CROWDSTRIKE OVERVIEW
TECHNICAL LEAD, PT. VIRTUS TECHNOLOGY INDONESIA
§ Today Security Challenges
§ Crowdstrike Technology
AGENDA
§ Crowdstrike Solutions
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
BREACHES ARE
EVERYWHERE
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
BREACHES ARE
EVERYWHERE
2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
WE STOP
BREACHES
Hidden Cost
Brand Reputation
Data Loss
2022 CrowdStrike, Inc. All rights reserved.
SURVIVAL OF THE FASTEST
12
TO STAY AHEAD YOU DETECT IN INVESTIGATE IN RESPOND IN
1min 10min
11
MUST:
BREAKOUT TIME 60min
10
9
8
1 2 3 4 5 6 7
Initial Access Execution Defense Evasion
Persistence Privilege Escalation Credential Access Discovery Lateral Collection Command & Exfiltration Impact
Movement Control
MITRE ATT&CK PHASE
2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
TODAY’S SECURITY CAN’T KEEP UP
ATTACKS ARE SOLUTIONS ARE SKILLS ARE
SOPHISTICATED COMPLEX IN SHORT SUPPLY
2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
HOW PEOPLE SEE
CROWDSTRIKE ?
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
GARTNER RECOGNITION
Expert Recognition Customer Recognition
Endpoint
Protection Platforms
Endpoint Detection
and Response Solutions
This graphic was published by Gartner, Inc. as part of a larger research document and should be evaluated in the context of the entire document. The Gartner document is available upon request from
Crowdstrike. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or
other designation. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or
implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. The GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service
mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice constitute the subjective opinions of individual end-user reviews,
ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates. https://www.gartner.com/reviews/customers-
choice/endpoint-protection-platforms and https://www.gartner.com/reviews/customers-choice/endpoint-detection-and-response-solutions
Gartner Magic Quadrant for Endpoint Protection Platforms, May 2021
2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
A PROVEN LEADER IN ENDPOINT PROTECTION
A LEADER A CUSTOMER CHOICE VALIDATED
“CrowdStrike Falcon is
one of the most
important tools in my
organization's security
toolbox.”
HIGHEST RATING OF
4.9/5 IN EDR AND
4.8/5 IN ENDPOINT
PROTECTION PLATFORMS
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions
of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose. GARTNER is
a registered trademark and the GARTNER PEER INSIGHTS CUSTOMERS’ CHOICE badge is a trademark and service mark of Gartner, Inc., and/or its affiliates, and is used herein with permission. All rights reserved. Gartner Peer Insights Customers’ Choice
constitute the subjective opinions of individual end-user reviews, ratings, and data applied against a documented methodology; they neither represent the views of, nor constitute an endorsement by, Gartner or its affiliates.
Gartner Peer Insights ‘Voice of the Customer’: Endpoint Detection and Response Solutions, 31 March 2020 and Gartner Peer Insights ‘Voice of the Customer’: Endpoint Protection Platforms, Peer Contributors, 13 October 2021
https://www.gartner.com/reviews/market/endpoint-protection-platforms/vendor/crowdstrike/product/falcon/review/view/1039090
2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
SIMPLE & SCALABLE
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
End-to-End Security
The visibility, tools, and protection
every security team needs to safeguard
today’s modern enterprise.
Effortless Scalability
Complete modularity, rapid
deployment, and easy extensibility.
Cloud-Native
Platform Power of the Security Cloud
One of the world’s largest threat-centric data
fabrics, processing 1+ trillion events per day
to detect, hunt, and respond to threats at
unprecedented speed and scale.
2022 CrowdStrike, Inc. All rights reserved.
3 SMALL STEPS TO ADOPT FALCON PLATFORM
1 2 3
No infrastructure No fine-tuning, Install the Verify the No reboot No signatures No scan Remove legacy
setup rule writing Falcon Agent installation updates products
Financial Institution Hospitality Chain Technology Company Financial Institution
77,000 AGENTS 40,000 AGENT 55,000 AGENTS 5 300,000 AGENTS
1 DAY 5 DAYS DAYS 90 DAYS
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
EFFICIENT PERFORMANCE
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
EFFICIENT PERFORMANCE
CROWDSTRIKE
NEXT-GEN AV CROWDSTRIKE FALCON
CERTIFIED AS LEGACY
F AL C ON P R E VE NT AV REPLACEMENT
BUSINESS VALUE
Improves protection
Machine Block
Learning Known Bad
Reduces number of
incidents
Improves user productivity –
no user impact
Reduces complexity
IOA Delivers security efficiency
Behavioral Exploit and efficacy
Blocking Blocking
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
100% MACHINE LEARNING & IOA, NO SIGNATURE
CROWDSTRIKE
100% MACHINE LEARNING & IOA, NO SIGNATURE
CROWDSTRIKE
CONTEXTUAL INCIDENT
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Our Security Edge
CrowdStrike’s adversary mindset drives
and enriches everything we do.
Integrated Intelligence
Threat intel is front and center
across every Falcon module.
Adversary
Focused Protect What Matters
To stop an adversary, you must first
understand them. Learn adversary tactics
and behaviors, and adapt fast.
2022 CrowdStrike, Inc. All rights reserved.
EXTENDED DETECTION &
RESPONSE
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Automatically Detect
CrowdStrike-produced cross-
domain detections
Empower the Team
Hunt and investigate rapidly across
data sets from a single console
FALCON XDR
Speed Response
Rich context guides next steps from instant
host containment to orchestrated workflows
©2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
FALCON XDR CAPABILITIES
Data Ingest XDR Detections Investigation
▪ Broad range of data ▪ CrowdStrike-produced ▪ Graph explorer
cross-domain detections
▪ Parse and normalize key ▪ Ad-hoc queries
data for correlation and ▪ Actionable insight
analysis
Hunting & Alerts Response Case Management
▪ Scheduled search ▪ Instantly network-contain ▪ Notifications
hosts
▪ Custom XDR detections ▪ Assign, update, and
▪ Surgical remediation comment on detections
EXTENDED DETECTION AND RESPONSE
FALCON INSIGHT XDR
CROWDSTRIKE
EXPERTISE SERVICE
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
Elite Threat Hunting
With decades of experience and
powerful tooling, our expert analysts
relentlessly hunt for threats in your
environment and beyond.
Extension of your Team
Our managed services will monitor,
manage, and remediate threats in your
World-Class
environment, so you don’t have to.
Expertise Advisory & IR Services
Determine your exposure or mature your
security operations with a range of IR and
strategic advisory services available to you.
2022 CrowdStrike, Inc. All rights reserved.
STOPPING BREACHES WITH SPEED
REQUIRES MORE THAN TECHNOLOGY
MANAGE PREVENT
IMPLEMENT BLOCK THREATS
CONFIGURE
FINE-TUNE
MONITOR
RESPOND 24X7
COLLECT
CONTAIN
DETECT/HUNT
REMEDIATE
PRIORITIZE
INVESTIGATE
©2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
FALCON
COMPLETE
MANAGED DETECTION AND RESPONSE
ENDPOINT CLOUD IDENTITY
BACKED BY INDUSTRY’S STRONGEST
BREACH PREVENTION WARRANTY
©2022 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
THE FALCON PLATFORM
XDR Log Mgmt
EDR Digital Risk Monitoring Forensics
Next-Gen Antivirus Threat Intelligence IT Hygiene
Firewall Mgmt Cloud Security Posture Mgmt Malware Analysis Identity Threat Detection Vulnerability Mgmt
Device Control Cloud Workload Protection Malware Search Identity Threat Protection File Integrity Monitoring
Endpoint Security Cloud Security Threat Intelligence Identity Protection Security & IT Ops
Services
Threat Hunting MDR IR Advisory
CrowdStrike Security Cloud
Fusion
Humio Threat Graph APIs CrowdStrike Store
Lightweight Agent
Workstations Servers Virtual Machines Containers Cloud Mobile IOT
SOLUTION
PACKAGE
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
FALCON ENDPOINT PROTECTION SOLUTIONS
FALCON PRO FALCON ENTERPRISE FALCON ELITE FALCON COMPLETE
Next Gen Antivirus Next Gen Antivirus Next Gen Antivirus Falcon Endpoint Protection
Remote Response Endpoint Detection & Response Endpoint Detection & Response Delivered as a Service
Integrated Threat Intel Integrated Threat Intel Integrated Threat Intel Breach Prevention Warranty
Device Control Managed Threat Hunting Managed Threat Hunting
Firewall Management Device Control Device Control
Firewall Management Firewall Management
Identity Protection
IT Hygiene
2021 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
DEMO VIDEO
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
CROWDSTRIKE
Questions?
Additional Information
Tech Center AV Replacement
crowdstrike.com/tech-center http://replaceav.com/
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.