CrowdStrike Falcon

CrowdStrike Falcon

CrowdStrike
+

Related Products

  • Orca Security
    522 Ratings
    Visit Website
  • Wiz
    1,439 Ratings
    Visit Website
  • Guardz
    109 Ratings
    Visit Website
  • ESET PROTECT Advanced
    2,249 Ratings
    Visit Website
  • SOCRadar Extended Threat Intelligence
    101 Ratings
    Visit Website
  • ThreatLocker
    502 Ratings
    Visit Website
  • Safetica
    409 Ratings
    Visit Website
  • Adaptive Security
    83 Ratings
    Visit Website
  • ManageEngine ADAudit Plus
    509 Ratings
    Visit Website
  • DriveLock
    1 Rating
    Visit Website

About

CrowdStrike Falcon is a cloud-native cybersecurity platform that provides advanced protection against a wide range of cyber threats, including malware, ransomware, and sophisticated attacks. It leverages artificial intelligence (AI) and machine learning to detect and respond to threats in real time, offering endpoint protection, threat intelligence, and incident response capabilities. The platform uses a lightweight agent that continuously monitors endpoints for signs of malicious activity, providing visibility and protection without significant impact on system performance. Falcon’s cloud-based architecture ensures fast updates, scalability, and rapid threat response across large, distributed environments. Its comprehensive security features help organizations prevent, detect, and mitigate potential cyber risks, making it a powerful tool for modern enterprise cybersecurity.

About

The Gold Standard in Forensic Investigations – including Mobile Acquisition. Improve investigation efficiency with the release of optical character recognition (OCR) support that seamlessly extracts embedded text from scanned images, documents and PDFs as part of the evidence collection workflow. 21.2 also expands social media artifact support and includes an enhanced workflow with a new summary view that allows users to cross-reference disparate artifact types, significantly improving evidence processing workflows. OpenText Security (formerly Guidance Software) created the category for digital investigation software with EnCase Forensic in 1998. EnCase has maintained its reputation as the gold standard in criminal investigations and was named the Best Computer Forensic Solution for eight consecutive years by SC Magazine. No other solution offers the same level of functionality, flexibility, and has the track record of court-acceptance as EnCase Forensic.

About

Zero in on relevant evidence quickly, conduct faster searches and dramatically increase analysis speed with FTK®, the purpose-built solution that interoperates with mobile device and e-discovery technology. Powerful and proven, FTK processes and indexes data upfront, eliminating wasted time waiting for searches to execute. No matter how many different data sources you’re dealing with or the amount of data you have to cull through, FTK gets you there quicker and better than anything else. FTK uses distributed processing and is the only forensics solution to fully leverage multi-thread/multi-core computers. While other forensics tools waste the potential of modern hardware solutions, FTK uses 100 percent of its hardware resources, helping investigators find relevant evidence faster. Since indexing is done up front, filtering and searching are completed more efficiently than with any other solution.

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Platforms Supported

Windows
Mac
Linux
Cloud
On-Premises
iPhone
iPad
Android
Chromebook

Audience

Large and mid-sized enterprises across diverse industries, particularly those that require advanced threat detection and response, such as finance, healthcare, manufacturing, technology, and government. It is especially suited for organizations dealing with sensitive data and facing complex cyber threats, often with a large workforce and intricate IT infrastructure

Audience

IT security teams and investigators looking for a forensic investigation solution to facilitate the management and efficiency of investigations

Audience

Investigators and digital forensics professionals seeking a solution to manage their operations

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

Support

Phone Support
24/7 Live Support
Online

API

Offers API

API

Offers API

API

Offers API

Screenshots and Videos

Screenshots and Videos

Screenshots and Videos

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Pricing

No information available.
Free Version
Free Trial

Reviews/Ratings

Overall 4.6 / 5
ease 4.4 / 5
features 4.6 / 5
design 4.4 / 5
support 4.3 / 5

Reviews/Ratings

Overall 0.0 / 5
ease 0.0 / 5
features 0.0 / 5
design 0.0 / 5
support 0.0 / 5

This software hasn't been reviewed yet. Be the first to provide a review:

Review this Software

Reviews/Ratings

Overall 5.0 / 5
ease 5.0 / 5
features 4.0 / 5
design 4.0 / 5
support 3.0 / 5

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Training

Documentation
Webinars
Live Online
In Person

Company Information

CrowdStrike
Founded: 2011
United States
www.crowdstrike.com/platform/

Company Information

OpenText
Founded: 1998
Canada
security.opentext.com/encase-forensic

Company Information

Exterro
Founded: 2004
United States
www.exterro.com/forensic-toolkit

Alternatives

Alternatives

Alternatives

Magnet AXIOM Cyber

Magnet AXIOM Cyber

Magnet Forensics
E3:Universal

E3:Universal

Paraben Corporation
Belkasoft X

Belkasoft X

Belkasoft
OSForensics

OSForensics

PassMark Software
TrendAI Vision One

TrendAI Vision One

Trend Micro
Quin-C

Quin-C

AccessData

Categories

Categories

Categories

Computer Security Features

Anti Spam
Antivirus
Audit Trail
Compliance Management
Database Security Audit
File Access Control
Financial Data Protection
Maintenance Scheduling
Real Time Monitoring
Security Event Log
Virus Definition Update
Vulnerability Protection

Endpoint Detection and Response (EDR) Features

Behavioral Analytics
Blacklisting/Whitelisting
Continuous Monitoring
Malware/Anomaly Detection
Prioritization
Remediation Management
Root Cause Analysis

Endpoint Protection Features

Activity Log
Antivirus
Application Security
Behavioral Analytics
Device Management
Encryption
Signature Matching
Web Threat Management
Whitelisting / Blacklisting

Integrations

Automox
BeyondCorp Enterprise
CardinalOps
Check Point IPS
CrowdStrike Falcon Adversary Intelligence
Cybraics
Falcon Horizon CSPM
Google Digital Risk Protection
Mondoo
OctoXLabs
Oomnitza
OpenText Managed Extended Detection and Response
Optiv Managed XDR
Panaseer
Picus
Resmo
SeeMetrics
Symantec Data Center Security
TROCCO
Talon Enterprise Browser

Integrations

Automox
BeyondCorp Enterprise
CardinalOps
Check Point IPS
CrowdStrike Falcon Adversary Intelligence
Cybraics
Falcon Horizon CSPM
Google Digital Risk Protection
Mondoo
OctoXLabs
Oomnitza
OpenText Managed Extended Detection and Response
Optiv Managed XDR
Panaseer
Picus
Resmo
SeeMetrics
Symantec Data Center Security
TROCCO
Talon Enterprise Browser

Integrations

Automox
BeyondCorp Enterprise
CardinalOps
Check Point IPS
CrowdStrike Falcon Adversary Intelligence
Cybraics
Falcon Horizon CSPM
Google Digital Risk Protection
Mondoo
OctoXLabs
Oomnitza
OpenText Managed Extended Detection and Response
Optiv Managed XDR
Panaseer
Picus
Resmo
SeeMetrics
Symantec Data Center Security
TROCCO
Talon Enterprise Browser
Claim CrowdStrike Falcon and update features and information
Claim CrowdStrike Falcon and update features and information
Claim EnCase Forensic and update features and information
Claim EnCase Forensic and update features and information
Claim FTK Forensic Toolkit and update features and information
Claim FTK Forensic Toolkit and update features and information