What is the Crowdstrike Falcon Insight?
CrowdStrike Falcon Insight is an advanced endpoint detection and response (EDR) solution. It provides continuous monitoring, threat detection and advanced analysis of attacks in the endpoint device environment. Using artificial intelligence and machine learning, it provides comprehensive protection against a variety of cyber threats.

Features of Falcon Insight
Key features and functions of the Crowdstrike Falcon Insight
Real-time detection
Falcon Insight continuously monitors activity on end devices, detecting suspicious behaviour and attacks as they occur.
Artificial intelligence and machine learning
Advanced AI algorithms enable the detection of even the most subtle and advanced threats that may escape traditional solutions.
Behavioural analysis
Falcon Insight analyses the normal behaviour of users and devices, making it easy to detect anomalies that indicate a potential threat.
Tracking the attack
The tool provides detailed tracking of an attack to understand its purpose and method of operation. The system also creates functional data, identifies changes in adversaries' tactics and maps their methods.
Automated response
Falcon Insight can automatically take action in response to detected threats, such as isolating infected devices or blocking malware. The system enables real-time action to stop attacks before they become intrusions. Its response capabilities allow isolation and investigation of compromised systems, as well as direct access to endpoints during analysis.
Full contextual knowledge
Integrated threat analysis provides the full context of the attack, including attribution data.
Presentation of the entire attack via a single screen
The system provides a comprehensive view of the attack from start to finish, with deep context for faster and easier analysis.
Gathering critical details for threat detection and investigative activities
The Falcon Insight driver running from the system kernel captures more than 400 raw events and related information necessary for incident recovery.
Retention of up to 90 days
Falcon Insight provides a complete record of endpoint activity over time, no matter how large the protected environment.
Assessment of the current security situation
Falcon Insight identifies the status of endpoints across the organisation. This makes it easy to identify and update agent settings and operating systems that are out of date or at risk.
Real-time detection
Falcon Insight continuously monitors activity on end devices, detecting suspicious behaviour and attacks as they occur.
Enforcement of password rules: administrators can enforce the use of strong passwords or PINs to unlock devices.
Example: all devices in the company are configured so that users must set passwords with a minimum length of 8 characters, containing numbers, letters and special characters. Attempts to use a simple password, such as '1234', are automatically blocked.
Example: all devices in the company are configured so that users must set passwords with a minimum length of 8 characters, containing numbers, letters and special characters. Attempts to use a simple password, such as '1234', are automatically blocked.
Data encryption: MDM enforces memory encryption on mobile devices, which protects data in the event of loss or theft.
Example: Bank employees' mobile devices have enforced data encryption. Even if the device is stolen, customer data (e.g. bank statements) will remain inaccessible without the encryption key.
Example: Bank employees' mobile devices have enforced data encryption. Even if the device is stolen, customer data (e.g. bank statements) will remain inaccessible without the encryption key.
Blocking hazardous functions: you can restrict access to features such as rooting, jailbreak or installing applications from outside authorised sources (e.g. Google Play, App Store).
Example: The technology company has blocked the installation of applications from unauthorised sources. An employee who tries to install a suspicious game from an unofficial site receives a message about lack of permissions.
Example: The technology company has blocked the installation of applications from unauthorised sources. An employee who tries to install a suspicious game from an unofficial site receives a message about lack of permissions.
Why Falcon Insight
Why use Crowdwstrike Falcon Insight?
01
Rapid detection and response to advanced attacks.
02
Full visibility of end device activity.
03
Reduce the time needed for incident analysis and minimise the impact of the attack.
04
The ability to anticipate threats through a global database of cyber attacks.
05
Minimise the risk of a data breach.
06
Simplifying IT security management in the organisation.
07
Increasing the productivity of IT teams.
08
Simple and quick implementation:
Saving time, effort and money: Falcon Insight's cloud-based version does not require any infrastructure to manage locally;
Deployment in minutes: thanks to a specially designed, lightweight agent, CrowdStrike enables the industry's fastest deployment with unparalleled scalability;
Immediately operational - Falcon Insight starts working straight away, monitoring and recording activities after installation without the need for rebooting, customisation, setting basic indicators or complex configuration;
No impact on the performance of protected resources: CrowdStrike provides full, automated protection on endpoints without affecting either their performance.

ESET
What is ESET PROTECT?
ESET PROTECT is an advanced IT security management platform that enables comprehensive protection of IT infrastructure in organisations. It offers centralised management of ESET solutions, including endpoint, server and virtual machine protection. The platform combines various security functions, including threat detection, incident analysis and vulnerability management, adapting to the needs of companies of all sizes.
Features of ESET PROTECT
Main features and functions of ESET PROTECT
Unified console
From ESET PROTECT, all ESET products running on all workstations in the company can be managed. This includes devices running Windows, macOS, Linux and Android operating systems, including workstations, mobile devices, servers and virtual machines, among others. The console is available essentially in the cloud with the option of local deployment:
provides real-time information on all devices - computers, servers, virtual machines and even mobile devices;
enables full reporting as required by the administrator;
controls prevention, detection and response mechanisms on all types of devices;
you can connect to it anywhere, anytime using your favourite web browser.
Comprehensive software to protect organisations and enable:
protection against malware, including ransomware;
blocking targeted attacks;
preventing data security breaches;
stopping fileless attacks;
detection of advanced zero-day threats;
equipment access control,
protection against phishing attacks.
Server protection
ESET Protect provides advanced protection for corporate data exchanged between servers of various purposes, including web, file and database servers, or multifunctional servers and the OneDrive platform.
Encryption of the entire contents of a drive
The ESET PROTECT console features native Full Disk Encryption on Windows and macOS PCs (FileVault). This feature enhances data security and allows compliance with applicable legislation.
Sandbox in the cloud
The ability to quickly analyse suspicious files in an extensive cloud-based testing environment definitely facilitates the detection of zero-day threats.
Hardware and software inventory
ESET PROTECT allows reports to be created on devices owned and applications installed across the enterprise.
Full multi-user support
The ESET PROTECT solution allows the creation of multiple user accounts and sets of permissions to access different console functionalities. This makes it possible to fully optimise the division of responsibilities in large corporate teams. Another advantage is the ability to perform a wider range of activities from a single location by dynamically grouping computers based on make, model, operating system, processor, RAM, hard drive capacity and many other parameters.
Precise control of policies
Enterprises can set multiple policies for the same computer or the same group of computers and nest the policies, allowing inheritance of privileges.
Operation of SIEM tools and SOC teams
ESET PROTECT provides full support for SIEM tools and allows all log information - using the widely accepted JSON and LEEF formats - to be made available to the Security Operations Centre (SOC).
Why ESET PROTECT
Why use ESET PROTECT?
Centralised management
Centralised management - ESET's platform allows all devices, servers, workstations and mobile devices to be managed from a single console.
Easy incident prevention
From the console home screen, the administrator can quickly assess the security situation in his or her company and react to any problems. With a single click, it is possible to perform actions such as creating exclusions, forwarding files for further analysis or running scans.
Multi-platform support
ESET's workstation protection solutions are available for Windows, Mac, Linux and Android, offering a mobile device management option (known as Mobile Device Management) for iOS and Android.
Control of devices and applications
ESET's software can manage access to external devices (e.g. memory sticks) and applications installed on workstations, minimising the risks associated with unauthorised access and software.
Comprehensive solution
From prevention to response, ESET PROTECT allows multiple ESET solutions to be managed from one place. The combination of solutions covering different areas - from threat prevention to threat detection and response - allows you to create a multi-layered protection structure, across the entire enterprise.
Compliance with regulations and standards
ESET's solutions help you stay compliant with data protection regulations by encrypting all disk contents on Windows and macOS.
High performance
ESET solutions are characterised by high performance. Tests conducted by independent organisations confirm the low hardware resource requirements of our solutions.
Full visibility of IT infrastructure
The ESET PROTECT console provides detailed, real-time information on the security status of devices, including unpatched vulnerabilities and active threats.