CrowdStrike Services delivers incident response, technical assessments, training, and advisory services that help you prepare to defend against advanced threats, respond to widespread attacks, and enhance your cyber security practices and controls.
Prepare
CrowdStrike Services help you prepare and train to defend your organisation against sophisticated threat actors using real-life simulation exercises.
- Tabletop exercise - This discussion-based exercise simulates a targeted attack in a time-compressed fashion, but without the risk and time required for a full adversary emulation.
- Adversary Emulation Exercise - Adversary emulation is the most realistic way to gauge an organisation’s readiness and ability to defend against a targeted attack.
- Red team / Blue team exercise - By conducting a CrowdStrike Services Red Team / Blue Team Exercise, organisations are able to identify the gaps in their security postures that limit their ability to detect malicious activity.
- Penetration testing services - Penetration testing, is the simulation of real-world attacks in order to test an organisation’s detection and response capabilities. The purpose of pen testing is to test people and processes against likely threats to their organisation.
Respond
CrowdStrike Services help you stop breaches, investigate incidents, and recover from attacks with speed and surgical precision.
- Incident response - The CrowdStrike® Incident Response (IR) team works collaboratively with organisations to handle critical security incidents and forensic investigations, resolve immediate issues and implement a long-term solution to stop recurrences.
- Compromise assessment - CrowdStrike Compromise Assessment is specifically designed to identify current and past attacker activity in your environment.
- Endpoint recovery - CrowdStrike’s Endpoint Recovery Services uses the Real Time Response features of the Falcon platform to gain access to compromised endpoints to kill malicious processes and delete infected files.
- Network security monitoring - CrowdStrike Network Security Monitoring utilises both the expertise of CrowdStrike Services threat hunters and a network appliance that detects threats present in an environment.
Fortify
CrowdStrike Services help you enhance your cybersecurity practices and controls with actionable recommendations to fortify your cyber security posture.
- Cyber security maturity assessment - The Services team evaluates an organisation’s maturity level through an acute lens tempered by years of experience in responding to threats.
- Cloud security Assessment - The CrowdStrike Cloud Security Assessment combines forensic analysis and testing of cloud infrastructure to determine if the appropriate levels of security and governance needed to counter inherent security challenges has been implemented.
- Active directory security assessment - This unique offering is designed to review Active Directory (AD) configuration and policy settings in order to assess security configuration issues that attackers can leverage.
- SOC Assessment - A CrowdStrike SOC Assessment helps enhance the maturity level of Security Operations Center (SOC), and identify and prioritise areas for improvement.
- Technical risk assessment - This provides improved visibility into applications, accessibility and account management within networks that deliver comprehensive context around network traffic and security gaps.
- Cyber security enhancement programme - CrowdStrike’s Cyber security Enhancement Programme is for organisations that recently experienced a breach and require assistance in developing a strategic cyber security improvement plan to prevent another breach from occurring.