CrowdStrike Falcon® Intelligence: Automated Threat Intelligence

CrowdStrike Falcon® Intelligence combines automated analysis with human intelligence, enabling security teams, regardless of size or skill, to get ahead of the attacker's next move.
Download 2020 Global Threat Report

Product Capabilities

CHOOSE THE OPTION THAT SUITS YOU BEST

  • CrowdStrike Falcon® Intelligence

    CrowdStrike Falcon® Intelligence

    Automatically investigate incidents and accelerate alert triage and response. Built into the Falcon platform, it is operational in seconds.

    See More Below

  • CrowdStrike Falcon® Intelligence Premium

    CrowdStrike Falcon® Intelligence Premium

    Premium adds threat intelligence reporting and research from CrowdStrike experts — enabling you to get ahead of nation-state, eCrime and hacktivist attacks.

    Find out more

  • CrowdStrike Falcon® Intelligence Elite

    CrowdStrike Falcon® Intelligence Elite

    Elite expands your team with access to an intelligence analyst to help defend against threats targeting your organization.

    Find out more

CrowdStrike Falcon® Intelligence
CrowdStrike Falcon® Intelligence Premium
CrowdStrike Falcon® Intelligence Elite
(Requires CrowdStrike Falcon® Intelligence Premium)
Endpoint Integration tooltip checkcheckcheck
AUTOMATED INVESTIGATIONS tooltip checkcheckcheck
INDICATORS OF COMPROMISE (IOCs) tooltip checkcheckcheck
INTELLIGENCE REPORTS tooltip checkcheck
TAILORED INTELLIGENCE tooltip checkcheck
SNORT/YARA RULES tooltip checkcheck
ASSIGNED INTEL ANALYST tooltip check
REQUESTS FOR INFORMATION tooltip check
PRIORITY INTELLIGENCE REQUIREMENTS tooltip check

TECHNICAL FEATURES

How Does CrowdStrike Falcon® Intelligence Help?

AUTOMATED INVESTIGATIONS

AUTOMATED INVESTIGATIONS

  • Bring endpoint protection to the next level by combining malware sandbox analysis, malware search and threat intelligence in a single solution
  • Reduce the time and skills required to perform manual incident investigations
  • Identify and investigate related threats and block similar attacks in the future

Watch Demo

INDICATORS OF COMPROMISE (IOCs)

INDICATORS OF COMPROMISE (IOCs)

  • The Indicator Graph enables you to visualize relationships between IOCs, adversaries and your endpoints
  • Hunt for threats with IOCs enriched with context
  • Strengthen defenses with IOCs created from observed malware, and access CrowdStrike’s real-time global IOC feed
  • Pre-built integrations and APIs enable you to orchestrate defenses with existing security solutions

Watch Indicator Graph Demo

mummy spider threat profile

ACTOR PROFILES

  • Access 130+ profiles of nation-state, eCrime and hacktivist adversaries
  • Identify adversaries focused on attacking your business, region, or industry
  • Learn about your adversaries’ intent and capabilities and predict their next move

Read our Threat Intel Blog

ENDPOINT INTEGRATION

ENDPOINT INTEGRATION

  • As part of the Falcon platform, there is nothing extra to deploy or maintain
  • Protected endpoints automatically forward all quarantined files to CrowdStrike Falcon® Intelligence for immediate investigation
  • Falcon detections are enriched with context so you can quickly understand an attack and deploy proactive countermeasures

Request Info

TECHNICAL CENTER

For technical information on the product capabilities and features, please visit the CrowdStrike Tech Center.

  • TECHNICAL CENTER
  • TECHNICAL CENTER
  • TECHNICAL CENTER
Get Started With CrowdStrike Intelligence

Our Customers

CUSTOMERS THAT TRUST CROWDSTRIKE

INTELLIGENCE REPORTS

CrowdStrike’s groundbreaking intelligence reports present customers and the global cybersecurity community with the latest developments and defenses for an increasingly dangerous threat landscape. Download these complimentary reports:

  • 2021 GLOBAL THREAT REPORT

    Read this critical report to learn how to defend against the quickening pace and increasing sophistication in adversary tactics, techniques and procedures.

    Read the Report

  • 2019 MOBILE THREAT LANDSCAPE REPORT

    Download this report to learn about adversary groups that target mobile devices and how their tactics — and the mobile threat landscape in general — are evolving. 

    Read the Report

  • NetWalker Ransomware Technical Analysis

    Download this report to learn the tactics and techniques CIRCUS SPIDER used to lure victims and launch the NetWalker ransomware

    Read the Report

GET ANSWERS TO FREQUENTLY ASKED QUESTIONS

CrowdStrike Falcon® Intelligence FAQ

PURCHASE CrowdStrike Falcon® Intelligence AS PART OF A BUNDLE

CrowdStrike bundles are specifically tailored to meet a wide range of endpoint security needs

Explore the Bundles

TRY FALCON PREVENT FREE FOR 15 DAYS

TRY FALCON PREVENT FREE FOR 15 DAYS Start Free Trial