Falcon Security and IT operations Features
Orchestration (4)
Asset Management
Lets users group and organize their endpoints to gather threat intelligence on specific technologies. This feature was mentioned in 14 Falcon Security and IT operations reviews.
Security Workflow Automation
Reduces the need for IT and security professionals to iterate repetitive tasks associated with gathering threat information. 13 reviewers of Falcon Security and IT operations have provided feedback on this feature.
Deployment
The process in which users integrate their existing security systems and endpoints to the threat intelligence platform. This feature was mentioned in 14 Falcon Security and IT operations reviews.
Sandboxing
A feature that allows security testing and information gathering to occur in a secure, resource independent environment. 14 reviewers of Falcon Security and IT operations have provided feedback on this feature.
Information (3)
Proactive Alerts
Prior to security incidents, the product will alert users when a new, relevant vulnerability or threat is discovered. This feature was mentioned in 14 Falcon Security and IT operations reviews.
Malware Detection
Based on 14 Falcon Security and IT operations reviews. Provides multiple techniques and information sources to alert users of malware occurrences.
Intelligence Reports
The ability for users to produce reports outlining detailed and personalized threat information 13 reviewers of Falcon Security and IT operations have provided feedback on this feature.
Personalization (3)
Endpoint Intelligence
Analysis for users to examine threat intelligence data specific to their endpoint devices. This feature was mentioned in 14 Falcon Security and IT operations reviews.
Security Validation
The product has a recurring examination process to update your intelligence reports as new threats emerge. This feature was mentioned in 13 Falcon Security and IT operations reviews.
Dynamic/Code Analysis
As reported in 13 Falcon Security and IT operations reviews. The ability to examine your application, website, or database's code to uncover zero-day vulnerabilities.
Analysis (5)
File Analysis
Identifies potentially malicious files and applications for threats files and applications for abnormalities and threats.
Memory Analysis
Analyzes infortmation from a computer or other endpoint's memory dump for information removed from hard drive.
Registry Analysis
Identifies recently accessed files and applications for abnormalities and threats.
Email Analysis
Parses and/or extracts emails and associated content for malware, phishing, other data that can be used in investigations.
Linux Analysis
Allows for parsing and/or extraction of artifacts native to Linux OS including but not limited to system logs, SSH activity, and user accounts.
Functionality (4)
Incident Alerts
Gives alerts when incidents arise. Some responses may be automated, but users will still be informed.
Anomaly Detection
Constantly monitors activity related to user behavior and compares activity to benchmarked patterns.
Continuous Analysis
Constantly monitors traffic and activity. Detects anomalies in functionality, user accessibility, traffic flows, and tampering.
Decryption
Facilitates the decryption of files and data stored using cryptographic algorithms.
Remediation (3)
Incident Reports
Produces reports detailing trends and vulnerabilities related to their network and infrastructure.
Remediation Suggestions
Provides relevant and helpful suggestions for vulnerability remediation upon detection.
Response Automation
Reduces time spent remedying issues manually. Resolves common network security incidents quickly.
Monitoring (4)
Gap Analysis
As reported in 11 Falcon Security and IT operations reviews. Analyzes data associated with denied entries and policy enforcement, giving information of better authentication and security protocols.
Vulnerability Intelligence
Stores information related to common vulnerabilities and how to resolve them once incidents occur. 12 reviewers of Falcon Security and IT operations have provided feedback on this feature.
Compliance Monitoring
Monitors data quality and sends alerts based on violations or misuse. 12 reviewers of Falcon Security and IT operations have provided feedback on this feature.
Continuous Monitoring
As reported in 12 Falcon Security and IT operations reviews. Aggregates real-time updates and historical data from multiplate internal and external data sources to support ongoing proactive threat response.
Asset Management (3)
Asset Discovery
Detects new assets as they enter cloud environments and networks to add to asset inventory. This feature was mentioned in 11 Falcon Security and IT operations reviews.
Shadow IT Detection
Based on 11 Falcon Security and IT operations reviews. Identifies unsanctioned software.
Change Management
Provides tools to track and implement required security policy changes. 11 reviewers of Falcon Security and IT operations have provided feedback on this feature.
Risk Management (4)
Risk-Prioritization
Allows for vulnerability ranking by customized risk and threat priorities. 12 reviewers of Falcon Security and IT operations have provided feedback on this feature.
Reconnaissance
As reported in 12 Falcon Security and IT operations reviews. Gathers information about the system and potential exploits to be tested.
At-Risk Analysis
Based on 12 Falcon Security and IT operations reviews. Uses machine learning to identify at-risk data.
Threat Intelligence
Based on 12 Falcon Security and IT operations reviews. Stores information related to common threats and how to resolve them once incidents occur.
Generative AI (7)
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Generation
Allows users to generate text based on a text prompt.
AI Text Summarization
Condenses long documents or text into a brief summary.
AI Text Summarization
As reported in 11 Falcon Security and IT operations reviews. Condenses long documents or text into a brief summary.
Generate Attack Scenarios
Use AI to propose possible threat actor tactics, techniques, and procedures against specific environments or assets.
Generate Threat Detection Rules
Use AI to automatically create detection rules based on observed patterns.
Generate Threat Summaries
Use AI to produce concise summaries of complex threat reports or alerts.
Agentic AI - Threat Intelligence (4)
Autonomous Task Execution
Capability to perform complex tasks without constant human input
Multi-step Planning
Ability to break down and plan multi-step processes
Proactive Assistance
Anticipates needs and offers suggestions without prompting
Decision Making
Makes informed choices based on available data and objectives
You’re seeing this ad based on the product’s relevance to this page. Sponsored content does not receive preferential treatment in any of G2’s ratings.


