Your Cart
Added to Cart
There's nothing in your cart
per endpoint / per year
Updating cart...
Accelerate Your SIEM Replacement with CrowdStrike
CrowdCast
Redefining Security for the Cloud AI Era
From Reactive to Proactive: Transforming Your Cybersecurity Program
Fast-Tracking Cloud Security with CrowdStrike and Google Cloud
Enhancing Cybersecurity for Education: Leveraging the FCC Schools and Libraries Pilot Program with CrowdStrike
Beyond Boundaries: Revolutionizing Identity Security from On-Premises Environments to the Cloud
Don't Just Manage Your Attack Surface — Master It
Best of Fal.Con 2024: Hits and highlights from this year’s event
Introducing the Next Generation of IT Automation: CrowdStrike Falcon® for IT
NIS2 & Ensuring Cloud Security is Compliant
Identity Threat Protection Live Attack and Defend Demo
Tales from the Battlefield: Stop Breaches by SCATTERED SPIDER and More
Unstoppable Innovations CrowdCast Series: From Red-Hot Releases to Future Roadmap Session #3
Under the Radar: The Year of Stealth
Enterprise-Scale Honeytokens for CrowdStrike Identity Protection
Bringing Whole of State to Life: One State's Cyber Security Journey
Unstoppable Innovations CrowdCast Series - Part 3: Stop Big Game Hunting Adversaries with Modern Data Protection
Get Ahead of Cyber Threats from Cloud to Edge
Unstoppable Innovations CrowdCast Series - Part 1: Defeat Cloud Adversaries with CrowdStrike and Bionic
Defeat Adversaries with a Modern Threat Intelligence Program
CrowdStrike ITP Kerberoasting & Golden Ticket Attack & Defend Demo
CrowdCast Demo
Unstoppable Innovations CrowdCast Series: From Red-Hot Releases to Future Roadmap Session #2
Unstoppable Innovations CrowdCast Series From Red-Hot Releases to Future Roadmap Session #1
Beyond the Perimeter 2024 with CrowdStrike, Okta and Zscaler
SEC Readiness: Demystifying the Four-Day Breach Disclosure Requirement
Cloud Security CrowdCast Series
Effective data protection solves security, not just compliance
COZY BEAR on the Prowl
Top 2024 Cybersecurity Trends Series – Session #3: Cloud Security Consolidation Extends Protection from Code to Runtime
Top 2024 Cybersecurity Trends Series – Session #2: Cybersecurity Consolidation – Perspectives from Intel’s CISO & New Research
Top Cybersecurity Trends for 2024 Series - Session #1: Generative AI Accelerates Protection and Investigation
Protectors Spotlight Live: The Value of Simplicity
The Convergence of AI+ Cybersecurity with CrowdStrike and Abnormal Security
Unstoppable Innovations CrowdCast Series - Session #4: Rise Above SCATTERED SPIDER with Next-Gen SIEM
Unstoppable Innovations CrowdCast Series - Part 2: Shut Down Adversary Opportunities with Proactive Exposure Management
Cloud Threat Summit Virtual Event: The Rise of the Cloud-Conscious Adversary
MITRE Engenuity ATT&CK Evaluations: Inside the Enterprise Round 5 Results
Ransomware has evolved. Are you ready?
Securing Kubernetes Across the Enterprise Without Killing Productivity
Revolutionizing Zero Trust Architecture
Cloud Entitlements and Security Posture Management
2023 CrowdStrike Threat Hunting Report CrowdCast
Playing Defense: Lessons in Protecting Your Business Against Cyber Crime
Rise Above WIZARD SPIDER with CrowdStrike Falcon LogScale
ChatGPT Exposed with CrowdStrike and Abnormal
Five Best Practices to Stay Insurable and Reduce Cyber Risk
CrowdStrike Information Stealer (Infostealer) Attack & Defend Demo
How to Accelerate XDR Outcomes
Future Proof Your Observability Strategy with CrowdStrike and Cribl
8 LOLBins Every Threat Hunter Should Know
CrowdStrike and Zscaler: Beyond the Perimeter 2023
2023 Global Threat Report Session 3: Actionable Intelligence
2023 Global Threat Report Session 2: CISO Perspectives
2023 Global Threat Report Session 1: Understanding the Threat Landscape
Accelerating Incident Response with CrowdStrike and ServiceNow
How to Protect Your Small Business from Cyber Attacks
Modernize and Secure Your Cloud Environment with CrowdStrike and Red Hat
Best Practices for Protecting the Hybrid Workforce with a Comprehensive Security Strategy
Cyber Risk in M&A: Streamlining Cyber Due Diligence
Put Fileless Attacks on Notice with Falcon’s Advanced Memory Scanning
Stop Modern Active Directory Threats with CrowdStrike, Okta, Zscaler and AWS
Identity Protection: Modern Attack Defense
Private Property, No Trespassing
A roadmap to Zero Trust with Cloudflare and CrowdStrike
CrowdStrike and BakerHostetler Webinar
Artificial Intelligence CrowdCast Series
What’s AI Got to Do with Me? How AI Helps You Stop Modern Attacks
How AI-Powered IOAs and Behavioral ML Detect Advanced Threats at Runtime
Ransomware Isn’t Dead, It’s Growing Up: How to Evolve Your Defenses at Pace
Nowhere to Hide: Lessons in How to Stand and Fight Cybercrime for the Technology Sector
The SEC Has Spoken: Aligning to the New Rules on Cybersecurity
Answering Key Identity-Related Cyber Insurance Questions
The CTI Journey: Putting Threat Intelligence into Action
Cybersecurity, Evolved. Why it’s Time to Consolidate.
Rightsizing Your Security Program with Modern MDR
Adversaries That Evade Legacy Endpoint Solutions and What to Do About Them
Empowering Analysts with XDR
Defending Against Ransomware with CrowdStrike and ServiceNow
5 Key Considerations before investing in an External Attack Surface Management solution
MITRE ATT&CK Evaluations: Charting the Future of the SOC with MDR
MITRE ATT&CK for Managed Services: Breaking Down the Results with CrowdStrike
The Forrester Total Economic Impact™ of CrowdStrike Falcon® LogScale
Mitigate Cloud Threats with an Adversary-Focused Approach
Security that Scales with Development
CrowdCast: Nowhere to Hide: 2022 Falcon OverWatch Threat Hunting Report
Where XDR Fits in Your SOC Modernization Strategy
The X Factor: Why XDR Must Start with EDR
Falcon Complete Web Shell Intrusion Demonstration, APJ
Essential Update on the eCrime Adversary Universe
How XDR Gets Real with CrowdStrike and ExtraHop
Top Cloud Security Threats to Watch For in 2022/2023
CrowdStrike and Okta on the Do's and Don'ts of Your Zero Trust Journey
Unifying Your Security Solutions
CrowdStrike and Zscaler: Beyond the Perimeter 2022
Defeat the Adversary: Combat Advanced Supply Chain, Cloud and Identity-Based Attacks
Protecting Against Endpoint to Cloud Attack Chains
Reinventing MDR with Identity Threat Protection
Critical Capabilities to go from Legacy to Modern Endpoint Security
Fast Track Your Cyber Insurance Initiatives With Identity Protection
CrowdCast: Global Threat Report 2022
The CrowdStrike Store: What We Learned in 2021
Advanced Log Management Course Spring ‘22
Threat Hunting Log4j Exploits with Falcon OverWatch
Log4j: A View From the Frontlines
Accelerating the Journey Towards Zero Trust with CrowdStrike and Zscaler
Log4j2 Zero-Day Vulnerability Update
Meet the Experts: An Interactive Lunch Discussion with the Falcon Complete Team
A CISO’s Journey in Defending Against Modern Identity Attacks
Google Cloud Security and CrowdStrike: Transforming Security Together
Maximize the Value of Your Falcon Data with Humio
Shift Left - Improving The Security Posture of Applications
How to Combat Threats in the Cloud
State of Cloud Security Webinar - Financial Services
Your Journey to Zero Trust: What You Wish You Knew Before You Started
Beat the Bite: Strengthen your Security Against Ransomware Actors
Lessons Learned from the Colonial Pipeline Ransomware Attack
Fundamentals of Modernizing Your SOC: Boost Defense with SIEM, SOAR, NDR and EDR
Supercharge Your Security Transformation
Detect and Mitigate Against Key Sunburst TTPs
How to Maximize ROI with Frictionless Zero Trust
What's Behind the Numbers? Deconstructing the Round 3 MITRE ATT&CK Evaluation
Defending Your Small Business From Big Threats
SLED Overwatch Briefing
Exposing the eCrime Ecosystem
Accelerate your SOC’s Response Time with CrowdStrike
Unify Endpoint and Cloud Application Security with Zscaler
Proactive Network Monitoring with DomainTools and CrowdStrike Falcon®
2021 Global Threat Report CrowdCast
Obsidian + CrowdStrike: Detection and Response Across Cloud and Endpoints
Better Together: Cybersecurity Awareness in the New Normal
How We Bypassed All NTLM Relay Mitigations — And How to Ensure You’re Protected
CISO Panel Discussion: Best Practices for Securing Access for Your Remote Workforce
A CISO’s Perspective on Conditional Access
Announcing Unified VRM In the CrowdStrike Store
Stopping Cyber Threats Against Remote Workers
Nowhere to Hide: 2020 Threat Hunting Report
The Evolution of Ransomware and the Pinchy Spider Actor Group
Reconciling Cybersecurity Risks With Industrial Digital Transformation
Simplifying Enterprise Security with a Unique Cybersecurity Ecosystem
Ensuring Business Continuity by Securing Your Remote Workforce
Beyond COVID-19: Protecting People and Preventing Breaches in the “New Normal”
Know What You Don’t Know
Coping with COVID: Security Leadership in Times of Crisis
Demystifying Mobile Device Security
COVID-19 Threat Intelligence Briefing
Incident Response and Remediation When Working Remotely
Navigating Data Protection with a Newly Deployed Remote Workforce
Cybersecurity in the Time of COVID-19
CrowdStrike Falcon® OverWatch: A SANS Review
Security Without Sacrifice
Mobile Malware Threat Landscape
Shared Responsibility Best Practices for Securing Public Cloud Platforms with CrowdStrike and AWS
Podcast: EY and CrowdStrike NextGen Identity Access and Management
Stopping Breaches Is a Complete Team Effort: Case Study with Brown University
Tales from the Dark Web: Following Threat Actors’ Bread Crumbs
Nowhere to Hide: 2021 Threat Hunting Report
Frictionless Zero Trust: Top 5 CISO Best Practices
Blueprint for Securing AWS Workloads with CrowdStrike
The CyberCriminal Underground
Understanding the United States’ Zero Trust Mandate
The Maturation of Cloud-native Security: Securing Modern Apps and Infrastructure
Minacce nascoste e come rilevarle
Enabling Secure Remote Work in Education
Extending Security Controls to OT Networks with Claroty and CrowdStrike
Take DevSecOps to the Next Level
See and Secure from Day 0: Better Together with AWS and CrowdStrike
CROWDSTRIKE SERVICES CYBER FRONT LINES REPORT CROWDCAST
2020 CrowdStrike Global Security Attitude Survey
Threat Hunting: Real Intrusions by State-Sponsored and eCrime Groups
Cyber Threat Intelligence Demystified
Cybersecurity Unleashes Digital Transformation at ECI
Securing Cloud Workloads and Containers
Webcast: Global Remote Work Security Survey
Vulnerability Management Trends and Protecting a Remote Workforce
2020 Global Threat Report CrowdCast
CrowdScore: Get in the Driver’s Seat
Every Second Counts: Speed & Cybersecurity with Mercedes-AMG Petronas F1 Team
Forrester Reveals Total Economic Impact of CrowdStrike
2019 Mobile Threat Landscape Report
When Adversaries ATT&CK™
Supporting Government Missions
Law Firm Webcast: Incident Response Under Privilege
GDPR: Myths and Urban Legends
The 1/10/60 Minute Challenge: A Framework for Stopping Breaches Faster
Security at the speed of DevOps
Understanding the GDPR and How It Will Impact Your Organization
Defending Against Threats Targeting the Mac Platform
Redefining Endpoint Security to Stop Modern Cyberattacks
You Can’t Stop the Breach Without Prevention AND Detection
Beyond Compliance: Hardening Your Host OS with CIS Benchmarks to Stop Breaches
Harness total enterprise visibility and protection with Next-Gen MDR
Stop Them: Combating Identity Attacks on Your Health System
AI-Native SOC Summit: The Next Generation of SIEM, Here Today