Continuous high-fidelity telemetry with forensic-level detail across endpoints and workloads distributed across the network edge and hybrid cloud infrastructure — including Windows, macOS, and Linux, together with cloud-native storage for always-on data availability.
Cloud-scale analytics
Cloud-scale analytics
Contextual relationship derivation with ML algorithms and deep analytics across billions of disjoint and siloed data elements — allows for fast, on-demand search and query across real-time and historical data for speedy investigation and response.
Real-time attack visibility
Real-time attack visibility
Real-time visibility with instant access to enriched data and intuitive dashboards for advanced workflows and visualizations — covers ephemeral, online, offline and even end-of-life hosts to arm your responders with data so they can respond to threads immediately and act decisively.
Technical features
Purpose-built graph database for cybersecurity
Power of Security Cloud
Complete turnkey solution with no additional hardware or deployments
Use network effect to protect everyone against a new threat, regardless of where it is encountered
See value from Day One, with no additional custom tuning, costly consulting, re-architecting or maintenance overhead
Automatically scales and grows with demand and change
Power of data
Capture trillions of security events across endpoints, workloads and identities and enrich with threat intelligence, context and correlation markers
Reveal contextual relationships between data elements to identify and respond to new and unusual threats in real time by applying graph analytics and ML algorithms
The robust query and search engine provides current and historical forensic details to arm responders for threat investigations
On-demand access to enriched data with powerful visualization dashboards helps investigators understand the full context of the attack on any affected host, regardless of location
Maximum security efficiency
The industry’s leading collection of powerful insights gathers more than a trillion events per day spanning across 2 trillion vertices and analyzing over 15 petabytes of data
Telemetry is enriched with real-world threats and identifies new attacks associated with known threat actors
Real-time visualization and automated concurrent analysis lead to faster investigation and response times
Threat hunters can run ad hoc queries for successful and timely detections of unknown threats
Single source of truth
Gain rapid access to everything required to prevent, detect, investigate, and respond
The lightweight agent provides smart-filtering capability streams relevant data for enrichment and correlation to the Threat Graph — with no performance impact
Powerful APIs allow for security orchestration, automation, response and other advanced workflows
APIs and bidirectional data flow enable tight integrations with third-party security and IT solutions to share insights from multiple data sources
Threat Graph scales with demand and provides necessary storage, compute and rich analytics required, with up to a year of all detections encountered
Optional offline replica of enriched telemetry is available for archive, compliance requirements and additional analytics
Technical Center
Technical Center
For technical information on the installation, policy configuration and more, please visit the CrowdStrike Tech Center.