Skip to product information
1 of 5

CrowdStrike

CrowdStrike Falcon® Endpoint Protection Pro for Business

CrowdStrike Falcon® Endpoint Protection Pro for Business

Regular price $49.99
Regular price $107.88 Sale price $49.99
Sale Sold out

Note: 10 License Minimum Order, must be a Registered Business. Orders placed by individuals will not be fulfilled.

Replace your legacy AntiVirus with the market-leading Next Generation AntiVirus (NGAV) from Crowdstrike, built off the power of ThreatGraph integrated threat intelligence and powerful response capabilities.

Crowdstrike Falcon Pro is an incredible starter solution for small to mid-sized businesses to protect against both file-based and file-less attacks. Utilizing a simple, lightweight agent, you will have superior protection and performance, without the need for signature updates. 

Falcon Pro offers immediate time to value- no fine-tuning or costly infrastructure. You endpoints and servers will receive unmatched protection from the moment you deploy.

Annual License Bundle includes Falcon Prevent, Control & Respond, Device Control, Falcon Intelligence (formerly FalconX), Firewall Management, and Express Support.

View full details

NEXT-GEN AV SOLUTION:
ENDPOINT PROTECTION PRO

Falcon Endpoint Protection Pro offers the ideal AV replacement solution by combining the most effective prevention technologies and full attack visibility with built-in threat intelligence — all in a single lightweight agent.

UPGRADE FROM LEGACY AV TO CUTTING EDGE DEFENSES

Process tree unravels attacks at a glance while providing all the context and details

  • Unmatched prevention capabilities protect against known, unknown malware and ransomware, and fileless and malware-free attacks
  • Full attack visibility provides details, context and history for every alert
  • Automated, scripted and analyst-driven intervention capabilities enable efficient and powerful remediation
  • Threat Intelligence integration immediately assesses the origin, impact and severity of threats in the environment and provides recovery guidance for decisive incident response and remediation
Learn more about Endpoint Protection Pro

STATE-OF-THE-ART PREVENTION

Uses a powerful array of technologies to prevent attacks

Falcon Endpoint Protection Pro uses a complementary array of technologies to prevent threats:

  • Machine learning and artificial intelligence for detection of known and zero-day malware, and ransomware
  • AI-powered indicators of attack (IOAs), script control and high-performance memory scanning identify malicious behaviors and prevent sophisticated fileless attacks
  • Exploit blocking to stop the execution and spread of threats via unpatched vulnerabilities
  • Threat intelligence prevention to block activities known to be malicious
Learn more about Endpoint Protection Pro

THE EASIEST AV REPLACEMENT SOLUTION

Tens of thousands of endpoints operationalin hours

  • Simplifies operations with signatureless protection
  • Deploys in minutes and is immediately operational with cloud-delivered architecture
  • Automatically kept up to date with native cloud architecture
  • Extends effective control and prevention to USB devices
  • Simplifies operations by using the same lightweight Falcon agent and console to manage firewall capabilities native to the operating system
Learn more about Endpoint Protection Pro

RESTORE PERFORMANCE AND PRODUCTIVITY

Restores endpoint performance

  • Virtually zero impact on the endpoint — from initial installation to ongoing day-to-day use
  • Operates with only a tiny footprint on the endpoint
  • Simplifies operations with signatureless protection
Learn more about Endpoint Protection Pro

BUSINESS VALUE

Boost prevention
capabilities

Increases security
efficiency

Increases endpoint
performance

Eliminate cost and
burden associated with
keeping up-to-date

MODULES INCLUDE

FALCON PREVENT

Next-gen AV

Protects against both malware and malware-free attacks; third-party tested and certified, allowing organizations to confidently replace their existing legacy AV

FALCON INTELLIGENCE

Integrated threat intelligence

Integrates threat intelligence into endpoint protection, automating incident investigations and speeding breach response

FALCON DEVICE CONTROL

USB device protection

Enable safe and accountable USB device usage with effortless visibility and precise and granular control of USB device utilization

Falcon Firewall Management

Host firewall control

Provides simple, centralized firewall management, making it easy to manage and enforce host firewall policies

AI POWERED NGAV

AI powered machine learning and IOAs protect against attacks

  • Protects against known and unknown malware, and malware-free or fileless attacks
  • Combines the best NGAV prevention technologies such as machine learning, AI-powered indicators of attack (IOAs), high-performance memory scanning and more
  • Eliminates ransomware
  • Covers the gaps left by legacy AV
  • Fully protects endpoints online and offline
  • Cleans up known artifacts left behind from blocked malicious activity

FULL ATTACK VISIBILITY AT A GLANCE

Process tree unravels attacks at a glance, providing all the context and details

  • Provides unparalleled alert context and visibility
  • Keeps detection details for 90 days
  • Unravels an entire attack in one easy-to-grasp process tree enriched with contextual and threat intelligence data

DEVICE CONTROL

Detailed visibility on USB devices utilization

Reduces the risks associated with USB devices by providing:
  • Granular policy enforcement to ensure control over USB devices used in the environment
  • Effortless visibility across USB device usage, including what files are being copied to USB storage
  • Insightful dashboards automatically provide detailed information such as class, vendor, product, serial number

FIREWALL MANAGEMENT

Host firewall management made easy

  • Easily create, enforce and maintain firewall rules and policies
  • Simplify operations by using the same lightweight Falcon agent, management console and cloud-native architecture
  • Automatically identify and view specific activities, potential threats and network anomalies

CONTROL AND RESPOND

Immediately respond with surgical precision

REAL-TIME RESPONSE Provides flexible response action to investigate compromised systems, including on-the-fly remote access to endpoints to take immediate action
NETWORK CONTAINMENT Responds decisively by containing endpoints under investigation
FAST AND EASY REMEDIATION Accelerates effective and efficient incident response workflows with automated, scripted, and manual response capabilities

INTEGRATED THREAT INTELLIGENCE

Fully understand the threats in your environment and what to do about them

Malware research and analysis at your fingertips:

  • Eliminate guesswork and uncertainty to respond to threats decisively
  • Automatically determine the scope and impact of threats found in your environment
  • Easily prioritize responses with threat severity assessment
  • Immediately get recovery steps and resolve incidents with in-depth threat analysis
  • Find out if you are targeted, who is targeting you and how to prepare and get ahead

THE POWER OF THE CLOUD

Tens of thousands of endpoints operational in hours

CrowdStrike’s cloud-native platform eliminates complexity and simplifies endpoint security operations to drive down operational cost

Reduced cost and complexity: Operates without the need for constant signature updates, on-premises management infrastructure or complex integrations.

Protection of the crowd: Allows everyone to be protected against a threat encountered in just one environment. Automatically scales to adapt to growth and changing needs.

Restores endpoint performance: Installation and day-to-day operations bear zero impact on endpoints — even when analyzing, searching and investigating.

Works on day one: Deploys and is operational in minutes.

About Defensive

Defensive is a Next Generation Solution Provider for a Cloud-First World. We exist to take the guesswork out of Cybersecurity and Information Technology procurement and adoption.

Defensive of your Brand.

Trusted by leading enterprises around the globe.

Defensive of your People.

Let’s create harmony between Infosec, IT, Executives, End Users, and Finance.

Defensive of your Time.

We’re straight to the point, with technologies and strategies that work.

Defensive of your Budget.

Eliminate wasted expenditure and maximize the value of every dollar.

TRUSTED BY

87 of the Fortune 1000

Over 1,400+ small, medium and large enterprises.

As Seen In