The security landscape is rapidly evolving, with new threats emerging every day. To stay ahead of these threats, CrowdStrike has introduced a range of innovative data protection capabilities designed to safeguard cloud infrastructures, AI models, endpoints, and SaaS applications. **Real-Time Data Protection in the Cloud**
One of the key highlights of CrowdStrike’s new offerings is the ability to inspect AI models for malware, backdoors, and other alterations before they are deployed in production environments. This feature provides security teams with real-time visibility into all AI workloads within the cloud, enabling proactive risk management. * The Falcon Cloud Security feature allows for the inspection of AI models for potential security threats. * This enables security teams to identify and address potential issues before they become major problems. * The feature provides real-time visibility into AI workloads, enabling proactive risk management. **Runtime Data Protection for Cloud and Endpoint Environments**
Falcon Data Protection for Cloud and Endpoint offers runtime data protection for both cloud and endpoint environments. This feature enables organisations to prevent the exfiltration of encrypted files and mitigates risks related to generative AI-led data leaks. *
| Feature | Description |
|---|---|
| Runtime Data Protection | Protects data in motion and at rest, preventing exfiltration of encrypted files. |
| Mitigates Risks | Mitigates risks related to generative AI-led data leaks. |
**SaaS Threat Services**
CrowdStrike has also introduced SaaS Threat Services, which include expert-led assessments and proactive threat detection and response. These services aim to help organisations identify and mitigate risks stemming from SaaS application misuse or misconfiguration. *
- Expert-led assessments
- Proactive threat detection and response
- Helps identify and mitigate risks
**Addressing Insider Threats and External Attacks**
CrowdStrike’s Falcon Data Protection platform is designed to address insider threats and external attacks. The platform includes features such as Just-in-Time Privileged Access and Identity-Based Threat Detection, which provide dynamic and situational access controls. *
Identity-Based Threat Detection
* Provides dynamic and situational access controls. * Integrates with broader threat intelligence to address insider threats and external actors that exploit identity weaknesses. **Generative AI Data Leak Prevention**
The platform also includes Generative AI Data Leak Prevention, which applies proprietary Similarity Detection DNA technology. This approach detects sensitive material even if altered or disguised for input into GenAI tools. *
*
*
**Consistent Oversight and Controls**
The platform aims to provide consistent oversight and controls across varied device deployments. The Endpoint – Encryption Detection capability identifies and blocks unauthorised attempts to archive and exfiltrate sensitive data within encrypted files. *
Endpoint – Encryption Detection
* Identifies and blocks unauthorised attempts to archive and exfiltrate sensitive data within encrypted files. * Helps prevent data theft regardless of the method used by attackers. **Conclusion**
CrowdStrike’s comprehensive data protection capabilities are designed to safeguard cloud infrastructures, AI models, endpoints, and SaaS applications. The platform provides real-time data protection, runtime data protection, and SaaS threat services, as well as features such as Generative AI Data Leak Prevention and Identity-Based Threat Detection. With its innovative approach to data protection, CrowdStrike is well-positioned to help organisations stay ahead of emerging threats and protect their sensitive data.
“In today’s threat landscape, your data isn’t just an asset – it’s the primary target,” said Elia Zaitsev, Chief Technology Officer at CrowdStrike. “Legacy data protection approaches fail because they’re fragmented across environments, blind to encrypted exfiltration and incapable of stopping threats in real time. Today, businesses must also contend with employees inadvertently leaking sensitive data to unapproved or misused GenAI tools, adding new layers of risk.

