Call a Specialist Today! 800-886-5369

CrowdStrike Falcon Complete
Fully Managed Endpoint Protection Delivered as a Service by a CrowdStrike Team of Experts


CrowdStrike Falcon Complete

CrowdStrike Falcon Complete

Contact us for Pricing!

Get a Quote

CrowdStrike Falcon Complete uniquely provides the technology, platform, actionable intelligence and skilled expertise required to provide comprehensive endpoint security from beginning to end. With Falcon Complete, customers can entrust the implementation, management and incident response of their endpoint security to CrowdStrike’s proven team of security experts. The result is an instantly optimized security posture without the burden, overhead and cost of managing a comprehensive endpoint security program internally.


 

Overview:

Endpoint protection delivered as a service. The highest level of endpoint security maturity delivered immediately, without the burden of building and managing it yourself.

Falcon Complete - CrowdStrike Expertise and Technology, Your Security

CrowdStrike Falcon Complete uniquely provides the technology, platform, actionable intelligence and skilled expertise required to provide comprehensive endpoint security from beginning to end. With Falcon Complete, customers can entrust the implementation, management and incident response of their endpoint security to CrowdStrike’s proven team of security experts. The result is an instantly optimized security posture without the burden, overhead and cost of managing a comprehensive endpoint security program internally.

Built on the CrowdStrike Falcon platform, Falcon Complete is CrowdStrike’s most comprehensive endpoint protection solution. It provides unparalleled security by combining Falcon Prevent™ next-gen antivirus (NGAV), Falcon Insight™ endpoint detection and response (EDR) and Falcon OverWatch™ managed threat hunting with the expertise and 24/7 engagement of the CrowdStrike team. The team manages and actively monitors the Falcon platform for customers and remotely remediates incidents as needed. Falcon Complete combines the effectiveness of the Falcon platform with the efficiency of a dedicated team of security professionals, executing focused, incident-handling playbooks on your behalf.

Endpoint Security Delivered

Falcon Complete is the comprehensive endpoint security lifecycle solution that takes care of all aspects of endpoint security, including remotely remediating incidents with confidence, so you don’t have to. It allows you to gain the highest level of endpoint security while simplifying the implementation and day-to-day operations of your endpoint protection program. Falcon Complete uniquely provides the technology, platform, actionable intelligence and skilled expertise required to fully handle endpoint security, from beginning to end.

What makes Falcon Complete unique?

  • Offloading Falcon endpoint protection to experienced CrowdStrike staff
  • Assisting in deployment and configuration
  • Providing 24x7 alert and incident handling
  • Delivering proactive incident triage and containment
  • Effectively handling incident remediation
  • Ensuring transparent management reporting and metrics

Endpoint Protection As A Service

Fully managed endpoint protection delivered by CrowdStrike’s team of experts and the best endpoint security software in the industry – all backed by a guaranteed breach prevention warranty.


Achieves Instant Security Maturity

Achieves Instant Security Maturity

The Falcon Complete team instantly provides industry leading endpoint protection as a service 24/7.

Reduce Time to Remediate

Reduce Time to Remediate

Gain efficiency by reducing time to remediation - the Falcon Complete team are experts in remediation.

Improve Operation Effectiveness

Improve Operation Effectiveness

You avoid the cost of having to hire, train, and retrain highly qualified FTE's - freeing up resources to be focused on other value-add activities.


Cybersecurity Challenge:

Solves the challenge of managing, responding to and remediating threats

Operating an effective endpoint security program can be extremely challenging. The necessary tools can be difficult to use, requiring an abundance of resources to appropriately implement, support and maintain them over time. As a result, many organizations fail to get the most out of the endpoint security technologies they have acquired.

The situation is even worse for organizations that want to establish a strong endpoint security posture. Higher levels of security require even more resources as they can be costlier to maintain and more complex to manage.

The result? Many organizations do not successfully implement a fundamental endpoint security program, let alone a comprehensive one. The situation is exacerbated when serious incidents emerge and the organization does not have the time or expertise to properly remediate the situation, potentially endangering the safety of the organization.

There are some specific challenges that organizations can struggle with in their implementation of an endpoint security program:

  • Difficulty fully implementing and properly configuring the technology they acquired: Depending on the size and workload of their IT teams, some organizations might not have the tools and bandwidth to quickly and successfully deploy the solution to their endpoints. In addition, they may lack the time and expertise needed to properly configure policies that match their security requirements and keep endpoints protected. This situation can result in an endpoint solution that is only partially deployed and poorly configured — resulting in gaps in protection that leave the organization vulnerable to breaches.
  • Difficulty managing alerts and incidents day-to-day: Handling the potentially huge number of alerts generated by an endpoint security product can be overwhelming, even for organizations that have a dedicated security team or a SOC (security operation center). It not only takes manpower to manage alerts, it requires staff with enough cybersecurity expertise to understand the alerts and determine how to properly respond to them. Unfortunately, most organizations suffer from a shortage of both manpower and expertise, leaving alerts unvalidated and opening the door to high-profile breaches.
  • Difficulty properly remediating incidents: The shortage of resources and expertise can lead organizations to struggle with understanding the nature and scope of an incident in a timely manner. This can mean incidents are not remediated efficiently, fully addressed, or handled in a timely manner, leaving organizations vulnerable or compromised. It takes skill and experience to know what to do to properly remediate an incident. Many organizations that lack resources are forced to go through the arduous process of reimaging endpoints, because the alternative of precisely combining countermeasures such as network containment, hash prevention, delete/modify registry key values or stop/disable/restart services is not possible. Yet, even reimaging does not ensure that the incident is fully remediated.
  • Not having the budget to build a comprehensive endpoint security program: The cost of building a comprehensive security program that is staffed 24/7 by security experts is out of reach for many organizations, making the required level of security maturity unachievable for many companies.
  • Time it takes to implement the program: Even if an organization possesses the financial means to build an internal endpoint security program, it can take a long time to implement a mature security strategy. From finding and hiring the right talent and acquiring the appropriate technology, to defining policies and creating an incident response (IR) process, the entire undertaking can take months if not years. In addition, such programs often are given a lower priority than other urgent IT projects, resulting in long implementation processes that leave organizations vulnerable.
  • Difficulty finding and retaining the required expertise: It can be challenging for an organization to acquire the expert staff needed to efficiently secure their endpoints. For those who can afford it, recruiting, training and retaining the staff and skills to match an advanced and sophisticated threat landscape can be very difficult. This shortage of qualified expertise is an industry-wide problem.
  • Some required components do not exist: Even if organizations decide to outsource their endpoint security, rather than build it internally, they will find that not all the necessary components can be easily found. One of the most difficult and sensitive steps is remediation. Most security providers will shy away from offering such a component because it requires a level of skill and experience they do not possess.

Cybersecurity Challenge

Modules Include:


Falcon Prevent


Falcon Prevent

Next-gen AV
Protects against both malware and malware-free attacks; third-party tested and certified, allowing organizations to confidently replace their existing legacy AV


Falcon Insight


Falcon Insight

Endpoint Detection & Response
Delivers continuous and comprehensive endpoint visibility across detection, response and forensics, so nothing is missed and potential breaches can be stopped


Falcon Discover


Falcon Discover

IT Hygiene
Identifies unauthorized systems and applications, and alerts in real time to the use of privileged credentials in your environment, enabling faster remediation


Falcon Overwatch


Falcon Overwatch

Threat Hunting Service
Identifies attacks and stops breaches 24/7 with an elite team of experts who proactively hunt, investigate and advise on threat activity in your environment


Falcon Complete Team


Falcon Complete Team

Managed Detection & Response
Experienced analysts who manage, respond, and remediate alerts and incidents 24/7 – delivering endpoint protection as a a service using the Falcon Platform


Use Cases:

Use Case: Difficulty Implementing Technology Benefits
Challenge Depending on the size and workload of your IT teams, you may not have the tools and bandwidth necessary to quickly and fully implement endpoint security, leaving your organization vulnerable to breaches.

Falcon Complete handles all aspects of endpoint security, from deployment, configuration, maintenance and monitoring, to alert handling, incident response and remediation, ensuring you have effective endpoint security and reducing the risk of a breach.
Solution Falcon Complete™ helps you successfully operationalize and optimize your endpoint security with:
  • Configuration expertise: CrowdStrike helps you create the policy management groups and apply the desired prevention policies for you based on your expertise and experience.
  • Tuning and refinement: Prevention and detection policies are continually reviewed with you to ensure the optimal operation of all the capabilities of the Falcon platform.
  • Ongoing management: Over time, the endpoints on a given network change. From technology refreshes, to joiners, movers, and leavers, there is a significant churn in any given organization that needs to be managed to ensure that the correct prevention policies and the health of endpoint agents are being maintained.
Use Case: Difficulty Managing Alerts and Incidents Day-To-Day Benefits
Challenge Handling a large volume of alerts generated by an endpoint security product can be overwhelming. This can lead to alert fatigue and leave alerts invalidated or incorrectly handled, opening the door to breaches.

You benefit from 24x7x365 monitoring and incident handling assistance, ensuring that all alerts are effectively handled, reducing the risk of a serious breach.
Solution Falcon Complete will manage all of these alerts and undertake the necessary actions:
  • Incident handling: The Falcon Complete team works with you to create a set of incident handling playbooks to articulate what types of countermeasures will be taken in a given detection scenario.
  • Remote incident triage: When the Falcon platform generates an alert, the Falcon Complete team triages it to identify if it is a false positive or a true incident, then classifies it appropriately in the incident management system.
  • Remote incident remediation: In accordance with the playbooks created for you, the Falcon Complete team may initiate incident response countermeasures to completely stop attacks and remediate incidents.
Use Case: Difficulty in Properly Remediating Incidents Benefits
Challenge  

The Falcon Complete team will fully resolve the incident so that you don’t have to deal with it.
Solution Falcon Complete will step in and undertake all of the actions needed to respond and remediate an incident:
  • Remote incident remediation: In accordance with the defined playbooks, Falcon Complete will seek to understand the nature of the alert and then build a strategy for remediation by combining specific countermeasures.
  • Remote access to the endpoint: The team will act to disrupt and eradicate attacks in progress, cleaning up a compromised endpoint or removing malware artifacts for further analysis.

 

Video:

Falcon Complete from CrowdStrike

CrowdStrike's Falcon Complete -- The highest level of endpoint security maturity delivered immediately, without the burden of building and managing it yourself.



Compare Falcon Endpoint Protection Solutions:


  Falcon Pro Falcon Enterprise Falcon Premium Falcon Complete
  Replace legacy AV with market-leading NGAV and integrated threat intelligence and immediate response Unified NGAV, EDR, managed threat hunting and integrated threat intelligence Full endpoint protection with threat hunting and expanded visibility Endpoint protection delivered as-a-service and backed with a Breach Prevention Warranty up to $1M.

Falcon Prevent
Next-Generation Antivirus

Include

Include

Include

 









Fully managed endpoint protection
delivered as a service by a CrowdStrike team of experts.


Falcon X
Threat Intelligence

Include

Include

Include

Falcon Insight
Endpoint Detection & Response
 
Include

Include

Falcon Device Control
Device Control

Optional

Include

Include

Falcon Overwatch
Threat Hunting
 
Include

Include

Falcon Discover
IT Hygiene
 
Optional

Include

CrowdStrike Services
Incident Response & Proactive Services

Optional

Optional

Optional

Support:

CrowdStrike offers premium support services to assist you with deployment and ongoing use of the CrowdStrike Falcon platform to ensure your success in keeping your environment secure and stopping breaches.

The CrowdStrike support organization is dedicated to resolving any issues quickly and effectively

CrowdStrike provides multiple levels of support so you can choose the level that best fits your organization’s requirements and ensures that you receive the most benefit from your investment in CrowdStrike.

CrowdStrike provides four levels of support:

Standard Support

Standard Support is bundled free with all Falcon subscriptions, providing basic support services, with a next-business-day response service level agreement (SLA).

Express Support

Express Support is designed for customers in small to medium-sized enterprise environments where deployment and operational issues must be addressed as quickly as possible.

Express Support provides everything included in Standard Support, plus:

  • Prioritized case handling
  • Quarterly health checks and reports
  • Knowledge transfer opportunities
  • Access to CrowdStrike’s team of technical account managers (TAMs) for product advice and issue escalation
  • Enhanced knowledge base
  • Premium video and webinar content

Essential Support

Essential Support is designed for mid-sized enterprise environments. From planning your deployment to ongoing operations, CrowdStrike’s team of support professionals understands the importance of your mission and are committed to working with you to avoid problems and resolve issues as quickly as possible.

Companies that value proactive engagement to avoid issues and fast and predictable access to support will benefit from this service.

Essential Support provides everything included in Express Support, plus:

  • 30 days of personalized onboarding support
  • Invitations to Beta Programs
  • Periodic proactive calls from a TAM
  • Reports covering the overall health of your CrowdStrike deployment, best practices, tuning, case status and reviews of new product features and capabilities

Elite Support

Elite Support is the highest level of support provided by CrowdStrike. A named TAM works closely with you as an extension of your team.

Elite Support builds on CrowdStrike Essential Support and adds the following:

  • Custom reporting
  • Weekly scheduled meetings
  • On-site visits (up to quarterly)
  • Product management team access
  • Named TAM

Support Level Standard Express Essential Elite
Support Access
Support Portal (Knowledge Base, Case Submissions)
24/7/365 Phone Support for Emergencies
Live Chat (Business Hours)
Priority Case Assignment  
Premium Support Content (Articles, Videos, Webinars)  
Access to TAM Team for Product Advice and Escalations  
Named TAM      
Technical Account Management
Proactive Case Management    
Quarterly Reports   Custom
Weekly Deployment Follow-up Meetings    
Proactive Outreach    
Quarterly Health Checks  
Beta Program Invitations    
Roadmap Webinars  
On-site Visits      
Ad-hoc Product Guidance and Knowledge Transfer    
First 30 Days Ramp-Up
Welcome Letter  
1:1 Quick Start Call    
Weekly and Monthly Premium Support Newsletters    
Onboarding Webinar  

Support Care

Response Time

  • Standard: The support engineer responds to technical issues within one business day of a call or one business hour for critical issues.
  • Express, Essential: The support engineer responds to technical issues within four business hours of a call or one business hour for critical issues.
  • Elite: The support engineer responds to technical issues within four business hours of a call or one business hour for critical issues.

24x7 Critical Issue Support

  • Standard: For critical technical issues (P1 – Network down), the support team is available around the clock.
  • Express, Essential and Elite: For critical technical issues, the team will be available around the clock, escalating issues as appropriate for the quickest possible resolution. You will be given a dedicated phone number for these critical cases.

Prioritized Case Handling

  • Express, Essential and Elite Support cases take precedence over Standard cases at the same priority level.

Proactive Support

  • Essential and Elite: During periodic calls scheduled at your convenience, a member of the TAM team will provide Q&A or just-in-time training on topics of your choice, updates on the latest product features, and general platform health checks.

Product Care

Defect Handling

  • Standard: When determined the issue could be caused by a defect in the product, a case will be opened on the customer’s behalf and managed to resolution.
  • Express, Essential and Elite: When determined the issue could be caused by a defect in the product, the customer’s ticket will take precedence over others within the same priority level.

Feature Requests

Feature requests should be submitted through the Ideas section in the Falcon Support Portal where they are regularly reviewed and prioritized by the product teams.

Account Care

Technical Account Manager Team

  • Express, Essential and Elite: You receive direct access to the TAM team, which will be your liaison to support and product management.

Pricing Notes:

CrowdStrike Products
CrowdStrike Falcon Endpoint Protection
CrowdStrike Falcon Complete
Contact us for Pricing!