Falcon X: Automated Threat Intelligence

Ask a question
Falcon X: Automated Threat Intelligence
Contact us for a price
(السعر غير شامل الضريبة)
(excl, VAT)
In stock
Delivery
Payment options
Our advantages

Manufacturer's warranty .

SMS notification .

Return and exchange .

Different payment methods .

Best price .

PRODUCT CAPABILITIES

Falcon X: Automated Threat Intelligence

Falcon X combines automated analysis with human intelligence, enabling security teams, regardless of size or skill, to get ahead of the attacker's next move.

CHOOSE THE OPTION THAT SUITS YOU BEST

  • Falcon X

    FALCON X

    Automatically investigate incidents and accelerate alert triage and response. Built into the Falcon platform, it is operational in seconds.

    See More Below

  • Falcon X Premium

    FALCON X PREMIUM

    Premium adds threat intelligence reporting and research from CrowdStrike experts — enabling you to get ahead of nation-state, eCrime and hacktivist attacks.

    Visit Falcon X Premium Page

  • Falcon X Elite

    FALCON X ELITE

    Elite expands your team with access to an intelligence analyst to help defend against threats targeting your organization.

    Visit Falcon X Elite Page

FALCON X
FALCON X PREMIUM
FALCON X ELITE
(Requires Falcon X Premium)
ENDPOINT INTEGRATIONtooltipcheckcheckcheck
AUTOMATED INVESTIGATIONStooltipcheckcheckcheck
INDICATORS OF COMPROMISE (IOCS)tooltipcheckcheckcheck
INTELLIGENCE REPORTStooltipcheckcheck
TAILORED INTELLIGENCEtooltipcheckcheck
SNORT/YARA RULEStooltipcheckcheck
ASSIGNED INTEL ANALYSTtooltipcheck
REQUESTS FOR INFORMATIONtooltipcheck
PRIORITY INTELLIGENCE REQUIREMENTStooltipcheck

TECHNICAL FEATURES

HOW DOES FALCON X HELP?

AUTOMATED INVESTIGATIONS

AUTOMATED INVESTIGATIONS

  • Bring endpoint protection to the next level by combining malware sandbox analysis, malware search and threat intelligence in a single solution
  • Reduce the time and skills required to perform manual incident investigations
  • Identify and investigate related threats and block similar attacks in the future

Watch Demo

INDICATORS OF COMPROMISE (IOCs)

INDICATORS OF COMPROMISE (IOCs)

  • The Indicator Graph enables you to visualize relationships between IOCs, adversaries and your endpoints
  • Hunt for threats with IOCs enriched with context
  • Strengthen defenses with IOCs created from observed malware, and access CrowdStrike’s real-time global IOC feed
  • Pre-built integrations and APIs enable you to orchestrate defenses with existing security solutions

Watch Indicator Graph Demo

mummy spider threat profile

ACTOR PROFILES

  • Access 130+ profiles of nation-state, eCrime and hacktivist adversaries
  • Identify adversaries focused on attacking your business, region, or industry
  • Learn about your adversaries’ intent and capabilities and predict their next move

Read our Threat Intel Blog

ENDPOINT INTEGRATION

ENDPOINT INTEGRATION

  • As part of the Falcon platform, there is nothing extra to deploy or maintain
  • Protected endpoints automatically forward all quarantined files to Falcon X for immediate investigation
  • Falcon detections are enriched with context so you can quickly understand an attack and deploy proactive countermeasures

Request Info

TECHNICAL CENTER

For technical information on the product capabilities and features, please visit the CrowdStrike Tech Center.

  • TECHNICAL CENTER
  • TECHNICAL CENTER
  • TECHNICAL CENTER

Get Started With CrowdStrike Intelligence

The manufacture company
Crowd Strike

No reviews found

Possibly you may be interested
  • Most Popular
  • On Sale
  • Recently Viewed
 
 
 
Fast and high quality delivery

Delivery within KSA and Gulf countries

Quality assurance and service

All of our products are original with high quality

Returns within 7 days

You have 7 days to test your purchase