Archivio whitepaper

Argomenti più recenti:

Generative AI accelerates protection and investigation

Over the last year, breakthroughs in generative AI have captivated consumer and enterprise interest — and organizations are scrambling to keep up with technology while navigating its growing attack surface. Join CrowdStrike’s C...

Guarda il webinar on-demand

Telstra: Working with Crowdstrike to Secure a Nation

Telstra is Australia’s leading telecommunications and technology company, offering a full range of communications services. Telstra is one of the best-known brands in the country, and its customers range from individual consume...

Visualizza caso studio

Australian Utility Provider Partners With CrowdStrike to Transform Cybersecurity Defense and Critical Infrastructure Protection

Australian energy utility Jemena owns and operates a diverse portfolio of energy-related assets, supplying millions of households and businesses with essential gas and electricity services. The company is also spearheading a nu...

Visualizza caso studio

The Impact of Securing Your Cloud Environment with Falcon Cloud Security

Today’s modern cloud-powered organizations have their hands full trying to maintain a productive application-powered business. Vendor and tool consolidation have become critical for successful businesses to manage cost and incr...

Visualizza E-book

5 Key Capabilities to Secure Against Endpoint Risk

Pre-2020, IT and security teams had a hard enough time managing and securing endpoints. Many organizations were “getting by” with endpoint solutions that acted as basic device management tools. Now, even in the face of managing...

Visualizza E-book

What Legacy Endpoint Security Really Costs

To be competitive, businesses are moving forward with digital transformation projects enabled by cloud services. The number of endpoints operating in these dynamically expanding environments is exploding. According to one esti...

Visualizza whitepaper

2024 State of Application Security Report

Application security is the practice of protecting and securing applications throughout the software development life cycle. As organizations shift their focus to driving revenue through software, application security (AppSec) ...

Visualizza report

Innovative HR Solutions Provider BIPO Strengthens Security Posture and Bolsters Portfolio of World-class Partners

BIPO is a leading HR services provider with an extensive network of offices located in key gateway cities across the Asia-Pacific region. The company offers a wide range of advanced HR-related technologies, services and outsour...

Visualizza caso studio

Globe Telecom Reduces Risk and Gains Immediate Visibility with New Threatbased Operational Security Approach

As the leading telecommunications provider in the Philippines, Globe Telecom serves about over 80 million customers — roughly three-quarters of the country’s population. The company’s leadership sought to transform its cybersec...

Visualizza caso studio

South Australian Utility Expands CrowdStrike Protections to Bolster Defence and Address Cybersecurity Skills Shortage

SA Power Networks is South Australia’s sole electricity distributor. The electricity provider was an early adopter of the CrowdStrike Falcon® platform for endpoint detection and response (EDR), replacing a legacy Trend Micro an...

Visualizza caso studio
Registrati alla newsletter
Le principali notizie, gratuitamente via mail