⚲
|
CrowdStrike Holdings Inc | |
---|---|
Ticker | CRWD |
CIK # | 0001535527 |
CUSIP | 22788C105 |
Sector | Technology |
Industry | Services-Prepackaged Software |
Phone | 8885128906 |
Address | 150 Mathilda Place Suite 300 Sunnyvale, CA 94086 |
Source | [EDGAR] |
Market Cap, 13F ($) |
---|
Business |
---|
We founded CrowdStrike in 2011 to reinvent security for the cloud era. When we started the company, cyberattackers had a decided, asymmetric advantage over existing security products. We turned the tables on the adversaries by taking a fundamentally new approach that leverages the network effects of crowdsourced data applied to modern technologies such as AI, cloud computing, and graph databases. Realizing that the nature of cybersecurity problems had changed but the solutions had not, we built our CrowdStrike Falcon platform to detect threats and stop breaches. We believe we are defining a new category called the Security Cloud, with the power to transform the security industry much the same way the cloud has transformed the CRM, HR, and service management industries. With our Falcon platform, we created the first multi-tenant, cloud native, intelligent security solution capable of protecting workloads across on-premise, virtualized, and cloud-based environments running on a variety of endpoints such as laptops, desktops, servers, virtual machines, and IoT devices. We deliver comprehensive breach protection even against today's most sophisticated attacks on the endpoint, where the most valuable corporate data resides. Our Falcon platform is composed of two tightly integrated proprietary technologies: our easily deployed intelligent lightweight agent and our cloud-based, dynamic graph database called Threat Graph. Our solution benefits from crowdsourcing and economies of scale, which we believe enables our AI algorithms to be uniquely effective. We call this cloud-scale AI. Our single lightweight agent is installed on each endpoint and provides local detection and prevention capabilities while also intelligently collecting and streaming high fidelity data to our platform for real-time decision-making. Our Threat Graph processes, correlates, and analyzes this data in the cloud using a combination of AI and behavioral pattern-matching techniques. By analyzing and correlating information across our massive, crowdsourced dataset, we are able to deploy our AI algorithms at cloud-scale and build a more intelligent, effective solution to detect threats and stop breaches that on-premise or single instance cloud products cannot match. Today, we offer 11 cloud modules on our Falcon platform via a SaaS subscription-based model that spans multiple large security markets, including endpoint security, security and IT operations (including vulnerability management), and threat intelligence. Organizations everywhere are becoming more distributed as they adopt the cloud, increase workforce mobility, and grow their number of connected devices. They are adding more workloads to a myriad of different endpoints beyond the traditional security perimeter, exposing an increasingly broad attack surface to adversaries. In addition, the sophistication of cyberattacks has increased, often coming from nation-states, well-funded criminal organizations, and hackers using advanced, easily obtained methods of attack. On a number of occasions, adversaries have launched devastating, destructive attacks that have caused significant business disruption and billions of dollars in cumulative losses. The architectural limitations of legacy security products, coupled with a dynamic and intensifying threat landscape, are creating the need for a fundamentally new approach to security. |
CIK | Filing | 2011 - 2023 |
---|---|---|
[0001535527] | 10-K | |
[0001535527] | 10-Q | |
[0001535527] | 3 | |
[0001535527] | 4 | |
[0001535527] | 8-K | |
[0001535527] | SC 13G |