Report
CrowdStrike wins the Frost & Sullivan Customer Value Leadership Award in global cloud security
View reportReports, white papers, crowdcasts, and more.
CrowdStrike named a Leader for the fifth consecutive time in the 2024 Gartner® Magic Quadrant™ for Endpoint Protection Platforms.
Get the latest intrusion insights from the pioneer of adversary intelligence.
Uncover notable themes, trends and events across the cyber threat landscape.
All Resources
Filter by
Report
CrowdStrike wins the Frost & Sullivan Customer Value Leadership Award in global cloud security
View reportCase Study
Technical Case Study: CrowdStrike Falcon Adversary OverWatch defends against cross-domain attacks
View storyCustomer Story
Gulf Bank Swaps Four Security Products for the CrowdStrike Falcon Platform, Saving Time and Money
View storyCustomer Story
Pegasystems Consolidates Endpoint, Identity and Cloud Security with CrowdStrike
View storyCustomer Story
National Australia Bank Recommends CrowdStrike Falcon Go to Give SMBs Peace of Mind
View storyCustomer Story
Australia’s Largest Business Bank Protects Customers and Colleagues Through Operational Resilience
View storyCustomer Story
Aflac Drives Consolidation with the Falcon Platform, Eliminating 15 Point Security Tools in Three Years
View storyCustomer Story
Greenhill Advises Global Finance Clients While Protecting Data With Leading Security
View storyCustomer Story
The City of Las Vegas Makes a Safe Bet on CrowdStrike for Security and Brand Protection
View storyReport
CrowdStrike Named a Major Player in IDC MarketScape: Worldwide SIEM for Enterprise 2024 Vendor Assessment
View reportCustomer Story
Trajan: Impacting Lives While Protecting Customers with CrowdStrike Falcon® Complete
View storyCrowdCast
Enhancing Cybersecurity for Education: Leveraging the FCC Schools and Libraries Pilot Program with CrowdStrike
Listen to CrowdCastCrowdCast
Beyond Boundaries: Revolutionizing Identity Security from On-Premises Environments to the Cloud
Listen to CrowdCastWhite Paper
Future-Proof Your SOC: A Migration Guide from Legacy to Next-Gen SIEM with CrowdStrike
Read whitepaperCustomer Story
How CrowdStrike Deployed Next-Gen SIEM to Increase Search Speed by 150x and Find Issues in Seconds
View storyReport
2024 Gartner® Peer Insights™ Voice of the Customer for Endpoint Protection Platforms
View reportCrowdCast
Introducing the Next Generation of IT Automation: CrowdStrike Falcon® for IT
Listen to CrowdCastCustomer Story
Porter Airlines Consolidates Its Cloud, Identity and Endpoint Security with CrowdStrike
View storyCrowdCast
Unstoppable Innovations CrowdCast Series: From Red-Hot Releases to Future Roadmap Session #3
Listen to CrowdCastWhite Paper
Keep Adversaries in the Dark: 6 Requirements to Minimize External Exposure Risks
Read whitepaperCrowdCast
Unstoppable Innovations CrowdCast Series: From Red-Hot Releases to Future Roadmap Session #2
Listen to CrowdCastReport
CrowdStrike named an Overall Leader—positioned furthest to the right and highest in Innovation for ITDR by KuppingerCole
View reportCrowdCast
Unstoppable Innovations CrowdCast Series From Red-Hot Releases to Future Roadmap Session #1
Listen to CrowdCastCustomer Story
SA Power Networks: Securerly Delivering Reliable Energy to South Australia
View storyCustomer Story
Fifth Largest City in the U.S. Deploys World-Class Endpoint Security and Services to Protect Diverse Infrastructure
View storyWhite Paper
Unlock Proactive Exposure Management: 5 Key Elements and Why Traditional Approaches Fail
Read whitepaperReport
2024 Gartner® Peer Insights™ Voice of the Customer for External Attack Surface Management
View reportCrowdCast
SEC Readiness: Demystifying the Four-Day Breach Disclosure Requirement
Listen to CrowdCastData Sheet
Falcon Cloud Security: Cloud Infrastructure Entitlement Management (CIEM) Solution Brief
View data sheetDemo
Conversations with Charlotte AI: “Show me critical vulnerabilities on internet-facing endpoints”
Watch demoCustomer Story
After Years of Success, State of Wyoming Looks to Expand CrowdStrike Protections Statewide
View storyCustomer Story
Commercial Bank of California: Hardening our cloud environments against data loss
View storyCustomer Story
AARNet: Balancing an Open Academic Environment with a Strong Cyber Defense
View storyWhite Paper
How to Build a Business Case for Unifying Endpoint and Identity Security
Read whitepaperCrowdCast
Top 2024 Cybersecurity Trends Series – Session #3: Cloud Security Consolidation Extends Protection from Code to Runtime
Listen to CrowdCastDemo
Conversations with Charlotte AI: “Write me a query to search for a powershell execution on a Windows system”
Watch demoDemo
Conversations with Charlotte AI: Conducting In-depth Investigations with Follow-Up Questions
Watch demoWhite Paper
Application Security Posture Management: Securing Cloud-Native Applications at Scale
Read whitepaperCrowdCast
Top 2024 Cybersecurity Trends Series – Session #2: Cybersecurity Consolidation – Perspectives from Intel’s CISO & New Research
Listen to CrowdCastCrowdCast
Top Cybersecurity Trends for 2024 Series - Session #1: Generative AI Accelerates Protection and Investigation
Listen to CrowdCastDemo
Conversations with Charlotte AI: “Are adversaries selling credentials for travelairlines.com on the dark web?”
Watch demoDemo
Conversations with Charlotte AI: “Describe Scanbox malware and any indicators I should look out for."
Watch demoDemo
Conversations with Charlotte AI: “What is my exposure to vulnerabilities used by Scattered Spider?”
Watch demoWhite Paper
The Impact of Securing Your Cloud Environment with Falcon Cloud Security
Read whitepaperDemo
Falcon Identity Protection Unified Identity Protection for Hybrid Environments: Demo Drill Down
Watch demoWhite Paper
Safeguarding Healthcare Mergers & Acquisitions (M&A) by Integrating Cybersecurity from Day One
Read whitepaperCrowdCast
The Convergence of AI+ Cybersecurity with CrowdStrike and Abnormal Security
Listen to CrowdCastGuide
CrowdStrike Unified Alerts Add-on for Splunk Installation and Configuration Guide v2.3.0+
View guideCrowdCast
Unstoppable Innovations CrowdCast Series - Session #4: Rise Above SCATTERED SPIDER with Next-Gen SIEM
Listen to CrowdCastCustomer Story
Tabcorp Partners with CrowdStrike to Drive Stronger Security from Endpoint to Cloud
View storyCustomer Story
CrowdStrike Helps Medium-Sized Business Build Robust Corporate-Class Cybersecurity Defense
View storyWhite Paper
Crafting a Battle-Tested Team with the CrowdStrike Adversary Emulation Exercise
Read whitepaperCrowdCast
Unstoppable Innovations CrowdCast Series - Part 3: Stop Big Game Hunting Adversaries with Modern Data Protection
Listen to CrowdCastCrowdCast
Unstoppable Innovations CrowdCast Series - Part 1: Defeat Cloud Adversaries with CrowdStrike and Bionic
Listen to CrowdCastReport
2023 Frost Radar™ Leader: CrowdStrike’s Cloud-Native Application Protection Platform (CNAPP)
View reportReport
IDC MarketScape: Worldwide Risk-Based Vulnerability Management Platforms 2023 Vendor Assessment
View reportGuide
CrowdStrike Falcon FileVantage Add-on for Splunk Installation and Configuration Guide
View guideCrowdCast
Unstoppable Innovations CrowdCast Series - Part 2: Shut Down Adversary Opportunities with Proactive Exposure Management
Listen to CrowdCastWhite Paper
The Power of One: Combating Cybersecurity Fragmentation with a Consolidated Security Platform
Read whitepaperCrowdCast
Cloud Threat Summit Virtual Event: The Rise of the Cloud-Conscious Adversary
Listen to CrowdCastCustomer Story
Luxury Mattress Retailer Puts Log Management Issues to Bed with CrowdStrike
View storyReport
2023 Gartner® Peer Insights™ Voice of the Customer for Endpoint Protection Platform Report
View reportCrowdCast
MITRE Engenuity ATT&CK Evaluations: Inside the Enterprise Round 5 Results
Listen to CrowdCastGuide
A Guide for Auto Dealerships: Understanding and Implementing Requirements of the Federal Trade Commission Safeguards Rule
View guideCrowdCast
Securing Kubernetes Across the Enterprise Without Killing Productivity
Listen to CrowdCastCrowdCast
Ransomware Isn’t Dead, It’s Growing Up: How to Evolve Your Defenses at Pace
Listen to CrowdCastCustomer Story
UK University Turns to CrowdStrike for Managed Detection and Response After Legacy Endpoint Solution Fails to Stop Ransomware Attack
View storyCustomer Story
University Health Network: Toronto Hospital Ensures Critical Protection with CrowdStrike
View storyCrowdCast
Nowhere to Hide: Lessons in How to Stand and Fight Cybercrime for the Technology Sector
Listen to CrowdCastReport
The Forrester Wave™: External Threat Intelligence Service Providers (ETISP), Q3 2023
View reportCustomer Story
South Australian Utility Expands CrowdStrike Protections to Bolster Defence and Address Cybersecurity Skills Shortage
View storyCustomer Story
From Endpoint to Cloud, CoreWeave Consolidates Security Stack With CrowdStrike
View storyCustomer Story
Vijilan Had to Turn Down Clients Due to Scaling Issues — Then Came CrowdStrike Falcon LogScale
View storyCustomer Story
How Sparebank 1 Saves Millions of Dollars with CrowdStrike Falcon LogScale
View storyCustomer Story
U.K. University Gains 24/7 Protection, Visibility and Response with CrowdStrike MDR
View storyCustomer Story
International High-Tech Company Protects IT Infrastructure with Cloud-Native CrowdStrike Security
View storyCustomer Story
Netlify Achieves Real-Time Observability at Scale with CrowdStrike Falcon LogScale
View storyCustomer Story
Search for Next-Gen Log Management Solution Ends with CrowdStrike Falcon LogScale
View storyCustomer Story
Berkshire Bank Accelerates Digital Transformation and Multi-Channel Customer Services with CrowdStrike
View storyCrowdCast
Playing Defense: Lessons in Protecting Your Business Against Cyber Crime
Listen to CrowdCastWhite Paper
Easily Exploited Cloud Misconfigurations and How to Minimize Their Risks
Read whitepaperWhite Paper
Top Reasons to Add Falcon Identity Protection to Your Cyber Defense Portfolio Now
Read whitepaperCrowdCast
Adversaries That Evade Legacy Endpoint Solutions and What to Do About Them
Listen to CrowdCastWhite Paper
Modern Adversaries and Evasion Techniques: Why Legacy AV is an Easy Target
Read whitepaperCrowdCast
2023 Global Threat Report Session 1: Understanding the Threat Landscape
Listen to CrowdCastData Sheet
CrowdStrike and Abnormal Security Integration Discovers and Remediates Compromised Email Accounts and Endpoints
View data sheetWhite Paper
Analysis: Breaking Down the 2022 MITRE Engenuity ATT&CK Evaluations for Managed Services
Read whitepaperData Sheet
Protecting your cloud workloads with defense-in-depth security from CrowdStrike and AWS
View data sheetCrowdCast
Modernize and Secure Your Cloud Environment with CrowdStrike and Red Hat
Listen to CrowdCastCrowdCast
Best Practices for Protecting the Hybrid Workforce with a Comprehensive Security Strategy
Listen to CrowdCastCrowdCast
Stop Modern Active Directory Threats with CrowdStrike, Okta, Zscaler and AWS
Listen to CrowdCastCustomer Story
Australian Utility Provider, Jemena, Chooses CrowdStrike Falcon Complete to Transform Cybersecurity Defense and Critical Infrastructure Protection
View storyCustomer Story
Leading Brazilian Automotive Business Saves Time and Increases Efficiency by Securing Operations with CrowdStrike
View storyCustomer Story
Pella Augments In-House Security Team with CrowdStrike Managed Services and Identity Protection
View storyReport
2022 Frost Radar™ Leader: Crowdstrike’s Cloud-native Application Protection Platform (CNAPP)
View reportCrowdCast
5 Key Considerations before investing in an External Attack Surface Management solution
Listen to CrowdCastCustomer Story
Navitas Centralizes Cybersecurity to Protect the Data of Students, Staff, Partners and Investors Worldwide
View storyCustomer Story
Europe Energy Protects Customer Data and Multimillion Euro Trading Transactions with CrowdStrike Solutions
View storyCustomer Story
Brazilian Fashion and Retail Business Protects 30 Million Customers' Financial Data With CrowdStrike Solutions
View storyCustomer Story
CrowdStrike Falcon LogScale at Remitly: Fintech Startup Transforms Raw Log Data into Actionable Business Insights
View storyCustomer Story
Texas Bank Raises Its Cybersecurity Capabilities to the Next Level with CrowdStrike
View storyCustomer Story
CrowdStrike Reinforces Safety for Staff at One of the World’s Leading Mining and Infrastructure Solutions Providers
View storyCustomer Story
Global Company Reduces Annual Incident Remediations by Over 96% with CrowdStrike Managed Detection and Response
View storyCustomer Story
Australian Motoring Organisation Drives 322% ROI and 80% Improvement in Security Efficacy with CrowdStrike
View storyCustomer Story
Grocery Delivery Disruptor Applies Its Own "Faster Than You" Slogan to Endpoint Security Management with CrowdStrike
View storyCustomer Story
Leading Austrian Feed Producer Relies on Cloud-Based IT Security to Ensure Business Operations Around the Clock
View storyCustomer Story
Global Data Analytics Company Builds Brand Reputation and “Bulletproof” Security with CrowdStrike
View storyGuide
CrowdStrike Falcon Devices Add-on for Splunk Installation and Configuration Guide v3.1.5+
View guideCrowdCast
MITRE ATT&CK for Managed Services: Breaking Down the Results with CrowdStrike
Listen to CrowdCastCrowdCast
How AI-Powered IOAs and Behavioral ML Detect Advanced Threats at Runtime
Listen to CrowdCastInfographic
Nowhere to Hide 2022 Falcon OverWatch Threat Hunting Report Infographic
View infographicCrowdCast
CrowdCast: Nowhere to Hide: 2022 Falcon OverWatch Threat Hunting Report
Listen to CrowdCastGuide
IT Practitioner Guide: Defending Against Ransomware with CrowdStrike and ServiceNow
View guideWhite Paper
Five Questions to Ask Before Choosing SentinelOne for Workforce Identity Protection
Read whitepaperCrowdCast
CrowdStrike and Okta on the Do's and Don'ts of Your Zero Trust Journey
Listen to CrowdCastCustomer Story
Healthcare Solutions Provider Rolls Out CrowdStrike Falcon to Secure Extensive Global Interests
View storyCustomer Story
CrowdStrike Helps Engineering Consultancy Transform Protection and Reduce Time and Cost of Security Management
View storyCustomer Story
National U.S. Retailer, Tuesday Morning, Set to Save $750,000 in Four Years with CrowdStrike Falcon
View storyCustomer Story
CrowdStrike Helps Leading Digital Recruitment Business Protect Personal Content for Thousands of Jobseekers Worldwide
View storyCustomer Story
Australian Utility Provider Partners With CrowdStrike to Transform Cybersecurity Defense and Critical Infrastructure Protection
View storyCustomer Story
Banco Latinoamericano de Comercio Exterior, S.A. Finances LATAM Trade While Improving Ease of Compliance, Advanced Threat Awareness and Endpoint Protection
View storyCustomer Story
Innovative HR Solutions Provider BIPO Strengthens Security Posture and Bolsters Portfolio of World-class Partners
View storyCustomer Story
Mercedes-AMG PETRONAS Formula One Team Accelerates Security Program with CrowdStrike
View storyCustomer Story
State of Oklahoma Deploys CrowdStrike to Defend Thousands of Endpoints Against Daily Threats
View storyCustomer Story
Cushman & Wakefield Extends Visibility Into Globally Distributed Endpoints
View storyCustomer Story
CrowdStrike Helps Inductive Automation Ensure Business Continuity for Critical Industry and Public Services
View storyCustomer Story
CrowdStrike Enables Bionexo to Deliver Essential Medical Supplies to Thousands of Hospitals Across Latin America
View storyReport
CrowdStrike Named a Leader in the 2022 SPARK Matrix for Digital Threat Intelligence Management
View reportCrowdCast
Defeat the Adversary: Combat Advanced Supply Chain, Cloud and Identity-Based Attacks
Listen to CrowdCastWhite Paper
Falcon OverWatch Proactive Threat Hunting Unearths IceApple Post-Exploitation Framework
Read whitepaperWhite Paper
Ransomware Preparedness: Insights from IT and Cybersecurity Professionals
Read whitepaperInfographic
CrowdStrike and AWS: A defense-in-depth approach to protecting cloud workloads
View infographicWhite Paper
Accelerate Your Cyber Insurance Initiatives with Falcon Identity Protection
Read whitepaperCrowdCast
Shared Responsibility Best Practices for Securing Public Cloud Platforms with CrowdStrike and AWS
Listen to CrowdCastCustomer Story
Operational Efficiency Gains Empower CARE Ratings On its Journey of Digital Transformation
View storyCustomer Story
Illinois State Treasurer Uses CrowdStrike to Protect Public Funds and Deliver a “Security First” Strategy
View storyCustomer Story
Coventry University Achieves First-Class Results with Enhanced Endpoint Security Strategy
View storyCustomer Story
European Construction Supplier Repels Ransomware, Rebuilds Security Defenses
View storyCustomer Story
BOB Financial Digitally Transformed Security to Support Growth Leveraging Cloud Infrastructure
View storyCrowdCast
Accelerating the Journey Towards Zero Trust with CrowdStrike and Zscaler
Listen to CrowdCastCrowdCast
Meet the Experts: An Interactive Lunch Discussion with the Falcon Complete Team
Listen to CrowdCastWhite Paper
What You Need to Know When Selecting a Cloud Workload Protection Platform
Read whitepaperCrowdCast
Stopping Breaches Is a Complete Team Effort: Case Study with Brown University
Listen to CrowdCastCustomer Story
CTOS Protects Customer Data, Meets Strict Compliance and Expands Globally with Advanced Security Solution
View storyCustomer Story
Globe Telecom Reduces Risk and Gains Immediate Visibility with New Threat-based Operational Security Approach
View storyCustomer Story
Leading Eurasian Raw Materials, Building Materials and Ceramic Tile Producer Relies on Advanced Cloud-based IT Security to Protect Against Ransomware
View storyWhite Paper
Four Questions to Ask Before Choosing Microsoft to Protect Workforce Identities
Read whitepaperWhite Paper
CrowdStrike 2022 Falcon Cloud Security, Cloud Workload Protection Buyers Guide
Read whitepaperWhite Paper
Reducing the Attack Surface: Network Segmentation vs. Identity Segmentation
Read whitepaperReport
The Forrester New Wave™: Extended Detection And Response (XDR) Providers, Q4 2021
View reportInfographic
Changing the Game with ExPRT AI: Exploit Prediction AI and Rating for Falcon Spotlight
View infographicWhite Paper
ESG Technical Validation: Reduce Risk with CrowdStrike Falcon® Identity Protection
Read whitepaperCrowdCast
Fundamentals of Modernizing Your SOC: Boost Defense with SIEM, SOAR, NDR and EDR
Listen to CrowdCastCustomer Story
Intermex Reduces Critical Vulnerabilities by 98% with Falcon Exposure Management
View storyCrowdCast
What's Behind the Numbers? Deconstructing the Round 3 MITRE ATT&CK Evaluation
Listen to CrowdCastCrowdCast
The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure
Listen to CrowdCastWhite Paper
Frost & Sullivan ROI Strategies With Frictionless Zero Trust White Paper
Read whitepaperCrowdCast
Obsidian + CrowdStrike: Detection and Response Across Cloud and Endpoints
Listen to CrowdCastWhite Paper
The Security Risks of NTLM: Confronting the Realities of an Outdated Protocol
Read whitepaperCrowdCast
How We Bypassed All NTLM Relay Mitigations — And How to Ensure You’re Protected
Listen to CrowdCastCrowdCast
CISO Panel Discussion: Best Practices for Securing Access for Your Remote Workforce
Listen to CrowdCastDemo
Demo Tuesday: Don’t Compromise User Convenience OR Security When Your Team is 100% Remote
Watch demoWhite Paper
Disrupting the Cyber Kill Chain: How to Contain Use of Tools and Protocols
Read whitepaperCrowdCast
Extending Security Controls to OT Networks with Claroty and CrowdStrike
Listen to CrowdCastVideo
Leaders in Cybersecurity and World Champions the Mercedes-AMG Petronas F1 Team: A Formula for Success
Watch videoWhite Paper
In the Mind of the Adversary: Using AI-Powered Behavioral Analysis to Stop Breaches
Read whitepaperCrowdCast
Reconciling Cybersecurity Risks With Industrial Digital Transformation
Listen to CrowdCastCrowdCast
Beyond COVID-19: Protecting People and Preventing Breaches in the “New Normal”
Listen to CrowdCastReport
CrowdStrike Intelligence Report: A Technical Analysis of the NetWalker Ransomware
View reportWhite Paper
The Evolution of Ransomware: How to Protect Organizations from New Trends and Methods
Read whitepaperCrowdCast
Every Second Counts: Speed & Cybersecurity with Mercedes-AMG Petronas F1 Team
Listen to CrowdCastCrowdCast
The 1/10/60 Minute Challenge: A Framework for Stopping Breaches Faster
Listen to CrowdCastWhite Paper
Who Needs Malware? How Adversaries use Fileless Attacks to Evade Your Security
Read whitepaperWhite Paper
Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches
Read whitepaperVideo
How to Perform a Simple Machine Search with the CrowdStrike Falcon® Investigate App
Watch videoCrowdCast
Beyond Compliance: Hardening Your Host OS with CIS Benchmarks to Stop Breaches
Listen to CrowdCastReport
CrowdStrike wins the Frost & Sullivan Customer Value Leadership Award in global cloud security
View reportCase Study
Technical Case Study: CrowdStrike Falcon Adversary OverWatch defends against cross-domain attacks
View storyFor technical information on installation, policy configuration and more, please visit the CrowdStrike Tech Hub.