Epstein Files Full PDF

CLICK HERE
Technopedia Center
PMB University Brochure
Faculty of Engineering and Computer Science
S1 Informatics S1 Information Systems S1 Information Technology S1 Computer Engineering S1 Electrical Engineering S1 Civil Engineering

faculty of Economics and Business
S1 Management S1 Accountancy

Faculty of Letters and Educational Sciences
S1 English literature S1 English language education S1 Mathematics education S1 Sports Education
teknopedia

  • Registerasi
  • Brosur UTI
  • Kip Scholarship Information
  • Performance
Flag Counter
  1. World Encyclopedia
  2. CrowdStrike - Wikipedia
CrowdStrike - Wikipedia
From Wikipedia, the free encyclopedia
(Redirected from Crowdstrike)
American cybersecurity technology company
This article is about the company. For the widespread IT system outage in July 2024, see 2024 CrowdStrike-related IT outages.

CrowdStrike Holdings, Inc.
Company typePublic
Traded as
  • Nasdaq: CRWD (Class A)
  • Nasdaq-100 component
  • S&P 500 component
IndustryInformation security
Founded2011; 15 years ago (2011)
Founders
  • George Kurtz
  • Dmitri Alperovitch
  • Gregg Marston
Headquarters
Austin, Texas
,
United States
Key people
  • George Kurtz (CEO)
  • Michael Sentonas (President)[1]
RevenueIncrease US$3.95 billion (FY25)
Operating income
Negative increase US$−120.4 million (FY25)
Net income
Negative increase US$-19.27 million (FY25)
Total assetsIncrease US$8.7 billion (FY25)
Total equityIncrease US$3.28 billion (FY25)
Number of employees
10,118 (FY25)
Websitewww.crowdstrike.com Edit this at Wikidata
Footnotes / references
Financials as of fiscal year ended January 31, 2025[update].
References:[2]
Branch office in Sunnyvale, California which was formerly home to CrowdStrike headquarters

CrowdStrike Holdings, Inc. is an American cybersecurity technology company based in Austin, Texas. It provides endpoint security, threat intelligence, and cyberattack response services.[3]

Crowdstrike has investigated several high-profile cyberattacks, including the 2014 Sony Pictures hack, the 2015–16 cyberattacks on the Democratic National Committee (DNC), and the 2016 email leak involving the DNC.[4][5] On July 19, 2024, it issued a faulty update to its security software that caused global computer outages that disrupted air travel, banking, broadcasting, and other services.[6][7][8]

History

[edit]

CrowdStrike was co-founded in 2011 by George Kurtz (CEO), Dmitri Alperovitch (former CTO), and Gregg Marston (CFO, retired).[9][10][11][12] The following year, the company hired Shawn Henry, a former Federal Bureau of Investigation (FBI) official, to lead the subsidiary CrowdStrike Services, Inc., which offered security and response services.[13][14] The company launched CrowdStrike Falcon, an antivirus package, as its first product in June 2013.[15][16]

In May 2014, CrowdStrike's reports helped the United States Department of Justice to charge five Chinese military hackers with economic cyber espionage against U.S. corporations.[17] CrowdStrike also uncovered the activities of Energetic Bear, a group connected to Russia's Federal Security Service that conducted intelligence operations against global targets, primarily in the energy sector.[18]

Following the 2014 cyberattack on Sony Pictures, CrowdStrike identified evidence suggesting North Korean government involvement and provided analysis on the methods used in the attack.[19] CrowdStrike also helped identify members of Putter Panda, the state-sponsored Chinese group of hackers also known as PLA Unit 61486.[20][21]

In May 2015, the company reported a serious security problem called VENOM. It was found in QEMU, a program used to run virtual computers, and could let hackers steal private information.[22][23] In October 2015, the company announced that it had identified Chinese hackers attacking technology and pharmaceutical companies around the time that U.S. President Barack Obama and China's leader Xi Jinping publicly agreed not to conduct economic espionage against each other. The alleged hacking would have been in violation of that agreement.[24]

In July 2015, Google invested in the company's Series C funding round.[25][26][27]

In 2017, Crowdstrike reached a valuation of more than $1 billion with an estimated annual revenue of $100 million.[28] In June 2018, the company said it was valued at more than $3 billion.[26] Investors at the time included Telstra, March Capital Partners, Rackspace, Accel Partners and Warburg Pincus.[29][30]

In June 2019, the company made an initial public offering on the Nasdaq.[31][32]

In 2020, CrowdStrike launched a tool called Falcon Identity Threat Protection to help protect user identities. In 2022, it became a managed service, meaning CrowdStrike started running it for customers. That same year, they added a cloud-based threat hunting feature to look for signs of attacks.[33][34]

In December 2021, the company moved its headquarters location from Sunnyvale, California, to Austin, Texas.[35]

In 2023, CrowdStrike introduced CrowdStream service in collaboration with Cribl.io.[36] Charlotte AI, CrowdStrike's generative AI security analyst, was launched in May 2023 as part of Falcon's AI-driven security updates, enhancing automated threat triaging and response.[37]

In September 2023, CrowdStrike launched Falcon Foundry, a no-code application development platform directed at a wider audience,[38] and in September 2024, the company launched CrowdStrike Financial Services, which offers payment solutions and financing to improve access to the Falcon platform.[39]

The company joined the S&P 500 index in June 2024.[40]

Lobbying and government relations

[edit]

As of 2024, CrowdStrike spent more than $360,000 on federal lobbying in the first half of 2024, according to OpenSecrets, and $620,000 during 2023.[41] The company has also focused on working with the U.S. government and selling its services to government agencies.[42]

Acquisitions

[edit]

Crowdstrike has a history of acquisitions, including:

  • November 2017: Payload Security (develops automated malware analysis sandbox technology)[43]
  • September 2020: Preempt Security (zero trust and conditional access technology provider): $96 million[44]
  • February 2021: Humio (Danish log management platform): $400 million.[45]
  • November 2021: SecureCircle (SaaS-based cybersecurity service)[46]
  • October 2022: Reposify (an external attack surface management vendor for risk management)[47]
  • September 2023: Bionic.ai (Israeli cybersecurity startup)[48]
  • November 2024: Flow Security ($200 million) and Adaptive Shield ($300 million) (Israeli cloud security startups)[49][50]
  • August 2025: Onum (Spanish company focused on managing real-time telemetry pipelines)[51]
  • January 2026: SGNL (California-based identity security firm): $750 million[52]
  • January 2026: Seraphic Security (Israel-based cybersecurity firm specializing in browser runtime security): $420 million.[53]

Earnings

[edit]
Recent Financial Information
Year Revenue Net Cash Flow (from operations)
FY 2020 $481.4 MM $99.9 MM[54]
FY 2021 $874.4 MM $356.6 MM[55]
FY 2022 $1.45 B $574.8 MM[56]
FY 2023 $2.24 B $941 MM[57]
FY 2024 $3.06 B $1.17 B[58]
FY 2025 $3.95 B $1.38 B[2]

In 2024, total revenue was $3.06 billion, a 36% increase.[41]

Russian hacking investigations

[edit]

CrowdStrike helped investigate the Democratic National Committee cyberattacks and a connection to Russian intelligence services.[59] On 20 March 2017, then-FBI director James Comey testified before congress stating:[60]

"CrowdStrike, Mandiant, and ThreatConnect review[ed] the evidence of the hack and conclude[d] with high certainty that it was the work of APT 28 and APT 29 who are known to be Russian intelligence services."

Comey previously testified in January 2017 that a request for FBI forensics investigators to access the DNC servers was denied, saying Crowdstrike agreed to share information.[61]

In December 2016, CrowdStrike released a report stating that Russian government-affiliated group Fancy Bear had hacked a Ukrainian artillery app.[62] The report concluded that Russia had used the hack to cause large losses to Ukrainian artillery units. The app (called ArtOS) was installed on tablet PCs and used for fire-control.[63] CrowdStrike also found a hacked variation of POPR-D30 being distributed on Ukrainian military forums that utilized an X-Agent implant.[64]

The U.K.-based think tank International Institute for Strategic Studies said CrowdStrike’s report wrongly used its data and denied that hacking caused Ukraine’s artillery losses. The Ukrainian Ministry of Defense also rejected the CrowdStrike report, stating that actual artillery losses were much smaller than what was reported by CrowdStrike and were not associated with Russian hacking.[65] Prior to this, CrowdStrike had published a report claiming that malware used in Ukraine and against the Democratic National Committee (DNC) appeared to be unique and identical, offering it as further evidence for a Russian origin of the DNC attack.[66]

Cybersecurity firm SecureWorks discovered a list of email addresses targeted by Fancy Bear in phishing attacks. The list included the email address of Yaroslav Sherstyuk, the developer of ArtOS.[67] Additional Associated Press research supports CrowdStrike's conclusions about Fancy Bear.[68] Radio Free Europe notes that the AP report "lends some credence to the original CrowdStrike report, showing that the app had, in fact, been targeted."[69]

2024 IT outages

[edit]
Main article: 2024 CrowdStrike-related IT outages
Multiple blue screens of death (BSOD), caused by an update pushed by CrowdStrike, on airport luggage conveyor belts at LaGuardia Airport, New York City

On 19 July 2024, CrowdStrike released a faulty configuration update for its Falcon Sensor software on Microsoft Windows systems. The update caused around 8.5 million computers to crash and fail to restart properly. The disruption affected organizations in many sectors, including airlines, healthcare providers, financial institutions, media companies, and government services in multiple countries.[70][71]

CrowdStrike identified the faulty configuration update as the cause of the incident and stated that it was not the result of a cyberattack. The company released guidance and tools to help customers restore affected systems. Chief executive George Kurtz and other senior leaders issued public apologies, saying the company was “deeply sorry” for the disruption and announcing planned process changes to reduce the risk of similar incidents in the future.[72][73][74]

The outage led to industry and policy discussions about the risks associated with widely used, centralized security software and the importance of improving operational resilience in global information technology infrastructure.[75][76]

Delta lawsuits

[edit]

Delta Air Lines and CrowdStrike filed lawsuits against each other following the July 2024 Falcon software update.[77][78][79]

On October 25, 2024, Delta filed a lawsuit against CrowdStrike in Georgia state court, seeking approximately $500–550 million in damages. The airline said the claim covered flight cancellations, lost revenue, and costs related to restoring its operations after the Falcon software update.[80][81] A Georgia judge allowed Delta to proceed with key claims in its lawsuit, including allegations of gross negligence and computer trespass, while limiting certain fraud claims.[77][82]

On the same day that Delta filed its lawsuit, CrowdStrike filed a separate suit in the United States District Court for the Northern District of Georgia. The company sought a declaratory judgment stating that any liability arising from the July 2024 incident is limited by the terms of the parties’ service contract.[83]

CrowdStrike acknowledged that the flawed configuration update caused the global outage. The company stated that it identified the issue quickly and released a corrective update, with most major airline customers were operating at near-normal levels by the following day.[79][84] Delta experienced longer disruptions than other major airlines following the outage. CrowdStrike argued that the extended impact on Delta was due to the airline’s own information technology architecture and operational decisions, including its reliance on Microsoft Windows systems and its approach to system recovery, rather than the software update itself.[84][85][79]

See also

[edit]
  • 2024 Delta Air Lines disruption
  • Operating systems
  • Chinese intelligence activity abroad
  • Chinese espionage in the United States
  • Timeline of Russian interference in the 2016 United States elections
  • Timeline of investigations into Donald Trump and Russia (January–June 2017)

References

[edit]
  1. ^ Richardson, Tom (31 March 2024). "CrowdStrike's Australian boss snares $225m cybersecurity fortune". Australian Financial Review. Archived from the original on 20 July 2024. Retrieved 21 July 2024.
  2. ^ a b "US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2025". U.S. Securities and Exchange Commission. 10 March 2025. Retrieved 19 March 2025.
  3. ^ "CrowdStrike's security software targets bad guys, not their malware". TechRepublic. 9 October 2015. Archived from the original on 2 June 2016. Retrieved 10 June 2016.
  4. ^ Bradley, Tony (2015). "CrowdStrike demonstrates how attackers wiped the data from the machines at Sony". CSO Online. International Data Group. Archived from the original on 20 August 2016. Retrieved 9 June 2016.
  5. ^ Hamburger, Tom; Nakashima, Ellen (24 July 2016). "Clinton campaign – and some cyber experts – say Russia is behind email release". The Washington Post.
  6. ^ Banfield-Nwachi, Mabel (19 July 2024). "Windows global IT outage: what we know so far". The Guardian. London, United Kingdom. ISSN 0261-3077. Archived from the original on 22 July 2024. Retrieved 19 July 2024.
  7. ^ Plummer, Robert (19 July 2024). "Crowdstrike and Microsoft: What we know about global IT outage". BBC News. Archived from the original on 22 July 2024. Retrieved 19 July 2024.
  8. ^ Godfrey, Paul; Druker, Simon; Wynder, Ehren (19 July 2024). "911 call centers back online after IT outage causes global chaos". United Press International. Retrieved 19 July 2024.
  9. ^ "In conversation with George Kurtz, CEO of CrowdStrike". Fortune. Archived from the original on 1 July 2019. Retrieved 1 July 2019.
  10. ^ "Bloomberg – Dmitri Alperovitch". www.bloomberg.com. Archived from the original on 14 July 2020. Retrieved 14 February 2020.
  11. ^ "Standing up at the gates of hell: CrowdStrike CEO George Kurtz". Fortune. 29 July 2015. Archived from the original on 29 May 2016. Retrieved 10 June 2016.
  12. ^ Albert-Deitch, Cameron (15 May 2019). "CrowdStrike, the $3.4 Billion Startup That Fought Russian Spies in 2016, Just Filed for an IPO". Inc.com. Archived from the original on 3 June 2019. Retrieved 1 July 2019.
  13. ^ Ragan, Steve (23 April 2012). "Former FBI Exec to Head CrowdStrike Services". SecurityWeek. Archived from the original on 20 January 2021. Retrieved 13 December 2020.
  14. ^ Messmer, Ellen (18 April 2012). "Top FBI cyber cop joins startup CrowdStrike to fight enterprise intrusions". Network World. Archived from the original on 8 March 2024. Retrieved 10 June 2016.
  15. ^ Messmer, Ellen (18 June 2013). "Start-up tackles advanced persistent threats on Microsoft, Apple computers". Network World. Archived from the original on 17 May 2019. Retrieved 1 July 2019.
  16. ^ "U.S. firm CrowdStrike claims success in deterring Chinese hackers". Reuters. 13 April 2015. Archived from the original on 12 November 2017. Retrieved 14 June 2016.
  17. ^ Gorman, Devlin Barrett and Siobhan (20 May 2014). "U.S. Charges Five in Chinese Army With Hacking". Wall Street Journal. ISSN 0099-9660. Archived from the original on 15 February 2020. Retrieved 14 February 2020.
  18. ^ "The old foe, new attack and unsolved mystery in the recent U.S. energy sector hacking campaign". CyberScoop. 12 July 2017. Archived from the original on 24 September 2019. Retrieved 14 February 2020.
  19. ^ "What's in a typo? More evidence tying North Korea to the Sony hack". PCWorld. Archived from the original on 19 August 2016. Retrieved 14 June 2016.
  20. ^ Perlroth, Nicole (9 June 2014). "2nd China Army Unit Implicated in Online Spying". The New York Times. ISSN 0362-4331. Archived from the original on 12 November 2017. Retrieved 14 June 2016.
  21. ^ "Second China unit accused of cyber crime". Financial Times. 10 June 2014. Retrieved 10 June 2014.
  22. ^ "'Venom' vulnerability: Serious computer bug shatters cloud security". Fortune. 13 May 2015. Archived from the original on 25 April 2016. Retrieved 14 June 2016.
  23. ^ Goodin, Dan (13 May 2015). "Extremely serious virtual machine bug threatens cloud providers everywhere". Ars Technica. Archived from the original on 22 June 2019. Retrieved 1 July 2019.
  24. ^ Yadron, Danny (19 October 2015). "Report Warns of Chinese Hacking". Wall Street Journal. Archived from the original on 17 May 2019. Retrieved 1 July 2019.
  25. ^ Kuranda, Sarah (17 May 2017). "Crowdstrike Lands $100M Funding Round, Looks To Expand Globally And Invest In Partners". CRN. Archived from the original on 3 June 2019. Retrieved 1 July 2019.
  26. ^ a b "Cybersecurity startup CrowdStrike raises $200 million at $3 billion valuation". VentureBeat. 19 June 2018. Archived from the original on 3 June 2019. Retrieved 1 July 2019.
  27. ^ "CrowdStrike may top these 6 biggest-ever U.S. security IPOs next month". www.bizjournals.com. Archived from the original on 28 April 2020. Retrieved 24 February 2020.
  28. ^ Hackett, Robert (17 May 2017). "Hack Investigator CrowdStrike Reaches $1 Billion Valuation". FORTUNE. Archived from the original on 1 July 2019. Retrieved 9 June 2017.
  29. ^ "Security Company CrowdStrike Scores $100M Led By Google Capital". TechCrunch. 13 July 2015. Archived from the original on 4 April 2019. Retrieved 1 July 2019.
  30. ^ "CrowdStrike raises $100 million for cybersecurity". www.bizjournals.com. Archived from the original on 28 April 2020. Retrieved 24 February 2020.
  31. ^ Murphy, Hannah (13 June 2019). "Cyber security group CrowdStrike's shares jump more than 70% after IPO". Financial Times. ISSN 0307-1766. Retrieved 13 June 2019.{{cite news}}: CS1 maint: deprecated archival service (link)
  32. ^ Feiner, Lauren (12 June 2019). "CrowdStrike pops more than 70% in debut, now worth over $11 billion". CNBC. Archived from the original on 12 June 2019. Retrieved 12 June 2019.
  33. ^ "CrowdStrike launches Falcon Identity Threat Protection Complete," Techzine, March 2, 2022, retrieved March 3, 2025.
  34. ^ "CrowdStrike introduces a new cloud threat hunting service," VentureBeat, July 26, 2022, retrieved March 3, 2025.
  35. ^ "CrowdStrike Changes Principal Office to Austin, Texas". CrowdStrike. 28 December 2021. Archived from the original on 28 January 2022. Retrieved 2 February 2022.
  36. ^ Alspach, Kyle. "RSAC 2023 Sees Big Moves From SentinelOne, CrowdStrike, Google Cloud, Accenture | CRN". www.crn.com. Archived from the original on 22 July 2024. Retrieved 29 February 2024.
  37. ^ "CrowdStrike adds generative AI assistant to security tools," Axios, May 30, 2023, retrieved March 6, 2025.
  38. ^ "CrowdStrike announces major build-out of its Falcon product suite," CSO, September 19, 2023, retrieved March 3, 2025.
  39. ^ "CrowdStrike Unveils Financial Services, AI Tools at Fal.Con 2024," Channel Insider, September 23, 2024, retrieved March 6, 2025.
  40. ^ Carson, Ed (9 June 2024). "CrowdStrike, KKR, GoDaddy To Join S&P 500 In Quarterly Rebalance; Stocks Jump". Investor's Business Daily. Archived from the original on 9 June 2024.
  41. ^ a b Charlotte Ehrlich (9 October 2024). "Facing scrutiny over global outage, cybersecurity firm CrowdStrike on track for record year of federal lobbying spending".
  42. ^ "CrowdStrike CEO George Kurtz on China, Microsoft and the SEC". CNBC. 14 December 2023. Archived from the original on 22 July 2024. Retrieved 19 July 2024.
  43. ^ Kovacs, Eduard (21 August 2018). "CrowdStrike Adds Malware Search Engine to 'Hybrid Analysis'". Security Week.
  44. ^ Gagliordi, Natalie. "CrowdStrike to acquire Preempt Security for $96 million". ZDNet. Archived from the original on 26 September 2020. Retrieved 28 September 2020.
  45. ^ Cimpanu, Catalin (18 February 2021). "CrowdStrike acquires Humio for $400 million". ZDNet. Archived from the original on 11 July 2024. Retrieved 10 July 2024.
  46. ^ Novinson, Michael (1 November 2021). "CrowdStrike To Buy Data Protection Startup SecureCircle". CRN. Archived from the original on 22 July 2024. Retrieved 10 June 2024.
  47. ^ Dor, Ofir (20 September 2022). "CrowdStrike buying Israeli cybersecurity co Reposify". Globes.
  48. ^ "CrowdStrike acquiring cyber startup Bionic for $350 million". CTech. 19 September 2023.
  49. ^ "CrowdStrike acquiring cyber startup Flow Security in $200 million deal". CTech. 6 March 2024. Archived from the original on 20 July 2024. Retrieved 19 July 2024.
  50. ^ Kovacs, Eduard (6 November 2024). "CrowdStrike to Acquire Adaptive Shield in Reported $300 Million Deal". SecurityWeek. Retrieved 6 November 2024.
  51. ^ "CrowdStrike Agrees to Acquire Onum to Supercharge Falcon NG SIEM". CrowdStrike.com. Retrieved 30 August 2025.
  52. ^ Swagath, B. V. (9 January 2026). "CrowdStrike to enhance AI-era identity security with SGNL acquisition". Verdict. Retrieved 9 January 2026.
  53. ^ Lennon, Mike (13 January 2026). "CrowdStrike to Acquire Browser Security Firm Seraphic for $420 Million". SecurityWeek. Retrieved 14 January 2026.
  54. ^ "US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2020". U.S. Securities and Exchange Commission. 23 March 2020. Retrieved 19 March 2025.
  55. ^ "US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2021". U.S. Securities and Exchange Commission. 18 March 2025. Retrieved 19 March 2025.
  56. ^ "US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2022". U.S. Securities and Exchange Commission. 16 March 2025. Retrieved 19 March 2025.
  57. ^ "US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2023". U.S. Securities and Exchange Commission. 8 March 2025. Retrieved 19 March 2025.
  58. ^ "US SEC: Form 10-K Crowdstrike Holdings, Inc., FY2024". U.S. Securities and Exchange Commission. 7 March 2024.
  59. ^ Энжел-Ау Юнг (Angel-Au Jung) (20 March 2020). "Охотник на хакеров и враг Трампа: как миллионер из США ловит киберпреступников из России, Китая и Ирана" [Hacker hunter and Trump's enemy: how a millionaire from the United States catches cybercriminals from Russia, China and Iran]. Forbes (forbes.ru) (in Russian). Archived from the original on 28 September 2020. Retrieved 20 September 2024.
  60. ^ "Full transcript: FBI Director James Comey testifies on Russian interference in 2016 election". Archived from the original on 23 May 2017. Retrieved 22 May 2017.
  61. ^ "FBI Director Comey: Agency requested access to DNC server". CBS News. 10 January 2017. Archived from the original on 21 September 2019. Retrieved 19 July 2024.
  62. ^ "Russian hackers linked to DNC attack also targeted Ukrainian military, says report". theverge.com. 23 December 2016. Archived from the original on 17 November 2019. Retrieved 26 June 2019.
  63. ^ Noosphere engineering school (31 October 2015). "New brainchild of engineering school was tested by the armed forces". noosphereengineering.com. Archived from the original on 29 December 2017. Retrieved 28 December 2017.
  64. ^ Boldi (3 January 2017). "Technical details on the Fancy Bear Android malware (poprd30.apk)". Laboratory of Cryptography and System Security, Budapest University of Technology and Economics. Archived from the original on 9 February 2018. Retrieved 8 February 2018.
  65. ^ Kuzmenko, Oleksiy (23 March 2017). "Think Tank: Cyber Firm at Center of Russian Hacking Charges Misread Data". Voice of America. Archived from the original on 20 January 2018. Retrieved 20 December 2017.
  66. ^ "Group allegedly behind DNC hack targeted Ukraine, report finds". The Guardian. 22 December 2016. Archived from the original on 16 May 2017. Retrieved 19 July 2024.
  67. ^ Miller, Christopher (2 November 2017). "Fancy Bear Tried To Hack E-Mail Of Ukrainian Making Artillery-Guidance App". RadioFreeEurope. Archived from the original on 6 February 2018. Retrieved 8 February 2018.
  68. ^ Satter, Raphael (2 November 2017). "Russia hackers pursued Putin foes, not just US Democrats". Associated Press. Archived from the original on 2 April 2019. Retrieved 2 April 2019.
  69. ^ Miller, Christopher (2 November 2017). "'Fancy Bear' Tried To Hack E-Mail Of Ukrainian Making Artillery-Guidance App". Radio Free Europe/Radio Liberty. Archived from the original on 2 April 2019. Retrieved 2 April 2019.
  70. ^ Tidy, Joe (20 July 2024). "CrowdStrike IT outage affected 8.5 million Windows devices, Microsoft says". BBC. Retrieved 25 February 2026.
  71. ^ "CrowdStrike: What the 2024 outage reveals about security | Privacy International". privacyinternational.org. Retrieved 25 February 2026.
  72. ^ "Falcon Content Update Preliminary Post Incident Report | CrowdStrike". CrowdStrike. 24 July 2024. Retrieved 25 February 2026.
  73. ^ "CrowdStrike outage demonstrates need for resilience". The Corporate Governance Institute. Retrieved 25 February 2026.
  74. ^ Weston, David (20 July 2024). "Helping our customers through the CrowdStrike outage". The Official Microsoft Blog. Retrieved 25 February 2026.
  75. ^ Poireault, Kevin (25 September 2024). "CrowdStrike Apologizes for IT Outage, Defends Microsoft Kernel Access". Infosecurity Magazine. Retrieved 25 February 2026.
  76. ^ Moncrieff, Stewart (13 August 2024). "What Caused the Crowdstrike Outage: A Detailed Breakdown". Messageware. Retrieved 25 February 2026.
  77. ^ a b Stempel, Jonathan (19 May 2025). "Delta can sue CrowdStrike over computer outage that caused 7,000 canceled flights". Reuters. Retrieved 25 February 2026.
  78. ^ Raby, Dan (9 May 2025). "Delta must face class action lawsuit over CloudStrike outage, judge rules". FOX 5 Atlanta. Retrieved 25 February 2026.
  79. ^ a b c Zahn, Max (27 July 2024). "Why did Delta take days to restore normal service after CrowdStrike outage? Experts weigh in". ABC News. Retrieved 25 February 2026.
  80. ^ "Delta Air Lines Launches Lawsuit Against CrowdStrike Over July Outage". www.asisonline.org. Retrieved 25 February 2026.
  81. ^ "Delta sues CrowdStrike over software update that prompted mass flight disruptions | CNN Business". CNN. 26 October 2024. Retrieved 25 February 2026.
  82. ^ "Delta allowed to proceed with lawsuit against CrowdStrike over outage". FOX 5 Atlanta. 20 May 2025. Retrieved 25 February 2026.
  83. ^ "Delta Air Lines Launches Lawsuit Against CrowdStrike Over July Outage". www.asisonline.org. Retrieved 25 February 2026.
  84. ^ a b Goswami, Rohan (17 December 2024). "CrowdStrike moves to dismiss Delta Air Lines suit, citing contract terms". CNBC. Retrieved 25 February 2026.
  85. ^ Marcin, Tim (23 July 2024). "It's 4 days later and Delta is still affected by the CrowdStrike outage. Here's why". Mashable. Retrieved 25 February 2026.

External links

[edit]
  • Official website Edit this at Wikidata
  • Business data for CrowdStrike Holdings, Inc.:
    • Google
    • Reuters
    • SEC filings
    • Yahoo!
  • v
  • t
  • e
Companies of the Nasdaq-100 index
  • Adobe
  • ADP
  • AMD
  • Airbnb
  • Alnylam Pharmaceuticals
  • Alphabet
  • Amazon
  • AEP
  • Amgen
  • Analog Devices
  • Apple
  • Applied Materials
  • AppLovin
  • Arm
  • ASML
  • Atlassian
  • Autodesk
  • Axon
  • Baker Hughes
  • Booking Holdings
  • Broadcom
  • Cadence
  • Charter Communications
  • Cintas
  • Cisco
  • Coca-Cola Europacific Partners
  • Cognizant
  • Comcast
  • Constellation Energy
  • Copart
  • CoStar
  • Costco
  • CrowdStrike
  • CSX
  • Datadog
  • Dexcom
  • Diamondback Energy
  • DoorDash
  • Electronic Arts
  • Exelon
  • Fastenal
  • Ferrovial
  • Fortinet
  • GE HealthCare
  • Gilead
  • Honeywell
  • Idexx Laboratories
  • Insmed
  • Intel
  • Intuit
  • Intuitive Surgical
  • Keurig Dr Pepper
  • KLA
  • Kraft Heinz
  • Lam Research
  • Linde
  • Marriott International
  • Marvell
  • Mercado Libre
  • Meta
  • Microchip
  • Micron
  • Microsoft
  • MicroStrategy
  • Mondelez International
  • Monolithic Power Systems
  • Monster Beverage
  • Netflix
  • Nvidia
  • NXP
  • O'Reilly Auto Parts
  • Old Dominion
  • Paccar
  • Palantir
  • Palo Alto Networks
  • Paychex
  • PayPal
  • PDD Holdings
  • PepsiCo
  • Qualcomm
  • Regeneron
  • Roper Technologies
  • Ross Stores
  • Seagate Technology
  • Shopify
  • Starbucks
  • Synopsys
  • Take-Two Interactive
  • T-Mobile US
  • Tesla
  • Texas Instruments
  • Thomson Reuters
  • Verisk
  • Vertex
  • Walmart
  • Warner Bros. Discovery
  • Western Digital
  • Workday
  • Xcel Energy
  • Zscaler
Retrieved from "https://teknopedia.ac.id/w/index.php?title=CrowdStrike&oldid=1340444073"
Categories:
  • Companies in the Nasdaq-100
  • Companies listed on the Nasdaq
  • 2011 establishments in California
  • 2019 initial public offerings
  • 2019 Trump–Ukraine scandal
  • American companies established in 2011
  • Business services companies established in 2011
  • Business services companies of the United States
  • Companies based in Austin, Texas
  • Companies based in Sunnyvale, California
  • Computer companies established in 2011
  • Computer companies of the United States
  • Computer security companies
  • Internet technology companies of the United States
  • Organizations associated with Russian interference in the 2016 United States elections
  • Science and technology in Texas
  • Security companies of the United States
  • Technology companies based in the San Francisco Bay Area
  • Warburg Pincus companies
Hidden categories:
  • Pages with non-numeric formatnum arguments
  • CS1 maint: deprecated archival service
  • CS1 Russian-language sources (ru)
  • Articles with short description
  • Short description matches Wikidata
  • Use American English from July 2020
  • All Wikipedia articles written in American English
  • Use dmy dates from July 2024
  • Articles containing potentially dated statements from January 2025
  • All articles containing potentially dated statements

  • indonesia
  • Polski
  • العربية
  • Deutsch
  • English
  • Español
  • Français
  • Italiano
  • مصرى
  • Nederlands
  • 日本語
  • Português
  • Sinugboanong Binisaya
  • Svenska
  • Українська
  • Tiếng Việt
  • Winaray
  • 中文
  • Русский
Sunting pranala
url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url url
Pusat Layanan

UNIVERSITAS TEKNOKRAT INDONESIA | ASEAN's Best Private University
Jl. ZA. Pagar Alam No.9 -11, Labuhan Ratu, Kec. Kedaton, Kota Bandar Lampung, Lampung 35132
Phone: (0721) 702022
Email: pmb@teknokrat.ac.id