100% found this document useful (1 vote)
102 views38 pages

Crowdstrike For SOC Event

The document provides an overview of CrowdStrike, including: 1) It discusses today's security challenges and how CrowdStrike technology addresses them through solutions that stop breaches. 2) It highlights CrowdStrike's recognition by Gartner as a leader in endpoint protection and receiving the highest customer ratings. 3) It promotes CrowdStrike Falcon as a proven leader in endpoint protection through its effectiveness, simplicity, and scalability.

Uploaded by

Bayu Anugrah-kun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
102 views38 pages

Crowdstrike For SOC Event

The document provides an overview of CrowdStrike, including: 1) It discusses today's security challenges and how CrowdStrike technology addresses them through solutions that stop breaches. 2) It highlights CrowdStrike's recognition by Gartner as a leader in endpoint protection and receiving the highest customer ratings. 3) It promotes CrowdStrike Falcon as a proven leader in endpoint protection through its effectiveness, simplicity, and scalability.

Uploaded by

Bayu Anugrah-kun
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 38

CROWDSTRIKE OVERVIEW

TECHNICAL LEAD, PT. VIRTUS TECHNOLOGY INDONESIA


§ Today Security Challenges
§ Crowdstrike Technology
AGENDA
§ Crowdstrike Solutions

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


BREACHES ARE
EVERYWHERE

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


BREACHES ARE
EVERYWHERE

2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


WE STOP
BREACHES
Hidden Cost

Brand Reputation

Data Loss

2022 CrowdStrike, Inc. All rights reserved.


SURVIVAL OF THE FASTEST

12

TO STAY AHEAD YOU DETECT IN INVESTIGATE IN RESPOND IN

1min 10min
11
MUST:
BREAKOUT TIME 60min
10
9
8
1 2 3 4 5 6 7

Initial Access Execution Defense Evasion


Persistence Privilege Escalation Credential Access Discovery Lateral Collection Command & Exfiltration Impact
Movement Control

MITRE ATT&CK PHASE

2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


TODAY’S SECURITY CAN’T KEEP UP

ATTACKS ARE SOLUTIONS ARE SKILLS ARE


SOPHISTICATED COMPLEX IN SHORT SUPPLY

2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


HOW PEOPLE SEE
CROWDSTRIKE ?

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


GARTNER RECOGNITION
Expert Recognition Customer Recognition

Endpoint
Protection Platforms

Endpoint Detection
and Response Solutions

This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from
Crowdstrike. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or
other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or
implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service
mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews,
ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates. https://www.gartner.com/reviews/customers-
choice/endpoint-protection-platforms and https://www.gartner.com/reviews/customers-choice/endpoint-detection-and-response-solutions
Gartner Magic Quadrant for Endpoint Protection Platforms, May 2021
2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
A PROVEN LEADER IN ENDPOINT PROTECTION

A LEADER A CUSTOMER CHOICE VALIDATED

“CrowdStrike Falcon is
one of the most
important tools in my
organization's security
toolbox.”

HIGHEST RATING OF
4.9/5 IN EDR AND
4.8/5 IN ENDPOINT
PROTECTION PLATFORMS

Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions
of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is
a registered trademark and the GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice
constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.
Gartner Peer Insights ‘Voice of the Customer’: Endpoint Detection and Response Solutions, 31 March 2020 and Gartner Peer Insights ‘Voice of the Customer’: Endpoint Protection Platforms, Peer Contributors, 13 October 2021
https://www.gartner.com/reviews/market/endpoint-protection-platforms/vendor/crowdstrike/product/falcon/review/view/1039090

2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


SIMPLE & SCALABLE

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


End-to-End Security
The visibility, tools, and protection
every security team needs to safeguard
today’s modern enterprise.

Effortless Scalability
Complete modularity, rapid
deployment, and easy extensibility.

Cloud-Native
Platform Power of the Security Cloud
One of the world’s largest threat-centric data
fabrics, processing 1+ trillion events per day
to detect, hunt, and respond to threats at
unprecedented speed and scale.

2022 CrowdStrike, Inc. All rights reserved.


3 SMALL STEPS TO ADOPT FALCON PLATFORM

1 2 3

No infrastructure No fine-tuning, Install the Verify the No reboot No signatures No scan Remove legacy
setup rule writing Falcon Agent installation updates products

Financial Institution Hospitality Chain Technology Company Financial Institution

77,000 AGENTS 40,000 AGENT 55,000 AGENTS 5 300,000 AGENTS


1 DAY 5 DAYS DAYS 90 DAYS

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


EFFICIENT PERFORMANCE

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


EFFICIENT PERFORMANCE

CROWDSTRIKE
NEXT-GEN AV CROWDSTRIKE FALCON
CERTIFIED AS LEGACY
F AL C ON P R E VE NT AV REPLACEMENT

BUSINESS VALUE
Improves protection
Machine Block
Learning Known Bad
Reduces number of
incidents

Improves user productivity –


no user impact

Reduces complexity

IOA Delivers security efficiency


Behavioral Exploit and efficacy
Blocking Blocking

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


100% MACHINE LEARNING & IOA, NO SIGNATURE

CROWDSTRIKE
100% MACHINE LEARNING & IOA, NO SIGNATURE

CROWDSTRIKE
CONTEXTUAL INCIDENT

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


Our Security Edge
CrowdStrike’s adversary mindset drives
and enriches everything we do.

Integrated Intelligence
Threat intel is front and center
across every Falcon module.

Adversary
Focused Protect What Matters
To stop an adversary, you must first
understand them. Learn adversary tactics
and behaviors, and adapt fast.

2022 CrowdStrike, Inc. All rights reserved.


EXTENDED DETECTION &
RESPONSE

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


Automatically Detect
CrowdStrike-produced cross-
domain detections

Empower the Team


Hunt and investigate rapidly across
data sets from a single console
FALCON XDR

Speed Response
Rich context guides next steps from instant
host containment to orchestrated workflows

©2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


FALCON XDR CAPABILITIES

Data Ingest XDR Detections Investigation


▪ Broad range of data ▪ CrowdStrike-produced ▪ Graph explorer
cross-domain detections
▪ Parse and normalize key ▪ Ad-hoc queries
data for correlation and ▪ Actionable insight
analysis

Hunting & Alerts Response Case Management


▪ Scheduled search ▪ Instantly network-contain ▪ Notifications
hosts
▪ Custom XDR detections ▪ Assign, update, and
▪ Surgical remediation comment on detections
EXTENDED DETECTION AND RESPONSE
FALCON INSIGHT XDR

CROWDSTRIKE
EXPERTISE SERVICE

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


Elite Threat Hunting
With decades of experience and
powerful tooling, our expert analysts
relentlessly hunt for threats in your
environment and beyond.

Extension of your Team


Our managed services will monitor,
manage, and remediate threats in your

World-Class
environment, so you don’t have to.

Expertise Advisory & IR Services


Determine your exposure or mature your
security operations with a range of IR and
strategic advisory services available to you.

2022 CrowdStrike, Inc. All rights reserved.


STOPPING BREACHES WITH SPEED
REQUIRES MORE THAN TECHNOLOGY

MANAGE PREVENT
IMPLEMENT BLOCK THREATS
CONFIGURE
FINE-TUNE

MONITOR
RESPOND 24X7
COLLECT
CONTAIN
DETECT/HUNT
REMEDIATE
PRIORITIZE
INVESTIGATE

©2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


FALCON
COMPLETE
MANAGED DETECTION AND RESPONSE

ENDPOINT CLOUD IDENTITY


BACKED BY INDUSTRY’S STRONGEST
BREACH PREVENTION WARRANTY

©2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


THE FALCON PLATFORM
XDR Log Mgmt

EDR Digital Risk Monitoring Forensics

Next-Gen Antivirus Threat Intelligence IT Hygiene

Firewall Mgmt Cloud Security Posture Mgmt Malware Analysis Identity Threat Detection Vulnerability Mgmt

Device Control Cloud Workload Protection Malware Search Identity Threat Protection File Integrity Monitoring

Endpoint Security Cloud Security Threat Intelligence Identity Protection Security & IT Ops

Services

Threat Hunting MDR IR Advisory

CrowdStrike Security Cloud

Fusion

Humio Threat Graph APIs CrowdStrike Store

Lightweight Agent

Workstations Servers Virtual Machines Containers Cloud Mobile IOT


SOLUTION
PACKAGE

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


FALCON ENDPOINT PROTECTION SOLUTIONS

FALCON PRO FALCON ENTERPRISE FALCON ELITE FALCON COMPLETE

Next Gen Antivirus Next Gen Antivirus Next Gen Antivirus Falcon Endpoint Protection
Remote Response Endpoint Detection & Response Endpoint Detection & Response Delivered as a Service
Integrated Threat Intel Integrated Threat Intel Integrated Threat Intel Breach Prevention Warranty
Device Control Managed Threat Hunting Managed Threat Hunting
Firewall Management Device Control Device Control
Firewall Management Firewall Management
Identity Protection
IT Hygiene
2021 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
DEMO VIDEO

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.


CROWDSTRIKE
Questions?
Additional Information
Tech Center AV Replacement

crowdstrike.com/tech-center http://replaceav.com/

2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.

You might also like