Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

CrowdStrike

From Wikipedia, the free encyclopedia
American cybersecurity technology company
This article is about the company. For the widespread IT system outage in July 2024, see2024 CrowdStrike-related IT outages.

CrowdStrike Holdings, Inc.
Company typePublic
IndustryInformation security
Founded2011; 14 years ago (2011)
Founders
Headquarters,
United States
Key people
  • George Kurtz (CEO)
  • Michael Sentonas (President)[1]
RevenueIncreaseUS$3.95 billion (FY25)
Negative increase US$−120.4 million (FY25)
Negative increase US$-19.27 million (FY25)
Total assetsIncrease US$8.7 billion (FY25)
Total equityIncrease US$3.28 billion (FY25)
Number of employees
10,118 (FY25)
Websitewww.crowdstrike.comEdit this at Wikidata
Footnotes / references
Financials as of fiscal year ended January 31, 2025[update].
References:[2]
Branch office in Sunnyvale, California which was formerly home to CrowdStrike headquarters

CrowdStrike Holdings, Inc. is an Americancybersecurity technology company based inAustin, Texas. It providesendpoint security,threat intelligence, andcyberattack response services.[3]

Crowdstrike has investigated several high-profile cyberattacks, including the 2014Sony Pictures hack, the 2015-16cyberattacks on the Democratic National Committee (DNC), and the 2016email leak involving the DNC.[4][5] On July 19, 2024, it issued a faulty update to its security software that causedglobal computer outages that disrupted air travel, banking, broadcasting, and other services.[6][7][8]

History

[edit]

CrowdStrike was co-founded in 2011 byGeorge Kurtz (CEO),Dmitri Alperovitch (former CTO), and Gregg Marston (CFO, retired).[9][10][11][12] The following year, the company hired Shawn Henry, a formerFederal Bureau of Investigation (FBI) official, to lead the subsidiary CrowdStrike Services, Inc., which offered security and response services.[13][14] The company launched CrowdStrike Falcon, anantivirus package, as its first product in June 2013.[15][16]

In May 2014, CrowdStrike's reports helped theUnited States Department of Justice to charge fiveChinese military hackers with economiccyber espionage against U.S. corporations.[17] CrowdStrike also uncovered the activities ofEnergetic Bear, a group connected toRussia'sFederal Security Service that conducted intelligence operations against global targets, primarily in theenergy sector.[18]

After theSony Pictures hack, CrowdStrike uncovered evidence implicating the government ofNorth Korea and demonstrated how the attack was carried out.[19] In 2014, CrowdStrike helped identify members of Putter Panda, the state-sponsored Chinese group of hackers also known asPLA Unit 61486.[20][21]

In May 2015, the company released information aboutVENOM, a critical flaw in an open-sourcehypervisor (hardware or software that runs virtual machines) calledQuick Emulator (QEMU) that allowed hackers to access sensitive personal information.[22][23] In October 2015, the company announced that it had identified Chinese hackers attacking technology and pharmaceutical companies around the time thatU.S. PresidentBarack Obama and China's leaderXi Jinping publicly agreed not to conducteconomic espionage against each other. The alleged hacking would have been in violation of that agreement.[24]

In July 2015,Google invested in the company'sSeries C funding round, which was followed by Series D and Series E, raising a total of $480 million as of May 2019.[25][26][27]

In 2017, Crowdstrike reached a valuation of more than $1 billion with an estimated annual revenue of $100 million.[28] In June 2018, the company said it was valued at more than $3 billion.[26] Investors includeTelstra, March Capital Partners,Rackspace,Accel Partners andWarburg Pincus.[29][30]

In June 2019, the company made aninitial public offering on theNasdaq.[31][32]

CrowdStrike expanded its identity security offerings with Falcon Identity Threat Protection, initially available in 2020, which later evolved into a managed service integrating with Falcon Complete in 2022, and a Cloud Threat Hunting Service in July 2022.[33][34]

In December 2021, the company moved its headquarters location fromSunnyvale, California, to Austin, Texas.[35]

In 2023, CrowdStrike introduced CrowdStream service in collaboration withCribl.io.[36] Charlotte AI, CrowdStrike's generative AI security analyst, was launched in May 2023 as part of Falcon's AI-driven security updates, enhancing automated threat triaging and response.[37]

In September 2023, CrowdStrike launched Falcon Foundry, a no-code application development platform directed at a wider audience,[38] and in September 2024, the company launched CrowdStrike Financial Services, which offers payment solutions and financing to improve access to the Falcon platform.[39]

CrowdStrike joined theS&P 500 index in June 2024.[40]

As of 2024, CrowdStrike spent more than $360,000 on federal lobbying in the first half of 2024, according to OpenSecrets, and $620,000 during 2023.[41] The company has also focused on working with the U.S. government and selling its services to government agencies.[42]

Acquisitions

[edit]

Crowdstrike has a history of acquisitions, including:

  • November 2017: Acquired Payload Security, a firm that developed automated malware analysis sandbox technology.[43]
  • September 2020: Acquiredzero trust andconditional access technology provider Preempt Security for $96 million.[44]
  • February 2021: Acquired Danishlog management platform Humio for $400 million with plans to integrate Humio's log aggregation into CrowdStrike'sXDR offering.[45]
  • November 2021: Acquired SecureCircle, a SaaS-based cybersecurity service that extends zero trust endpoint security to include data.[46]
  • October 2022: Acquired Reposify, an external attack surface management vendor for risk management.[47]
  • 2023: AcquiredIsraeli cybersecurity startup Bionic.ai.[48]
  • 2024: Acquired Israelicloud security startups Flow Security for $200 million[49] and Adaptive Shield for $300 million.[50]
  • August 2025: Acquired the Spanish company Onum a company focused on managing real timetelemetry pipelines.[51]

Earnings

[edit]
Recent Financial Information
YearRevenueNet Cash Flow (from operations)
FY 2020$481.4 MM$99.9 MM[52]
FY 2021$874.4 MM$356.6 MM[53]
FY 2022$1.45 B$574.8 MM[54]
FY 2023$2.24 B$941 MM[55]
FY 2024$3.06 B$1.17 B[56]
FY 2025$3.95 B$1.38 B[2]

In 2024, total revenue was $3.06 billion, a 36% increase.[41]

Russian hacking investigations

[edit]

CrowdStrike helped investigate theDemocratic National Committee cyberattacks and a connection to Russian intelligence services.[57] On 20 March 2017, then-FBI directorJames Comey testified before congress stating:[58]

"CrowdStrike,Mandiant, andThreatConnect review[ed] the evidence of the hack and conclude[d] with high certainty that it was the work ofAPT 28 andAPT 29 who are known to be Russian intelligence services."

Comey previously testified in January 2017 that a request forFBI forensics investigators to access the DNC servers was denied, saying Crowdstrike agreed to share information.[59]

In December 2016, CrowdStrike released a report stating that Russian government-affiliated groupFancy Bear had hacked a Ukrainian artillery app.[60] The report concluded that Russia had used the hack to cause large losses to Ukrainian artillery units. The app (called ArtOS) was installed on tablet PCs and used for fire-control.[61] CrowdStrike also found a hacked variation of POPR-D30 being distributed on Ukrainian military forums that utilized anX-Agent implant.[62]

The U.K.-based think tankInternational Institute for Strategic Studies said CrowdStrike’s report wrongly used its data and denied that hacking caused Ukraine’s artillery losses. The Ukrainian Ministry of Defense also rejected the CrowdStrike report, stating that actual artillery losses were much smaller than what was reported by CrowdStrike and were not associated with Russian hacking.[63] Prior to this, CrowdStrike had published a report claiming that malware used in Ukraine and against theDemocratic National Committee (DNC) appeared to be unique and identical, offering it as further evidence for a Russian origin of the DNC attack.[64]

Cybersecurity firm SecureWorks discovered a list of email addresses targeted by Fancy Bear in phishing attacks. The list included the email address of Yaroslav Sherstyuk, the developer of ArtOS.[65] AdditionalAssociated Press research supports CrowdStrike's conclusions about Fancy Bear.[66]Radio Free Europe notes that the AP report "lends some credence to the original CrowdStrike report, showing that the app had, in fact, been targeted."[67]

2024 IT Outages

[edit]
Main article:2024 CrowdStrike-related IT outages
Multipleblue screens of death (BSOD), caused by an update pushed by CrowdStrike, on airport luggage conveyor belts atLaGuardia Airport,New York City

On 19 July 2024, CrowdStrike released a software configuration file update to the Falconendpoint detection and response agent. Flaws in the update causedblue screens of death onMicrosoft Windows machines, disrupting millions of Windows computers worldwide.[68][69] Affected machines were forced into abootloop, making them unusable. This was caused by an update to a configuration file, Channel File 291, which CrowdStrike says triggered alogic error and caused the operating system to crash.[70] The downtime caused a widespread global impact, grounding commercial airline flights, temporarily takingSky News and other broadcasters offline, and disrupting banking and healthcare services as well as911 emergency call centers.[8][71]

By the end of the day, CrowdStrike shares closed trading at a price of $304.96, down $38.09 or 11.10%.[72]

Although CrowdStrike issued a patch to fix the error, computers stuck in a bootloop were unable to connect to the Internet to download the patch before Falcon would be loaded and crash the device again. The recommended solution from CrowdStrike was to boot intosafe mode or Windows Recovery Mode and manually delete Channel File 291.[73] This requires local administrator access and if the device was encrypted byBitLocker, also required a recovery key.[74] Microsoft reported that some customers were able to remediate the issue solely by rebooting impacted devices up to 15 times.[75]

On 22 July 2024, CrowdStrike shares closed the trading day at a price of $263.91, with a loss of $41.05 or 13.46%.[76] On 24 July 2024, five days after the incident, CrowdStrike published a Post-Incident Review.[77] That same day, CrowdStrike reportedly contacted affected channel partners with apology emails containingUber Eats gift cards worth $10.[78][79][80] On 6 August 2024, Crowdstrike published a Root Cause Analysis to explain the causes of the Channel File 291 Incident, and the mitigation steps the company took to eliminate future incidents.[81] CrowdStrike made several process improvements in response to the 19 July incident. These include: adding new content configuration test procedures; implementing additional deployment layers and acceptance checks for its content configuration system; engaging two third-party vendors to review Falcon sensor code, and the company's quality control and release processes; and staggering update rollouts so that users can select their preferred timing for updates.[82][41] The CrowdStrike incident cost Fortune 500 companies $5.4 billion.[41]

See also

[edit]

References

[edit]
  1. ^Richardson, Tom (31 March 2024)."CrowdStrike's Australian boss snares $225m cybersecurity fortune".Australian Financial Review.Archived from the original on 20 July 2024. Retrieved21 July 2024.
  2. ^ab"US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2025".U.S. Securities and Exchange Commission. 10 March 2025. Retrieved19 March 2025.
  3. ^"CrowdStrike's security software targets bad guys, not their malware".TechRepublic. 9 October 2015.Archived from the original on 2 June 2016. Retrieved10 June 2016.
  4. ^Bradley, Tony (2015)."CrowdStrike demonstrates how attackers wiped the data from the machines at Sony".CSO Online.International Data Group.Archived from the original on 20 August 2016. Retrieved9 June 2016.
  5. ^Hamburger, Tom; Nakashima, Ellen (24 July 2016)."Clinton campaign – and some cyber experts – say Russia is behind email release".The Washington Post.
  6. ^Banfield-Nwachi, Mabel (19 July 2024)."Windows global IT outage: what we know so far".The Guardian. London, United Kingdom.ISSN 0261-3077.Archived from the original on 22 July 2024. Retrieved19 July 2024.
  7. ^Plummer, Robert (19 July 2024)."Crowdstrike and Microsoft: What we know about global IT outage".BBC News.Archived from the original on 22 July 2024. Retrieved19 July 2024.
  8. ^abGodfrey, Paul; Druker, Simon; Wynder, Ehren (19 July 2024)."911 call centers back online after IT outage causes global chaos".United Press International. Retrieved19 July 2024.
  9. ^"In conversation with George Kurtz, CEO of CrowdStrike".Fortune.Archived from the original on 1 July 2019. Retrieved1 July 2019.
  10. ^"Bloomberg – Dmitri Alperovitch".www.bloomberg.com.Archived from the original on 14 July 2020. Retrieved14 February 2020.
  11. ^"Standing up at the gates of hell: CrowdStrike CEO George Kurtz".Fortune. 29 July 2015.Archived from the original on 29 May 2016. Retrieved10 June 2016.
  12. ^Albert-Deitch, Cameron (15 May 2019)."CrowdStrike, the $3.4 Billion Startup That Fought Russian Spies in 2016, Just Filed for an IPO".Inc.com.Archived from the original on 3 June 2019. Retrieved1 July 2019.
  13. ^Ragan, Steve (23 April 2012)."Former FBI Exec to Head CrowdStrike Services".SecurityWeek.Archived from the original on 20 January 2021. Retrieved13 December 2020.
  14. ^Messmer, Ellen (18 April 2012)."Top FBI cyber cop joins startup CrowdStrike to fight enterprise intrusions".Network World.Archived from the original on 8 March 2024. Retrieved10 June 2016.
  15. ^Messmer, Ellen (18 June 2013)."Start-up tackles advanced persistent threats on Microsoft, Apple computers".Network World.Archived from the original on 17 May 2019. Retrieved1 July 2019.
  16. ^"U.S. firm CrowdStrike claims success in deterring Chinese hackers".Reuters. 13 April 2015.Archived from the original on 12 November 2017. Retrieved14 June 2016.
  17. ^Gorman, Devlin Barrett and Siobhan (20 May 2014)."U.S. Charges Five in Chinese Army With Hacking".Wall Street Journal.ISSN 0099-9660.Archived from the original on 15 February 2020. Retrieved14 February 2020.
  18. ^"The old foe, new attack and unsolved mystery in the recent U.S. energy sector hacking campaign".CyberScoop. 12 July 2017.Archived from the original on 24 September 2019. Retrieved14 February 2020.
  19. ^"What's in a typo? More evidence tying North Korea to the Sony hack".PCWorld.Archived from the original on 19 August 2016. Retrieved14 June 2016.
  20. ^Perlroth, Nicole (9 June 2014)."2nd China Army Unit Implicated in Online Spying".The New York Times.ISSN 0362-4331.Archived from the original on 12 November 2017. Retrieved14 June 2016.
  21. ^"Second China unit accused of cyber crime".Financial Times. 10 June 2014. Retrieved10 June 2014.
  22. ^"'Venom' vulnerability: Serious computer bug shatters cloud security".Fortune. 13 May 2015.Archived from the original on 25 April 2016. Retrieved14 June 2016.
  23. ^Goodin, Dan (13 May 2015)."Extremely serious virtual machine bug threatens cloud providers everywhere".Ars Technica.Archived from the original on 22 June 2019. Retrieved1 July 2019.
  24. ^Yadron, Danny (19 October 2015)."Report Warns of Chinese Hacking".Wall Street Journal.Archived from the original on 17 May 2019. Retrieved1 July 2019.
  25. ^Kuranda, Sarah (17 May 2017)."Crowdstrike Lands $100M Funding Round, Looks To Expand Globally And Invest In Partners".CRN.Archived from the original on 3 June 2019. Retrieved1 July 2019.
  26. ^ab"Cybersecurity startup CrowdStrike raises $200 million at $3 billion valuation".VentureBeat. 19 June 2018.Archived from the original on 3 June 2019. Retrieved1 July 2019.
  27. ^"CrowdStrike may top these 6 biggest-ever U.S. security IPOs next month".www.bizjournals.com.Archived from the original on 28 April 2020. Retrieved24 February 2020.
  28. ^Hackett, Robert (17 May 2017)."Hack Investigator CrowdStrike Reaches $1 Billion Valuation".FORTUNE.Archived from the original on 1 July 2019. Retrieved9 June 2017.
  29. ^"Security Company CrowdStrike Scores $100M Led By Google Capital".TechCrunch. 13 July 2015.Archived from the original on 4 April 2019. Retrieved1 July 2019.
  30. ^"CrowdStrike raises $100 million for cybersecurity".www.bizjournals.com.Archived from the original on 28 April 2020. Retrieved24 February 2020.
  31. ^Murphy, Hannah (13 June 2019)."Cyber security group CrowdStrike's shares jump more than 70% after IPO".Financial Times.ISSN 0307-1766.Archived from the original on 30 July 2024. Retrieved13 June 2019.
  32. ^Feiner, Lauren (12 June 2019)."CrowdStrike pops more than 70% in debut, now worth over $11 billion".CNBC.Archived from the original on 12 June 2019. Retrieved12 June 2019.
  33. ^"CrowdStrike launches Falcon Identity Threat Protection Complete,"Techzine, March 2, 2022, retrieved March 3, 2025.
  34. ^"CrowdStrike introduces a new cloud threat hunting service,"VentureBeat, July 26, 2022, retrieved March 3, 2025.
  35. ^"CrowdStrike Changes Principal Office to Austin, Texas".CrowdStrike. 28 December 2021.Archived from the original on 28 January 2022. Retrieved2 February 2022.
  36. ^Alspach, Kyle."RSAC 2023 Sees Big Moves From SentinelOne, CrowdStrike, Google Cloud, Accenture | CRN".www.crn.com.Archived from the original on 22 July 2024. Retrieved29 February 2024.
  37. ^"CrowdStrike adds generative AI assistant to security tools,"Axios, May 30, 2023, retrieved March 6, 2025.
  38. ^"CrowdStrike announces major build-out of its Falcon product suite,"CSO, September 19, 2023, retrieved March 3, 2025.
  39. ^"CrowdStrike Unveils Financial Services, AI Tools at Fal.Con 2024,"Channel Insider, September 23, 2024, retrieved March 6, 2025.
  40. ^Carson, Ed (9 June 2024)."CrowdStrike, KKR, GoDaddy To Join S&P 500 In Quarterly Rebalance; Stocks Jump".Investor's Business Daily.Archived from the original on 9 June 2024.
  41. ^abcdCharlotte Ehrlich (9 October 2024)."Facing scrutiny over global outage, cybersecurity firm CrowdStrike on track for record year of federal lobbying spending".
  42. ^"CrowdStrike CEO George Kurtz on China, Microsoft and the SEC".CNBC. 14 December 2023.Archived from the original on 22 July 2024. Retrieved19 July 2024.
  43. ^Kovacs, Eduard (21 August 2018)."CrowdStrike Adds Malware Search Engine to 'Hybrid Analysis'".Security Week.
  44. ^Gagliordi, Natalie."CrowdStrike to acquire Preempt Security for $96 million".ZDNet.Archived from the original on 26 September 2020. Retrieved28 September 2020.
  45. ^Cimpanu, Catalin (18 February 2021)."CrowdStrike acquires Humio for $400 million".ZDNet.Archived from the original on 11 July 2024. Retrieved10 July 2024.
  46. ^Novinson, Michael (1 November 2021)."CrowdStrike To Buy Data Protection Startup SecureCircle".CRN.Archived from the original on 22 July 2024. Retrieved10 June 2024.
  47. ^Dor, Ofir (20 September 2022)."CrowdStrike buying Israeli cybersecurity co Reposify".Globes.
  48. ^"CrowdStrike acquiring cyber startup Bionic for $350 million".CTech. 19 September 2023.
  49. ^"CrowdStrike acquiring cyber startup Flow Security in $200 million deal".CTech. 6 March 2024.Archived from the original on 20 July 2024. Retrieved19 July 2024.
  50. ^Kovacs, Eduard (6 November 2024)."CrowdStrike to Acquire Adaptive Shield in Reported $300 Million Deal".SecurityWeek. Retrieved6 November 2024.
  51. ^"CrowdStrike Agrees to Acquire Onum to Supercharge Falcon NG SIEM".CrowdStrike.com. Retrieved30 August 2025.
  52. ^"US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2020".U.S. Securities and Exchange Commission. 23 March 2020. Retrieved19 March 2025.
  53. ^"US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2021".U.S. Securities and Exchange Commission. 18 March 2025. Retrieved19 March 2025.
  54. ^"US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2022".U.S. Securities and Exchange Commission. 16 March 2025. Retrieved19 March 2025.
  55. ^"US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2023".U.S. Securities and Exchange Commission. 8 March 2025. Retrieved19 March 2025.
  56. ^"US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2024".U.S. Securities and Exchange Commission. 7 March 2024.
  57. ^Энжел-Ау Юнг (Angel-Au Jung) (20 March 2020)."Охотник на хакеров и враг Трампа: как миллионер из США ловит киберпреступников из России, Китая и Ирана" [Hacker hunter and Trump's enemy: how a millionaire from the United States catches cybercriminals from Russia, China and Iran].Forbes (forbes.ru) (in Russian). Archived fromthe original on 28 September 2020. Retrieved20 September 2024.
  58. ^"Full transcript: FBI Director James Comey testifies on Russian interference in 2016 election".Archived from the original on 23 May 2017. Retrieved22 May 2017.
  59. ^"FBI Director Comey: Agency requested access to DNC server".CBS News. 10 January 2017.Archived from the original on 21 September 2019. Retrieved19 July 2024.
  60. ^"Russian hackers linked to DNC attack also targeted Ukrainian military, says report".theverge.com. 23 December 2016.Archived from the original on 17 November 2019. Retrieved26 June 2019.
  61. ^Noosphere engineering school (31 October 2015)."New brainchild of engineering school was tested by the armed forces".noosphereengineering.com.Archived from the original on 29 December 2017. Retrieved28 December 2017.
  62. ^Boldi (3 January 2017)."Technical details on the Fancy Bear Android malware (poprd30.apk)".Laboratory of Cryptography and System Security, Budapest University of Technology and Economics.Archived from the original on 9 February 2018. Retrieved8 February 2018.
  63. ^Kuzmenko, Oleksiy (23 March 2017)."Think Tank: Cyber Firm at Center of Russian Hacking Charges Misread Data".Voice of America.Archived from the original on 20 January 2018. Retrieved20 December 2017.
  64. ^"Group allegedly behind DNC hack targeted Ukraine, report finds".The Guardian. 22 December 2016.Archived from the original on 16 May 2017. Retrieved19 July 2024.
  65. ^Miller, Christopher (2 November 2017)."Fancy Bear Tried To Hack E-Mail Of Ukrainian Making Artillery-Guidance App".RadioFreeEurope.Archived from the original on 6 February 2018. Retrieved8 February 2018.
  66. ^Satter, Raphael (2 November 2017)."Russia hackers pursued Putin foes, not just US Democrats".Associated Press.Archived from the original on 2 April 2019. Retrieved2 April 2019.
  67. ^Miller, Christopher (2 November 2017)."'Fancy Bear' Tried To Hack E-Mail Of Ukrainian Making Artillery-Guidance App".Radio Free Europe/Radio Liberty.Archived from the original on 2 April 2019. Retrieved2 April 2019.
  68. ^Baran, Guru (19 July 2024)."CrowdStrike Update Pushing Windows Machines Into a BSOD Loop".Cyber Security News.Archived from the original on 19 July 2024. Retrieved19 July 2024.
  69. ^Sharwood, Simon."CrowdStrike code update bricking Windows machines around the world".The Register.Archived from the original on 19 July 2024. Retrieved19 July 2024.
  70. ^CrowdStrike (20 July 2024)."Technical Details: Falcon Update for Windows Hosts | CrowdStrike".crowdstrike.com. Retrieved20 July 2024.
  71. ^Warren, Tom (19 July 2024)."Major Windows BSOD issue takes banks, airlines, and broadcasters offline".The Verge.Archived from the original on 19 July 2024. Retrieved19 July 2024.
  72. ^"CrowdStrike Holdings Inc CRWD:NASDAQ".cnbc.com. 29 January 2012.Archived from the original on 16 June 2024. Retrieved19 July 2024.
  73. ^"KB5042421: CrowdStrike issue impacting Windows endpoints causing an 0x50 or 0x7E error message on a blue screen - Microsoft Support".support.microsoft.com. Retrieved20 July 2024.
  74. ^Warren, Tom (19 July 2024)."Here's how IT admins are fixing the Windows Blue Screen of Death chaos".The Verge.Archived from the original on 20 July 2024. Retrieved20 July 2024.
  75. ^Warren, Tom (19 July 2024)."Microsoft on CrowdStrike outage: have you tried turning it off and on? (15 times)".The Verge.Archived from the original on 20 July 2024. Retrieved20 July 2024.
  76. ^"CrowdStrike Holdings, Inc. Class A Common Stock (CRWD)".nasdaq.com. Retrieved22 July 2024.
  77. ^"Preliminary Post Incident Review (PIR): Content Configuration Update Impacting the Falcon Sensor and the Windows Operating System (BSOD)".CrowdStrike. 24 July 2024. Retrieved26 February 2025.
  78. ^Franceschi-Bicchierai, Lorenzo (24 July 2024)."CrowdStrike offers a $10 apology gift card to say sorry for outage".TechCrunch. Retrieved24 July 2024.
  79. ^Sato, Mia (19 July 2024)."CrowdStrike and Microsoft: all the latest news on the global IT outage".The Verge. Retrieved14 August 2024.
  80. ^Milmo, Dan (25 July 2024)."CrowdStrike faces backlash as 'thank you' gift cards are blocked".The Guardian.ISSN 0261-3077. Retrieved14 August 2024.
  81. ^"External Technical Root Cause Analysis — Channel File 29"(PDF).CrowdStrike. 6 August 2024. Retrieved22 February 2025.
  82. ^Vijayan, Jai (7 August 2024)."CrowdStrike Will Give Customers Control Over Falcon Sensor Updates".Dark Reading. Retrieved22 February 2025.

External links

[edit]
Companies of theNasdaq-100 index
Retrieved from "https://en.wikipedia.org/w/index.php?title=CrowdStrike&oldid=1318788524"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp