Crowd Falcon

Next-generation antivirus (NGAV),
Protect your company from advanced cyberattacks!

Reinforce security and solve operational issues at the same time!Reinforce security and solve operational issues at the same time!

Enhanced security Immediate detection and prevention of diversifying attacks Accurately grasping intrusion routes and infection status Remote network isolation and restoration possible Operational problem solving Cloud environment that is easy to introduce and manage Lightweight single agent reduces terminal load Daily No signature update work required Provides high security even for telework Enhanced security Immediate detection and prevention of diversifying attacks Accurately grasping intrusion routes and infection status Remote network isolation and restoration possible Operational problem solving Cloud environment that is easy to introduce and manage Lightweight single agent reduces terminal load Daily No signature update work required Provides high security even for telework

CrowdStrike Falcon Prevent (NGAV) Free Trial

For customers who are considering purchasing CrowdStrike Holdings、Inc. 's CrowdStrike Falcon,
You can evaluate it in the production environment first before introducing it.
We will diagnose the customer's production network and propose an operation method for the detected event.

One platform covers all environments

様々な分野の企業で導入実績多数

bandai namco logo
DeNA logo
cookpad logo
Toukei computer logo

* In Completeness of Vision in Our Magic Quadrant Research
Rated as the highest position.

Gartner, Magic Quadrant for Endpoint Protection Platforms, Peter Firstbrook et al., 20 August 2019
Gartner does not endorse any vendor, product or service depicted in any Gartner Research publication. Nor does it advise technology users to select only those vendors with the highest ratings or other designation. Gartner Research publications consist of the opinions of Gartner Research and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Information system personnel have

Issues that cannot be addressed by existing antivirus measuresIssues that cannot be addressed by existing antivirus measures

Task 1
Task 2
Task 3
Task 4
Task 5
Overcome these challenges with CrowdStrikeFalcon Prevent

All solved!

Detect and block attacks with machine learning, AI, and behavior.

Since attacks are detected by machine learning, AI, and behavior, it is possible to detect not only malware but also fileless attacks. In addition to detection, it has blocking functions such as automatic quarantine of detected files and automatic termination of malicious behavior.
In addition, detection and blocking can be performed in an offline environment, and blocked malware can be immediately quarantined in a safe format.

It is possible to visualize the process before and after the attack and easily understand the intrusion route.

Not only can you detect and block attacks, but you can also investigate their alerts. Conventional anti-virus products do not know the intrusion route and cannot take countermeasures. .

  • Process detection time/execution user name
  • Detection summary
    (what was detected and why)
  • attack method used
  • History of executed command lines
  • File Path
  • hash value
  • Process start and end time
  • Quarantined file details
  • User details
    (login time, login domain, etc.)
  • host details
    (OS, local IP, MAC address, etc.)
  • Network communication history
  • History of registry operations
  • File read/write history

When an incident occurs,
2 clicks from remote terminal
Enables network isolation and recovery

If you need to take action, you can isolate the terminal from the network with two clicks from the alert investigation screen. In addition, remote operations using commands such as obtaining/deleting files and checking/deleting registries can also be performed. Since the administrator can remotely deal with and restore the problem, there is no need to collect the terminal, and immediate action can be taken. *Please note that this function must be added as an option.

signatureless
With lightweight agents,
Reduced load on terminals

Since it uses a machine learning engine that does not rely on signatures, the data written to the disk is as light as several tens of megabytes, and the CPU usage rate during operation is less than 1%, which is a low load on the terminal.

To provide a complete SaaS type,
Daily signature updates
No maintenance required including

Since it is provided as a complete SaaS type, there is no need to set up an in-house management server, eliminating the need for server maintenance. In addition, the signature-independent specification eliminates the need for daily signature updates.

Falcon Prevent
demonstration

In addition to being able to grasp the intrusion route and the series of process movements at a glance with the highly visible process tree,
We will introduce an alert screen that allows you to check the detailed information of each process according to the attack scenario.

CrowdStrike Falcon Prevent (NGAV) Free Trial

For customers who are considering purchasing CrowdStrike Holdings、Inc. 's CrowdStrike Falcon,
You can evaluate it in the production environment first before introducing it.
We will diagnose the customer's production network and propose an operation method for the detected event.

One platform covers all environments

Provide comprehensive endpoint protection

CrowdStrike Fakcon

As a cloud-based endpoint security platform, it offers not only NGAV and EDR, but also threat hunting services, device control, and asset management by a professional group of cyber attack analysis with a single agent. Even if you want to add functions, there is no need for additional environment construction or work, so you can easily add functions. A simple architecture optimized for the cloud provides countermeasures against ever-evolving threats.

One platform covers all environments

sees through all the actions of attackers

Operation logs are uploaded to the cloud in real time from the terminal, so even if the attacker erases the traces, it is possible to grasp all the actions.
In addition, we have many dashboards that visualize the behavior on the terminal that is necessary for incident response, so you can quickly find the information you want. In addition, it is possible to visualize a series of attacks by attackers, including lateral expansion activities, and alert investigations, including identification of the scope of impact and investigation of intrusion routes, are possible on a single screen.

with intelligence

We have our own intelligence, and our intelligence team monitors over 130 attacker groups around the world every day. We also collect 3 trillion event logs per week from Falcon sensors in 176 countries around the world, making our intelligence stronger by collecting them in one place. That intelligence is tied to Falcon, so you can always protect your customers with products that respond to the latest threats.
In addition, with Falcon Overwatch capabilities, CrowdStrike Holdings、Inc. 's threat hunting team is available 24/7 to proactively hunt and investigate threat activity in your environment. They can detect advanced attacks that machines cannot.

Points that decided to introduce "CrowdStrike Falcon"Points that decided to introduce "CrowdStrike Falcon"

User case

bandai namco logo
DeNA logo
cookpad logo
Toukei computer logo

Regularly held latest security seminars

Help customers on a regular basis
We are holding a seminar.

Click on the seminar of your choice.
Please check the latest schedule.

Copyright 2004 Macnica Networks Corp.

back up

Document request Inquiry Evaluation version application