CrowdStrike Falcon Cloud Security Features
Management (6)
Dashboards and Reports
16 reviewers of CrowdStrike Falcon Cloud Security have provided feedback on this feature.
Access pre-built and custom reports and dashboards.
Workflow Management
13 reviewers of CrowdStrike Falcon Cloud Security have provided feedback on this feature.
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Administration Console
This feature was mentioned in 15 CrowdStrike Falcon Cloud Security reviews.
Provides Administration tools/console that are easy to use and learn for routine maintenance tasks
Extensibility
Allows for customized support for hybrid environments
Workflow Automation
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Unified Visibility
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Operations (2)
Governance
This feature was mentioned in 14 CrowdStrike Falcon Cloud Security reviews.
Allows users to create, edit, and relinquish user access privileges.
Logging and Reporting
14 reviewers of CrowdStrike Falcon Cloud Security have provided feedback on this feature.
Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.
Security Controls (4)
Anomaly Detection
As reported in 13 CrowdStrike Falcon Cloud Security reviews.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Data Loss Prevention
13 reviewers of CrowdStrike Falcon Cloud Security have provided feedback on this feature.
Stores data securely either on premise or in an adjacent cloud database to prevent loss of data at rest.
Security Auditing
Based on 14 CrowdStrike Falcon Cloud Security reviews.
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Cloud Gap Analytics
This feature was mentioned in 13 CrowdStrike Falcon Cloud Security reviews.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Administration (10)
Risk Scoring
Provides risk scoring for suspicious activity, vulnerabilities, and other threats.
Secrets Management
Provides tools for managing authentication credentials such as keys and passwords.
Security Auditing
Analyzes data associated with security configurations and infrastructure to provide vulnerability insights and best practices.
Configuration Management
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Policy Enforcement
Based on 21 CrowdStrike Falcon Cloud Security reviews.
Allows administrators to set policies for security and data governance.
Auditing
Based on 21 CrowdStrike Falcon Cloud Security reviews.
Analyzes data associated with web traffic and site performance to provide vulnerability insights and best practices.
Workflow Management
21 reviewers of CrowdStrike Falcon Cloud Security have provided feedback on this feature.
Creates new or streamlines existing workflows to better handle IT support tickets and service.
Security Automation
40 reviewers of CrowdStrike Falcon Cloud Security have provided feedback on this feature.
Streamline the flow of work processes by establishing triggers and alerts that notify and route information to the appropriate people when their action is required within the compensation process.
Security Integration
This feature was mentioned in 40 CrowdStrike Falcon Cloud Security reviews.
Integrates additional security tools to automate security and incident response processes.
Multicloud Visibility
Based on 37 CrowdStrike Falcon Cloud Security reviews.
Allows users to track and control activity across cloud services and providers.
Monitoring (3)
Continuous Image Assurance
Provides image verification features to establish container approval requirements and continuously monitor for policy violations to identify containers with known vulnerabilities, malware, and other threats.
Behavior Monitoring
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns and fraud indicators.
Observability
Generate insights across IT systems utilizing event metrics, logging, traces, and metadata.
Protection (4)
Dynamic Image Scanning
Scans application and image source code for security flaws without executing it in a live environment
Runtime Protection
Monitors container activities and detects threats across containers, networks, and cloud service providers.
Workload Protection
Protects compute resources across a networks and cloud service providers. Serves as Firewall and prompts additional authentication for suspicious users.
Network Segmentation
Allows administrative control over network components, mapping, and segmentation.
Security (6)
Compliance Monitoring
This feature was mentioned in 26 CrowdStrike Falcon Cloud Security reviews.
Monitors data quality and sends alerts based on violations or misuse.
Anomoly Detection
This feature was mentioned in 24 CrowdStrike Falcon Cloud Security reviews.
Constantly monitors acivity related to user behavior and compares activity to benchmarked patterns.
Cloud Gap Analytics
As reported in 23 CrowdStrike Falcon Cloud Security reviews.
Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Compliance Monitoring
This feature was mentioned in 40 CrowdStrike Falcon Cloud Security reviews.
Monitors data quality and send alerts based on violations or misuse.
Risk Analysis
This feature was mentioned in 40 CrowdStrike Falcon Cloud Security reviews.
Identifies potential network security risks, vulnerabilities, and compliance impacts.
Reporting
As reported in 40 CrowdStrike Falcon Cloud Security reviews.
Creates reports outlining log activity and relevant metrics.
Compliance (3)
Governance
This feature was mentioned in 23 CrowdStrike Falcon Cloud Security reviews.
Allows users to create, edit, and relinquish user access privileges.
Data Governance
23 reviewers of CrowdStrike Falcon Cloud Security have provided feedback on this feature.
Ensures user access management, data lineage, and data encryption.
Sensitive Data Compliance
This feature was mentioned in 22 CrowdStrike Falcon Cloud Security reviews.
Supports compliance with PII, GDPR, HIPPA, PCI, and other regulatory standards.
Performance (4)
Issue Tracking
Track issues as vulnerabilities are discovered. Documents activity throughout the resolution process.
Detection Rate
The rate at which scans accurately detect all vulnerabilities associated with the target.
False Positives
The rate at which scans falsely indicate detection of a vulnerability when no vulnerabilitiy legitimately exists.
Automated Scans
Runs pre-scripted vulnerability scans without requiring manual work.
Network (3)
Compliance Testing
Allows users to scan applications and networks for specific compliance requirements.
Perimeter Scanning
Analyzes network devices, servers and operating systems for vulnerabilities.
Configuration Monitoring
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Application (3)
Manual Application Testing
Allows users to perfrom hands-on live simulations and penetration tests.
Static Code Analysis
Scans application source code for security flaws without executing it.
Black Box Testing
Scans functional applications externally for vulnerabilities like SQL injection or XSS.
Detection & Response (4)
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Threat Hunting
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Rule-Based Detection
Allows administrators to set rules specified to detect issues related to issues such as sensitive data misuse, system misconfiguration, lateral movement, and/or non-compliance.
Real-Time Detection
Constantly monitors system to detect anomalies in real time.
Analytics (3)
Threat Intelligence
Stores information related to common threats and how to resolve them once incidents occur.
Artificial Intelligence & Machine Learning
Facilitates Artificial Intelligence (AI) such as Machine Learning (ML) to enable data ingestion, performance suggestions, and traffic analysis.
Data Collection
Collects information from multiple sources to cross reference and build contextual to correlate intelligence.
Configuration (2)
Configuration Monitoring
As reported in 24 CrowdStrike Falcon Cloud Security reviews.
Monitors configuration rule sets and policy enforcement measures and document changes to maintain compliance.
Unified Policy Management
As reported in 22 CrowdStrike Falcon Cloud Security reviews.
Allows users to track and control security policies across cloud services and providers.
Visibility (2)
Multicloud Visibility
Based on 22 CrowdStrike Falcon Cloud Security reviews.
Provides all-encompassing display and analysis of environments, resources, traffic, and activity across networks.
Asset Discovery
This feature was mentioned in 23 CrowdStrike Falcon Cloud Security reviews.
Detect new assets as they enter a cloud environments and networks to add to asset inventory.
Vulnerability Management (4)
Threat Hunting
Based on 23 CrowdStrike Falcon Cloud Security reviews.
Facilitates the proactive search for emerging threats as they target servers, endpoints, and networks.
Vulnerability Scanning
As reported in 24 CrowdStrike Falcon Cloud Security reviews.
Analyzes your existing cloud, network, and IT infrastructure to outline access points that can be easily compromised.
Vulnerability Intelligence
22 reviewers of CrowdStrike Falcon Cloud Security have provided feedback on this feature.
Stores information related to new and common vulnerabilities and how to resolve them once incidents occur.
Risk-Prioritization
As reported in 23 CrowdStrike Falcon Cloud Security reviews.
Allows for vulnerability ranking by customized risk and threat priorities.
Access control - Cloud Infrastructure Entitlement Management (CIEM) (3)
Policy Management
Helps define policies for access management
Fine-Grained Access Control
Uses principle of least privilege to ensure access control at granular level of specific resources and apps
Role-Based Access Control (RBAC)
Enables organization to define roles and assign access based on these roles
Monitoring - Cloud Infrastructure Entitlement Management (CIEM) (2)
Monitoring
Tracks and logs user activities, access requests, and changes to entitlements
AI-based detection
Detects and remediates risky, misconfigured permissions for human and machine identities using AI
Auditing - Cloud Infrastructure Entitlement Management (CIEM) (2)
Visibility
Provides visibility into all users and identities across the system
Compliance Reporting
Provides reporting capabilities to demonstrate compliance
Risk management - Application Security Posture Management (ASPM) (4)
Vulnerability Management
Identifies, tracks, and remediates vulnerabilities
Risk Assessment and Prioritization
Assesses and prioritizes risks based on application context
Compliance Management
Ensures compliance with industry standards and regulations
Policy Enforcement
Ensures mechanisms are in place for enforcing security policies across applications
Integration and efficiency - Application Security Posture Management (ASPM) (2)
Integration with Development Tools
Integrates with existing development and DevOps tools
Automation and Efficiency
Automates security tasks to improve efficiency
Reporting and Analytics - Application Security Posture Management (ASPM) (3)
Trend Analysis
Includes tools for analyzing trends in security incidents and vulnerabilities over time
Risk Scoring
Assigns scores to vulnerabilities based on their potential impact, helping prioritize remediation efforts
Customizable Dashboards
Provides customizable dashboards that present real-time data on vulnerabilities, risks, and compliance status
Security - Cloud-Native Application Protection Platform (CNAPP) (4)
Workload and container security
Scans containers, workloads, and kubernetes clusters for any misconfigurations or vulnerabilities.
Threat detection and response
Monitor live environments for anomalies, risks and threats to ensure rapid response.
DevSecOps Integrations
Integrates with CI/CD pipelines to detect security risks early in the development life cycle.
Unified Visibility
Consolidate all security data across the tech and cloud stacks into one dashboard.
Artificial Intelligence - Cloud-Native Application Protection Platform (CNAPP) (3)
Intelligent remediations and suggestions
Offers an AI-powered engine to provide remediation guidance to the user based on the type of threat.
Risk prioritization
Uses context-aware analysis to identify critical and non-critical risks across vulnerabilities.
Anomaly detection using machine learning
Help detect anomalies across cloud workloads which could help present a potential breach.
Cloud Configuration Management - Cloud-Native Application Protection Platform (CNAPP) (2)
Multi-cloud visibility
Offers a unified view of all cloud assets across multi-cloud platforms such as AWS, Azure, GCP etc.
Cloud Security Posture Management (CSPM)
Continuously scans cloud environments for any misconfigurations, and provide benchmarks and guided remediation.
Generative AI - Exposure Management Platforms (2)
Predictive Analytics
Uses AI-driven models to analyze historical and current data to enable organizations to manage new exposures proactively.
Automated Threat Detection
Uses AI algorithms to analyze data for patterns and anomalies that signify potential risks.
Risk Identification and Assessment - Exposure Management Platforms (2)
Comprehensive Risk Assessment
Identifies, evaluates, and monitors various types of risks to understand the overall risk exposure and prioritize them based on potential impact.
Advanced Analytics and Reporting
Includes tools for deep analysis of risk data, providing insights into trends and patterns that support strategic risk assessment and decision-making.
Monitoring and Integration - Exposure Management Platforms (2)
Integration and Data Consolidation
Ensures seamless interaction with other systems and unification of risk data, enabling a comprehensive view and efficient management of risk exposure.
Real-time Monitoring and Alerts
Allows for continuous surveillance of risk factors, providing timely alerts to mitigate emerging risks effectively.
Agentic AI - Vulnerability Scanner (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Agentic AI - Cloud Security Monitoring and Analytics (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Extended Detection and Response (XDR) Platforms (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Cloud-Native Application Protection Platform (CNAPP) (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Adaptive Learning
Improves performance based on feedback and experience
Agentic AI - Cloud Detection and Response (CDR) (3)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
Agentic AI - Application Security Posture Management (ASPM) (2)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Services - Extended Detection and Response (XDR) (1)
Managed Services
Offers managed detection and response services.
Services - Cloud Detection and Response (CDR) (1)
Managed Services
Offers managed detection and response services.
Discovery & Classification - Data Security Posture Management (DSPM) (3)
Continuous real‑time monitoring
Provide real‑time visibility into data exposures and activities.
Discover & classify sensitive data
Automatically scan across cloud, SaaS, on‑prem environments to locate and tag sensitive data.
Custom classification support
Allow business‑specific or regulatory data labels beyond default frameworks.
Risk Prioritization - Data Security Posture Management (DSPM) (3)
Detect excessive entitlements & toxic combinations
Identify over‑permissioned users, roles, or accounts in combination with misconfigurations.
Compliance posture assessment
Assess data risks against regulatory frameworks and internal policies.
Risk‑based exposure scoring
Prioritize findings based on data sensitivity, exploitability, and business impact.
Remediation & Governance - Data Security Posture Management (DSPM) (3)
Guided remediation actions
Provide context‑aware recommendations for fixing exposures (e.g., revoke access, encrypt, misconfiguration remediation).
Integration with enforcement tools
Integrate with CSPM, CIEM, SOAR, SIEM for automated policy enforcement.
Track remediation progress & trends
Monitor posture over time and track remediation efforts.
Functionality - AI Security Posture Management (AI-SPM) Tools (5)
Security Ecosystem Integration
Integrate with existing security infrastructure (SIEM, CASB, IAM, DSPM/CSPM/SSPM) to bring AI‑SPM into the wider security ecosystem.
AI Asset Discovery
Discover AI applications, agents, chatbots and integrations across SaaS, APIs and other environments.
Adaptive Policy Updates
Support continuous updates to policies and controls as AI‑tool usage evolves and new threats emerge.
Access and Permissions Monitoring
Monitor data flows, permissions and resource access associated with AI integrations and tools.
Policy Enforcement
Enforce AI‑specific security policies in real time, such as limiting agent permissions and blocking unauthorized AI activity.
Risk Assessment - AI Security Posture Management (AI-SPM) Tools (2)
AI Risk Assessment
Continuously assess AI integration risks including misconfigurations, policy violations and exposure to external AI services.
AI Asset Posture Scoring
Provide dashboards, risk scores and prioritisation for remediation across the AI‑asset estate.
Governance & Compliance - AI Security Posture Management (AI-SPM) Tools (2)
AI‑Generated Content Controls
Monitor AI‑generated content for sensitive/regulated information and apply remediation or blocking controls.
Audit Trails
Maintain audit logs, governance controls and reporting tied specifically to AI assets, agent behaviours and integrations.





