here for product details

[ID Protection (ITD/ITP)] Falcon Identity Threat Protection/Detection

Conduct a risk assessment regarding IDs and check the internal environment. Get real-time alerts when identity-based incidents occur. By setting your own policy, you can perform actions such as authentication block and MFA symbiosis in real time.

Click here for product details

[IT Asset Management] Falcon Discover

Visualize the status of internal IT assets from the three perspectives of applications, terminals, and accounts. Gain real-time visibility into unmanaged devices and application usage, versions, and endpoint environments.

Click here for product details

External institution evaluation

System requirements, OS

It supports Windows, macOS, Linux (including Amazon Linux), iOS, and Android operating systems.

Please contact us for details on supported versions for each OS.

Inquiry/Document request

In charge of Macnica CrowdStrike Co., Ltd.

Mon-Fri 8:45-17:30