CROWDSTRIKE

Whitepaper

DISRUPTING THE CYBER KILL CHAIN: HOW TO CONTAIN USE OF TOOLS AND PROTOCOLS

Download our Disrupting The Cyber Kill Chain white paper to learn how Falcon Identity Protection solution can: - Prevent lateral movement and unauthorized domain access due to the misuse of network credentials via reconnaissance tools - Block and easily contain PowerShell, PsExec and other attacking tools - Deeply inspect authentication protocols such as NTLM, DCE/RPC, Kerberos and LDAP to control protocol usage - Reduce risk of credential forwarding, password cracking and other credential-based attacks such as Pass-the-Hash and Golden Ticket

Network
Whitepaper

CYBERSECURITY AND COVID-19: Securing today’s newly distributed workforce

Cybersecurity remains mission-critical to organizations, regardless of size. In these current challenging times, organizations need to focus on business resiliency, while reassuring employees and customers that they are protected, so they can continue to focus on the things that matter most. This ebook covers a wide range of topics including best practices and recommendations that can help your organizations ensure security across all your users with speed and efficiency.

Network
Whitepaper

A Proven Approach to Cloud Workload Security

This white paper shares some of the knowledge and experience the CrowdStrike team has gained from securing its own cloud. It begins by describing the major factors that make the cloud vulnerable to threats and sharing some security-related observations made by the CrowdStrike cloud team. It then explains CrowdStrike’s approach to protecting a cloud infrastructure that is processing trillions of events per week and continues to grow as the company adds new capabilities to the Falcon platform and gains new customers. The paper concludes by describing the role the Falcon platform can play in protecting cloud workloads.

Cloud Computing
Technology Solutions
Whitepaper

CROWDSTRIKE SERVICES CYBER FRONT LINES REPORT

Download the report today for valuable information and guidance that can inform your security strategy.

Financial Security
Network
Desktop/Laptop OS
Whitepaper

THE RISE OF MACHINE LEARNING IN CYBERSECURITY

Explains machine learning (ML) technology — what it is, how it works and why it offers better protection against the sophisticated attacks that bypass standard security measures.

Network
Business Processes
Whitepaper

ENDPOINT PROTECTION BUYERS GUIDE

The critical features and capabilities you should look for in true next-gen endpoint protection. This guide outlines the five elements that CrowdStrike recommends as key to optimal endpoint protection and offers details on how to assess their effectiveness.

Network
Whitepaper

CROWDSTRIKE FALCON COMPLETE - How to Achieve Instant Cybersecurity Maturity for Organizations of All Sizes

This white paper explores the challenges organizations face in getting the most out of a security solution. It also offers insights on how CrowdStrike Falcon Complete can raise you to the highest level of endpoint protection with speed and efficiency, regardless of your size and IT resources.

Technology Solutions
Network
Whitepaper

A FRICTIONLESS ZERO TRUST STRATEGY

Download this white paper to learn how to realize frictionless Zero Trust to understand authentication gaps across on-premises and cloud identity stores, detect, analyze and reduce risks in real-time and improve user experience and operational efficiency for both the end-users and IT teams.

Technology Solutions
Software
Financial Security
Network