product
- What you can do with CrowdStrike
- CrowdStrike Modules Falcon
- Falcon Prevent(NGAV)
- Falcon Insight(EDR)
- Falcon OverWatch (Threat Hunting)
- Falcon Discover (IT Asset Management)
- Falcon Spotlight (vulnerability management)
- Falcon Adversary Intelligence
- Falcon Identity Threat Protection/Detection
- Falcon Cloud Security(CNAPP)
- Falcon Surface(EASM)
- Falcon Shield(SSPM)
- Falcon Next-Gen SIEM
service
Application for evaluation machine
- FAQ
CrowdStrike
CrowdStrike
event report
Monthly Updates
Tried it
Product/Service Introduction
Case study column

Use Case Series: Identity and Access Management Governance

Ensuring SaaS Security to Achieve ISO Compliance

Appropriate permissions across SaaS

5 major security issues for marketing technology SaaS

Are the cloud settings you use for work safe? ~How to prevent accidents caused by incorrect cloud settings~

The latest endpoint security measures to overcome evolving cyber attacks

How to reduce the security operation load of SaaS

Basic knowledge of incorrect settings: Three Vs that cause incorrect settings in SaaS application settings

Top 4 SaaS Security Threats in 2023

Who’s in control: The SaaS app administrator paradox

Why user privileges are important for SaaS security

Hunt threats in a short period of time - CrowdStrike CrowdStrike
Inquiry/Document request
In charge of Macnica CrowdStrike Co., Ltd.
- TEL:045-476-2010
- E-mail:crowdstrike_info@macnica.co.jp
Weekdays: 9:00-17:00







![[CrowdStrike NGAV/EDR] How to use it](/business/security/crowdstrike/image/crowdstrike_product_service_thum.jpg)
![[Barriers to EDR operation] What are the challenges and solutions that await after implementation?](/business/security/crowdstrike/image/crowdstrike_feature_03_thum.jpg)
![[CrowdStrike NGAV/EDR] Product and service introduction](/business/security/crowdstrike/image/crowdstrike_sales_service_thum.jpg)