CrowdStrike Falcon Device Control
We Stop Breaches.
Overview
CrowdStrike Falcon Device Control is a module within the broader CrowdStrike Falcon platform, a cloud-native endpoint protection solution. It enables organizations to monitor and control the use of USB devices on their endpoints. This is a critical aspect of device trust, as it prevents unauthorized data transfer and the introduction of malware from external devices. Falcon Device Control allows for granular policy enforcement, enabling administrators to block or allow specific devices or classes of devices.
✨ Key Features
- USB device visibility and control
- Granular policy enforcement (allow/block specific devices)
- File and folder-level control
- Integration with the Falcon endpoint protection platform
- Centralized management and reporting
🎯 Key Differentiators
- Cloud-native platform with a single lightweight agent
- AI-powered threat detection
- Integrated threat intelligence
Unique Value: Provides comprehensive endpoint protection, including device control, through a single, cloud-native platform.
🎯 Use Cases (4)
✅ Best For
- Securing endpoints in highly regulated industries
- Protecting against malware introduced via USB drives
💡 Check With Vendor
Verify these considerations match your specific requirements:
- Organizations seeking a standalone device control solution without broader endpoint protection
🏆 Alternatives
Offers superior threat detection and response capabilities due to its AI-powered approach and integrated threat intelligence.
💻 Platforms
✅ Offline Mode Available
🔌 Integrations
🛟 Support Options
- ✓ Email Support
- ✓ Live Chat
- ✓ Phone Support
- ✓ Dedicated Support (Falcon Complete (MDR service) tier)
🔒 Compliance & Security
💰 Pricing
✓ 15-day free trial
Free tier: N/A
🔄 Similar Tools in Device Trust
Okta Adaptive MFA
Verifies user identity and device posture before granting access to applications....
Zscaler Private Access (ZPA)
Provides secure access to private applications without placing users on the network....
Microsoft Entra ID Conditional Access
Enforces granular access policies based on user, device, location, and risk signals....
Palo Alto Networks Prisma Access
A Secure Access Service Edge (SASE) platform that provides comprehensive security for remote users a...
Cisco Duo
Provides multi-factor authentication and device trust to secure access to applications....
Google BeyondCorp Enterprise
Google's implementation of the Zero Trust model, providing secure access to applications based on us...