XcellSecure | Falcon Discover: IT Hygiene

The complete visibility provided by Falcon Discover™, a security Hygiene solution that allows you to identify unauthorized systems and applications in real time across your environment, and remediate issues quickly to improve your overall security posture.

Enabling IT Hygiene

You need to be prepared to face any and all attacks — but you can’t fix what you can’t see. Organizations need the complete visibility provided by Falcon Discover™, a security hygiene solution that allows you to identify unauthorized systems and applications in real time across your environment, and remediate issues quickly to improve your overall security posture.

Falcon Discover is powered by the Falcon agent and the CrowdStrike® cloud to deliver visibility without affecting endpoint performance.

Falcon Discover – bringing answers to your IT Hygiene questions

APPLICATION VISIBILITY

See what apps are CURRENTLY running on which hosts – without impacting your endpoints. Determine when each application was originally launched, and pivot to other endpoints currently running the same app to gain more context. Find usage per application or by host.

CREDENTIAL USE

Gain visibility into the use of administrator credentials across your enterprise and spot if they are being used inappropriately or out of context.

IDENTIFY ROGUE SYSTEMS

Eliminate unprotected and unmanaged systems — a weak link that can create a bridge for adversaries to penetrate your network. Identify rogue systems to assess and remediate that vulnerability.

REDUCE LICENSING COSTS

Unprotected and unmanaged systems are a weak link that can create a bridge for adversaries to penetrate your network. Identifying rogue systems helps you assess and remediate that vulnerability.

Real Time Visibility and Inventory

See who is on your Network at all Times

The real-time system inventory gives you a view of all managed and unmanaged devices in the environment in a simple dashboard with drill-down options

Applications your users are Running

The real-time application inventory provides a view of all applications running in the environment via a simple dashboard with drill-down options.

Where and How user Accounts accessed

Account monitoring provides visibility into the use of administrator credentials and password resets across the enterprise

Key Product Capabilities