CrowdStrike Products
CrowdStrike Services
M&A Compromise Assessment
Data Sheet
Network Detection
Services
Delivering complete network visibility, detection and
threat hunting as a service
Network blind spots and silent failure
Key benefits
Blind spots in the network and the silent failure of traditional intrusion detection
systems expose organizations to a wide range of potential threats including IP
theft, ransomware, malware and other more destructive attacks.
Gain complete visibility across
Proprietary devices and the Internet of Things (IoT) — including critical your entire network to learn
industrial, manufacturing and medical devices, which lack the protection of if attackers have breached
traditional endpoints — are susceptible to attacks over the network. your defenses and are moving
undetected across your
To find the latest threats, security operations leaders need to identify potential environment
threat activity occurring within their network so they can respond quickly to a
network intrusion and accelerate the investigation of and response to a cyberattack. Get next-level analytics to
correlate high-fidelity security
telemetry across endpoints,
Powerful network detection with complete visibility identities and network devices
CrowdStrike Network Detection Services helps correlate high-fidelity security Accelerate the investigation and
telemetry across endpoints, identities and network devices to gain complete response to network intrusions
visibility into malicious threat actors operating within your network.
Proactively hunt for threats
CrowdStrike and CrowdXDR Alliance partner Corelight natively integrate to through network metadata to
provide unified technology that delivers network detection and response with detect new and unknown attacks
complete visibility to network intrusions, lateral movement and cyberattacks
across endpoints, identities and unprotected network devices.
Detect threat activity across your network with this CrowdStrike and Corelight
integrated solution. Contain and eject adversaries from your network before they
disrupt your business operations.
CrowdStrike Services
Network Detection Services
Key service features Why choose
Network visibility and analysis CrowdStrike?
• Gain the network visibility necessary to detect threats and enable threat
hunting at the network layer.
• Augment your current security tools that cannot provide the visibility CrowdStrike unified XDR
necessary in potential threat vectors like end-of-life operating systems, platform: CrowdStrike Falcon®
unmanaged endpoint devices, network devices and IoT devices.
Insight XDR delivers a unified view of
• Go beyond known threats to hunt for unknown threats using next- threat detections across endpoints,
generation intrusion detection with integrated network metadata analysis identities and network traffic
and smart packet capture. (powered by Corelight).
• Detect non-malware attacks based on behavioral sequences and the
integration of CrowdStrike threat intelligence. Corelight Open NDR
technology: Corelight Open
NDR technology integrates with
Multi-faceted detection capabilities Falcon Insight XDR to provide smart
• Use indicators of compromise (IOCs) and indicators of attack (IOAs) from packet capture to streamline network
CrowdStrike threat intelligence to hunt for threats using network protocol visibility and close gaps in network
metadata analysis. intrusions, including IoT and ICS
environments.
• Find command-and-control (C2) activity using advanced analytics to
identify attacks hiding in encrypted traffic. CrowdStrike expert threat
• Streamline network traffic with smart packet capture to extract malware hunting: CrowdStrike expert threat
and enable analysis of at-risk data. hunters take advantage of correlated
high-fidelity security telemetry with
• Get all of the benefits of a fully integrated intrusion detection system (IDS).
CrowdStrike threat intelligence to
accelerate the investigation of a
Flexible deployment options cyberattack.
• Choose your deployment option with hardware, software, cloud or virtual
sensors.
• Rapidly deploy to your existing hypervisors via virtual sensors, saving you
time, effort and money.
• Opt for physical or virtual sensors that are easy to deploy, install and use
and are designed to work effectively within your current IT stack.
About CrowdStrike Services
CrowdStrike Services delivers Incident Response, Advisory Services, Technical Assessments,
Product Support and Training that help you prepare to defend against advanced threats,
respond to widespread attacks, enhance your cybersecurity practices and controls and
operationalize your technology platform.
We help our customers assess and enhance their cybersecurity posture, implement
technologies, test defenses against real-world attacks, respond to incidents, accelerate
forensic investigations, and recover from a breach with speed and precision. Harnessing the
power of the CrowdStrike® Security Cloud and the CrowdStrike Falcon® platform, we help you
protect critical areas of enterprise risk and hunt for threats using adversary-focused cyber threat
intelligence to identify, track and prevent attacks from impacting your business and brand.
Learn more
www.crowdstrike.com/services/
Email
[email protected]
CrowdStrike:
© 2023 CrowdStrike, Inc.
We stop breaches. All rights reserved.