Your Cart
Added to Cart
There's nothing in your cart
per endpoint / per year
Updating cart...
In-depth guides to CrowdStrike’s endpoint security products, services, and today’s most important cybersecurity topics
Stay One Step Ahead of Identity Thieves
White Paper
Unlock SOC Transformation with CrowdStrike Falcon® Next-Gen SIEM
SOC Survival Guide
5 Reasons to Red Team Your Cybersecurity Infrastructure
The Complete Guide to Building an Identity Protection Strategy
3 Cybersecurity Steps Every Local Government Should Take
State of the SIEM Market
Bridging IT and Security: Strategies for Success
The Expanding Scope of Business Email Compromises
Importance of Cybersecurity for Small Businesses
Future-Proof Your SOC: A Migration Guide from Legacy to Next-Gen SIEM with CrowdStrike
Insider’s Playbook: Defending Against Cloud Threats
Top 5 Cloud Security Best Practices for DevSecOps
Four Requirements for IT Automation
Keep Adversaries in the Dark: 6 Requirements to Minimize External Exposure Risks
Detecting and Stopping Data Loss in the Generative AI Era
Secure Your Azure Cloud Migration with CrowdStrike
eBook: Your 2024 Data Security Roadmap in the Age of GenAI
Optimize Your Profile for Cyber Insurance: 5 Essential Strategies
3 Ways To Transform Security Operations with IT Automation
5 Tips to Thrive on a Tighter Data Security Budget
Protect Microsoft Entra ID and Active Directory
Transforming Security Operations with Purpose-Built Conversational AI
Unlock Proactive Exposure Management: 5 Key Elements and Why Traditional Approaches Fail
Adversaries Aren't Breaking In, They're Logging In
How to Build a Business Case for Unifying Endpoint and Identity Security
Ransomware Evolution and the Impact of an Outdated Defense
A Modern Approach to Confidently Stopping Data Exfiltration
How Identity Threat Protection Solves Modern Business Challenges
How Falcon Identity Protection Can Help Meet Your Compliance Goals
Crafting a Battle-Tested Team with the CrowdStrike Adversary Emulation Exercise
Elevating Cybersecurity in Today's Schools
Application Security Posture Management: Securing Cloud-Native Applications at Scale
Unified, Resilient, Prepared: New York’s Whole-of-State Cyber Strategy
Cyber Risk Exposed: An Inside View to Managing Exposure
The Impact of Securing Your Cloud Environment with Falcon Cloud Security
Safeguarding Healthcare Mergers & Acquisitions (M&A) by Integrating Cybersecurity from Day One
Investigating Active Directory Certificate Services Abuse: ESC1
Proactive, Resilient Cybersecurity for Healthcare
Best Practices to Secure Cloud-Native Applications
Whole-of-State Cybersecurity with CrowdStrike
The Power of One: Combating Cybersecurity Fragmentation with a Consolidated Security Platform
Strengthening Cybersecurity in U.K. Education
8 Things Your Next SIEM Must Do
NCSC Cyber Assessment Framework
NCSC 14 Cloud Security Principles
5 Easy Steps for School Cybersecurity
Insider’s Guide to Defending the Cloud
Threats to Containers and Container Technology
Easily Exploited Cloud Misconfigurations and How to Minimize Their Risks
Designing XDR with Industry-Leading Solutions for Your Organization
Top Reasons to Add Falcon Identity Protection to Your Cyber Defense Portfolio Now
Improve Cyber Insurability with Falcon Identity Protection
Modern Adversaries and Evasion Techniques: Why Legacy AV is an Easy Target
AWS Migration Made Secure – How CrowdStrike Protects Your Journey
Protect Your Healthcare Staff and Devices from Ransomware
Analysis: Breaking Down the 2022 MITRE Engenuity ATT&CK Evaluations for Managed Services
8 LOLBins Every Threat Hunter Should Know
Cybersecurity For Small Businesses
Falcon LogScale Redefines Log Management Total Cost of Ownership
Find Threats Faster: Log More and Spend Less
CrowdStrike Falcon® Fusion
Log Everything to Answer Anything in Real Time
Small Business Cybersecurity Survival Guide
Five Business Drivers for Cybersecurity Consolidation
Cybersecurity Survival Guide for Small and Medium Businesses
CROWDSTRIKE AND THE CERT NZ CRITICAL CONTROLS
Log More to Improve Visibility and Enhance Security
Identity & Security: Addressing the Modern Threat Landscape
Five Questions to Ask Before Choosing SentinelOne for Workforce Identity Protection
eBook: Wherever You Work, Work Safer with Google and CrowdStrike
How Federal Agencies Can Build Their Cybersecurity Momentum
4 Essentials When Selecting Cybersecurity Solutions
eBook: Securing Google Cloud with CrowdStrike
Falcon OverWatch Proactive Threat Hunting Unearths IceApple Post-Exploitation Framework
EBook: CrowdStrike Incident Response
Ransomware Preparedness: Insights from IT and Cybersecurity Professionals
Next-Generation Threat Intelligence with CrowdStrike and AWS
Accelerate Your Cyber Insurance Initiatives with Falcon Identity Protection
Making the Move to Extended Detection and Response (XDR)
Distribution Services: The Secret Force Behind Ransomware
Five Key Capabilities to Secure Against Endpoint Risk
Falcon Complete Managed Detection and Response Casebook
Accelerating the Journey Toward Zero Trust
Work from Anywhere with Security Everywhere
How to Find and Eliminate Blind Spots in the Cloud
Protecting Healthcare Systems Against Ransomware and Beyond
What You Need to Know When Selecting a Cloud Workload Protection Platform
CrowdStrike & Zscaler White Paper
Four Questions to Ask Before Choosing Microsoft to Protect Workforce Identities
CrowdStrike 2022 Falcon Cloud Security, Cloud Workload Protection Buyers Guide
Reducing the Attack Surface: Network Segmentation vs. Identity Segmentation
Securing Cloud Infrastructure
eBook: CrowdStrike Cloud Security on AWS
The Not-so-Secret Weapon for Preventing Breaches
Four Cloud Security Misconceptions Ebook
CrowdStrike Security Cloud Guidebook
State of Cloud Security - Retail/Wholesale
ESG Technical Validation: Reduce Risk with CrowdStrike Falcon® Identity Protection
eBook: The CrowdStrike Security Cloud
Exposing the Open, Deep, and Dark Web
Streamline Your Zero Trust Journey
Reducing the Attack Surface eBook
Simplifying the Zero Trust Journey For Healthcare Organizations
Think It, Build It, Secure It
eBook: Digital Health Innovation Requires Cybersecurity Transformation
The 9 Key Tenets of Cyber Risk Readiness
State of Cloud Security - Financial Services
Global IT Security Survey White Paper
Buyer’s Guide to Modern Endpoint Protection
CrowdStrike Falcon Platform for CMMC 2.0
Frost & Sullivan ROI Strategies With Frictionless Zero Trust White Paper
Remote Incident Response and Remediation
The Security Risks of NTLM: Confronting the Realities of an Outdated Protocol
Hardening Your AD Security
Frictionless Zero Trust Strategy for Your Hybrid Infrastructure
e-Book: A Frictionless Zero Trust Approach to Stopping Insider Threats
Disrupting the Cyber Kill Chain: How to Contain Use of Tools and Protocols
CrowdStrike Falcon® Zero Trust Risk Score
Defending the Enterprise with Conditional Access
Falcon Complete: Proven, Professional Managed Detection and Response
Guide to AV Replacement
Cybersecurity: A Key Risk Factor in Mergers and Acquisitions
Ransomware - A Growing Enterprise Threat
Cloud-Native Endpoint Protection for the Digital Era
Beyond PII & IP Theft: New Proactive Strategies for Stopping Damaging Breaches
Indicators of Attack vs. Indicators of Compromise
Upleveling Of Cloud Infrastructure
Blueprints for Secure AWS Workloads eBook
Intelligence-led Rapid Recovery
In the Mind of the Adversary: Using AI-Powered Behavioral Analysis to Stop Breaches
The Evolution of Ransomware: How to Protect Organizations from New Trends and Methods
A Proven Approach to Cloud Workload Security
eBook: Securing Today’s Distributed Workforce
Guida Alla Sostituzione Dell’antivirus
Managed Detection and Response (MDR) Buyer's Guide
Achieving Security Maturity
How to Survive a Breach
Securing Your Devices with Falcon Device Control
Managed Threat Hunting and the Value of the 'Human Detection Engine'
You’ve Been Breached — Now What?
The GDPR General Data Protection Regulation and Cybersecurity
State of the Endpoint 2017
Endpoint Detection and Response (EDR)
Protecting HIPAA PHI in the Age of Advanced Targeted Cyber Threats
Ransomware Defense: The Do’s and Don’ts
Who Needs Malware? How Adversaries use Fileless Attacks to Evade Your Security