Site Search

CrowdStrike

CrowdStrike

Falcon Shield

Falcon Shield is a SaaS Security Posture Management (SSPM) solution that audits SaaS settings. It provides a function to continuously check whether security settings and compliance with various compliance standards are met in order to ensure the safe use of SaaS.

Cross-sectional risk management of SaaS used in various business departments is possible, realizing best practices that reflect the latest state of SaaS and security frameworks. As part of your current security operations, you can manage SaaS governance with minimal additional man-hours.

  • Three things you can do with Falcon Shield

    • 様々な事業部で使われているSaaSの横断的なリスク管理を実現
    • Achieve best practices that reflect the latest state of SaaS, security frameworks, etc.
    • 今のセキュリティ業務の一環として、最小の追加工数でSaaSのガバナンス管理を実現
  • The Falcon Shield Advantage

    • Supports over 180 types of SaaS (Office365, Salesforce, etc.)
    • Supports two data collection methods: API + administrator privileges
    • Supports continuous audit operations, unlike one-shot diagnostic services

Falcon Shield Inventory provides complete visibility

Taking SaaS Security to the Next Level

The Inventory function of Falcon Shield allows you to visualize your IT assets from multiple angles and take steps to prevent incidents one step ahead. Here are two main features:

User Inventory Function
  • All user information at a glance
  • Easily manage access permissions
Minimize security risks
Data Inventory Function
  • Complete visibility into all data within the enterprise
  • Ensure data security
⇒Security management can be performed smarter and more efficiently

Falcon Shield-Threat Center

Are you protected against SaaS identity threats?

What is ITDR (Identity Threat Detection and Response)?

ITDR (Identity Threat Detection and Response) is a security that detects threats to user authentication information in real time and responds quickly. Falcon Shield's ITDR function ensures the safety of business promotion as an identity security suitable for the characteristics and fluidity of SaaS.

Do you have a problem like this?

Unauthorized access or hijacking
Worried about data leaks
Vulnerable
Worried about vulnerability
I use multiple authentication platforms, but I want to centrally manage authentication information.
When an incident occurs
I want to minimize the damage.

Key Features of Threat Center

MITRE ATT&CK Mapping
Aligning detected attack techniques with the MITRE ATT&CK framework enhances incident response capabilities and reduces the impact of threat detection.
Alerts and Notifications
Receive alerts across multiple channels, including email, Slack and Teams, notifying you of potential security incidents or suspicious behavior that require immediate investigation and action.
SIEM and SOAR Integration
Seamlessly integrates with existing Security Operation Center (SOC) and Security Orchestration, Automation and Response (SOAR) tools to improve threat correlation and incident response efficiency.
Repair procedure
Get actionable recommendations and step-by-step guidance to address and mitigate vulnerabilities, weaknesses, or breaches that could result in a security incident.

Inquiry/Document request

In charge of Macnica CrowdStrike Co., Ltd.

Weekdays: 9:00-17:00