• Facebook
  • Twitter
  • Google
  • RSS
Green Sentries
  • Services
    • Threat management
      • 24/7 Security Monitoring and Threat detection
      • 24/7 Incident response
      • Managed On-premise SIEM
      • Log management and Retention
      • Global Threat Intelligence Feeds
      • Host Intrusion Detection System
      • Network Intrusion Detection System
      • User Behavior Analytics
      • Forensic Analysis Platform and Services
    • Vulnerability Management
      • Vulnerability Assessment
      • Penetration Testing
      • Web Application Testing
      • Mobile Application testing
      • IOT and ICS Penetration Testing
      • Secure Code Review
      • Security Architecture review
      • Current State assessments
    • Compliance Management
      • PCI DSS, ISO 27001, NESA, DISR Compliance Monitoring Dashboards
      • Risk Assessments
      • Compliance Consulting &Managed Compliance services
    • Managed Security Devices
      • Managed UTM, Firewall, IPS/IDS and WAF
      • Managed Security Applications
      • Managed SIEM
  • Products
    • Splunk Security Products
      • Splunk Enterprise Security
  • Partners
    • Partnership Overview
    • Become a Partner
  • Company
    • Our Story
    • News and Events
    • Careers
    • Contact us
  • Blog
Select Page

CrowdStrike Falcon Search Engine

by Habshan AK | Nov 25, 2017 | Malware

CrowdStrike Falcon Search Engine is a malware search engine developed by CrowdStrike, based on their arguably largest threat database which receives 51 billion security events every day from its install base and with 700 million files indexed, to make a total of 560...

Recent Posts

  • CrowdStrike Falcon Search Engine
  • Social Engineering Penetration Testing – Part II (Attack Vectors)
  • Mobile Application Penetration Testing
  • Social Engineering Penetration Testing – Part I (Attack Cycle)
  • DNA HACK

Recent Comments

  • Gurram Ramesh on Need for effective SOC/Security monitoring from PCI DSS perspective – Part 2
  • Rijo Robert on Ransomware: How To Protect Yourself

Archives

  • November 2017
  • September 2017
  • August 2017
  • July 2017

Categories

  • Android
  • Automation
  • Conference
  • CouchPotato
  • CTI
  • Cyber Attacks
  • Cyber Security
  • ffmpeg
  • Forensics
  • Hacking Tool
  • IOT
  • IOT Security
  • Malware
  • Petya / NotPetya
  • Point-of-Sale (POS) Systems
  • Protocol
  • Ransomware
  • RSTP
  • Security Analytics
  • SIEM
  • Smart Phone
  • SOC
  • Social Engineering
  • Splunk
  • Vulnerability Assessment and Penetration Testing
  • Wannacry

Services

  • Compliance Management
  • Managed Security Devices
  • Threat management
  • Vulnerability Management

Products

  • Splunk Security Products
  • GreenSentry Security Appliance

Partners

  • Become a Partner
  • Partnership Overview

Company

  • Our Story
  • News and Events
  • Careers
  • Contact us

Support

  • Whitepapers
  • Blog
  • Downloads
  • Contact Support
  • Facebook
  • Twitter
  • Google
  • RSS
Copyright 2017 GreenSentries | All Right Reserved.