Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

Create Automated Workflows with Pre-Built Falcon Fusion Playbooks

CrowdStrike Falcon Fusion is an extensible framework built on the Falcon Platform that allows the orchestration and automation of complex workflows. These workflows can be used to simplify tasks, accelerate response time, and save valuable time for security teams. Falcon Fusion is included in the Falcon platform and available to all customers. Available in console now are Falcon Fusion playbooks. Playbooks are pre-built workflow templates centered around common use cases.

Evolving Threats in the Cloud and What They Mean

As organizations move data and infrastructure into the cloud, they open themselves up to new and novel cyber threats, often without realizing it. In this Fal.Con 2022 session, Duke McDonald, Strategic Threat Advisor, CrowdStrike, explains how to not only highlight threats in the cloud based on real adversary tactics and attacks, but also how to meaningfully address these risks.

Innovate with AWS and Secure with CrowdStrike

In the last two years, the shift to cloud adoption has only accelerated. This rapid shift has reinforced the profound importance of protecting IT assets from the latest cyber threats. AWS and CrowdStrike are working together to provide joint solutions for wherever you are in your cloud journey. From migrating VMware-based workloads in a lift or shift fashion or completely modernizing your infrastructure with microservices and containers, AWS and CrowdStrike have a solution to help you innovate and secure your infrastructure.

Cloud-Native Application Platform (CNAPP): Bridging the GAP for DevSecOps

As businesses move their applications, workloads and critical data to the cloud, it becomes more important to rethink how to protect those resources and how to manage those protections. Unfortunately, organizations race to adopt cloud workload protection tooling without considering the bigger picture of how all cloud security controls must work together across all layers of their technology stack, especially the application layer. As a result, they often end up with different security solutions and controls working in silos, which leads to a lack of visibility, a lack of security consistency and security gaps.

Better Together with CrowdStrike and Proofpoint

CrowdStrike and Proofpoint have partnered to provide joint customers with an innovative approach to handling threats, offering enhanced security postures from email to the device itself. CrowdStrike and Proofpoint are focused on the shared vision of protecting people and their devices from today’s most sophisticated threats.

CrowdStrike | Protecting and powering your business

Today’s cybersecurity threats are more sophisticated than ever. At CrowdStrike, we’re constantly evolving the ways we power your business and protect against breaches, before they happen. Monitoring trillions of events daily, our cloud-native technology and unified platform approach has made us an industry leader.

CrowdStrike | Protecting and powering your business

Today’s cybersecurity threats are more sophisticated than ever. At CrowdStrike, we’re constantly evolving the ways we power your business and protect against breaches, before they happen. Monitoring trillions of events daily, our cloud-native technology and unified platform approach has made us an industry leader.

The New Innovators Pavilion in The Hub at Fal.Con 2022

Get to know some of the companies who exhibited in the New Innovators Pavilion in the heart of the Fal.Con 2022 Hub! These partners are building new, innovative solutions in, around and with the CrowdStrike platform. Hear from Freddy Ludiazo at Cyber Defense Labs , Adam Pomson at Adaptive Shield, and Oliver Wai with JumpCloud.

CrowdStrike Store - Falcon Intelligence

Description: In this video, we will demonstrate the power of the automated threat intelligence available with Falcon Intelligence. Having sandbox analysis available directly in the CrowdStrike UI provides security teams with more context to make security decisions while also making them more efficient and effective given their limited time and resources.