V-Score Card

TICKER:      CRWD
V-SCORE:     3.01
VERDICT:     EMBEDDED
κ:           0.01
BASKET:      FILTER

GATE 1 (E>1):        PASS (E=4)
GATE 2 (A>1∨Σ≥12):   PASS (A=3 > 1)
FAST SCREEN:          1/3 — Proprietary data PASS, Regulatory PARTIAL, Transaction NO

Arithmetic

      C=3     E=4     U=3     A=3     M=4     F=2
w:    0.25    0.22    0.18    0.12    0.15   −0.06
────────────────────────────────────────────────────
      0.75  + 0.88  + 0.54  + 0.36  + 0.60  − 0.12  =  3.01

Gates: PASS · PASS = 1
V = 3.01 × 1 = 3.01
κ = (3.01 − 3.0)⁺ = 0.01

Regime Context

V       = 3.01    structural, regime-invariant
κ       = 0.01    structural conviction → near-zero basket weight
IR      ≈ 0.00    regime artifact (ρ_intra → 1 in T=15wk window; ε_i → 0)
δ       = V − V_market ≈ 3.01 − 4.0+ = −1.0    market overpays at 60× fwd P/E

IR does not gate the verdict. In a T=15-week window where cybersecurity sold off indiscriminately, intra-sector correlation approached 1 and idiosyncratic residuals vanished. IR ≈ 0 measures the regime, not the stock. V(s) is orthogonal to r_sector(t).


Dimension Analysis

C — Compound Cognition: 3

Downgraded from 4 after stress-test for E-dependence and depreciation.

The original C=4 case rested on: 15 years of cybersecurity domain encoding, Threat/Intel/Asset/Enterprise Graphs, cyber RLHF from managed detection, 170+ tracked adversary groups, 33 interconnected modules. Kurtz: "Expert label telemetry [from] global sensors, MDR analysts, elite incident responders. Structural advantage no LLM replicate." (Q4 FY26 transcript)

The problem is double-counting. RLHF labels come from the sensor network — that's E, not C. Cross-org pattern recognition requires the telemetry infrastructure — that's E. Real-time threat tracking depends on the 88K-customer network — that's E. Strip the E-dependent components and what remains as pure C:

  • Detection algorithm architectures (GNNs, behavioral pattern matching)
  • Graph schema design (Threat × Intel × Asset × Enterprise interconnection)
  • Adversary taxonomy and behavioral signatures (170+ group profiles as static knowledge)
  • Module interconnection logic (33 modules, cross-data flows)

A well-resourced competitor re-derives this in 6-12 months. Google/Mandiant and Microsoft already have comparable accumulated security cognition today. The rubric's C=4 exemplar is Synopsys: 40 years of chip design rules accumulated through millions of tapeouts, monotonically — a 2005 tapeout rule is still valid in 2026. Cybersecurity knowledge depreciates. The effective knowledge window is 2-3 years, not 15. Most 2015 adversary TTPs are obsolete.

Not C=2: the four-graph interconnection (Threat × Intel × Asset × Enterprise) creates genuine compound complexity that takes months, not weeks, to architect and integrate. The "collect-once, use-repeatedly" design principle (10-K) is real engineering depth.

E — Irreducible Infrastructure: 4

Petabyte-scale specialized real-time infrastructure: 1 trillion events/day, 2 trillion vertices, 15 petabytes. 88K customer organizations generate crowdsourced telemetry that trains AI models no local agent can replicate — the collective signal IS the product. (10-K: "The more data that is fed into our Falcon platform, the more intelligent the Security Cloud becomes")

Regulatory embedding: FedRAMP authorized, DoD IL5 provisional authorization, DHS CDM Approved Products List, CISA modernization partner, Charlotte AI FedRAMP High. 25 of 50 US states standardized at enterprise level. (10-K lines 910-926)

Retention and commitment: 97% GRR through the worst incident in company history (July 2024 outage). $4.8B deferred revenue + $4.2B backlog = ≈$9B committed. Commission amortization extended 4→5 years, reflecting lengthening customer relationships. (Q4 FY26 transcript; 10-K)

c_ℓ is high, not infinite. Switching requires kernel-level sensor removal, competitor deployment, detection rule migration, SOC retraining, and loss of historical telemetry — approximately 12-18 months and $1-5M per F500 enterprise. July 19 proved it: 3% left, 97% stayed. The switching cost is real but finite.

Not E=5: no hard regulatory mandate requiring CRWD specifically. Enterprises can choose PANW, MSFT Defender, or SentinelOne. FedRAMP/IL5 are shared certifications, not CRWD-exclusive. Microsoft has larger raw telemetry (billions of Windows/Azure/M365 endpoints) but hasn't closed the detection quality gap (Gartner MQ: CRWD #1 both axes, 3 consecutive years).

U — Ecosystem Breadth: 3

33 cloud modules map to 13 distinct workflows across 7 functional areas: SOC, IAM, IT Ops, DevOps/CloudOps, Vulnerability Management, Compliance, AI Governance. 50% of customers use 6+ modules; 24% use 8+. Flex flywheel deepens adoption (1 module → 25 modules example; re-Flex averages 26% ARR lift after ≈7 months). (Q4 FY26 transcript; 10-K lines 362-370)

All 7 functional areas fall under the CIO/CISO umbrella. CRWD is deep-but-narrow within security/IT, not multi-department. Compare ServiceNow (U=4): IT + HR + Customer Service + Security + Legal spanning 5+ C-suite domains. Compare SAP (U=5): every department across every industry.

Calibrates to PANW (U=3 in scored universe). Strong 3, approaching 4 as AIDR creates a new AI Governance workflow and Charlotte AI spans broader security team functions.

A — Distribution & Discoverability: 3

Functional API ecosystem with streaming, query, and batch APIs plus management and control APIs. CrowdStrike Store: "industry's first unified security cloud ecosystem of trusted third-party applications" (10-K). AWS Marketplace: $1.5B TCV (+50% YoY). Google Marketplace present. Microsoft Marketplace launching FY27 — Kurtz: "Satya Nadella spoke [to] CrowdStrike's go-to-market team... Watershed moment." (Q4 FY26 transcript)

Charlotte AI (flagship + 10 specialized agents) growing 6x YoY usage, ARR 3x. AIDR 5x QoQ. MCP server support: "Customers own agents technologies, leverage MCP services." AWS selected Falcon NextGen SIEM as default for all AWS customers. (Q4 FY26 transcript; Q3 FY26 transcript)

Not A=4: external AI agents don't yet route through CRWD by default. Charlotte is internal-facing (security teams), not an agent-native endpoint for autonomous AI workflows. CrowdStrike Store serves human operators, not autonomous agents. Trending toward 4 as MCP deepens and MSFT Marketplace opens new distribution.

M — Ecosystem Gravity: 4

$5.25B ARR (+24%), 88K+ organizations, 97% GRR, 115% NRR. Crowdsourced telemetry creates genuine network effect — each additional endpoint amplifies detection intelligence for all customers. Falcon Flex $1.69B ARR (+120% YoY) deepens economic lock-in. Gartner MQ #1 both axes, 3 consecutive years. (Q4 FY26 transcript)

Partner ecosystem: $1.3B+ MSSP (Kroll, Pax8, NinjaOne), $1.5B AWS TCV, GSI partnerships (EY, Accenture, Deloitte, HCL, Wipro, KPMG, Infosys). Canalys estimates $7 services opportunity per dollar of Falcon product sales. (Q4 FY26 transcript; Q3 FY26 transcript)

Migration cost (φ): kernel-level sensor removal + detection rule migration + SOC retraining + historical telemetry loss + MSSP/GSI relationship rewiring + Foundry app migration + Flex contract unwinding.

Not M=5: no counterparty network effects. SAP/ADP couple suppliers and customers on the same platform — switching one side forces the other to follow. CRWD's network effect is one-sided (more endpoints → better detection), not two-sided.

F — Ecosystem Friction: 2 (penalty)

Low friction deployment: lightweight single sensor, cloud-native SaaS, in-app trials, Falcon Go, marketplace metered billing. Falcon Flex eliminates expansion procurement — "Available immediately... didn't go procurement cycle" (Q4 FY26 transcript). Foundry offers no-code app development. Falcon Complete provides turnkey MDR for customers with limited security expertise. (10-K lines 860, 878-905)

Not F=1: initial enterprise deployment requires kernel-level access approval and security team buy-in. GSI involvement for large SIEM migrations. July 19 demonstrated the risk profile of deep OS integration. Higher friction than Datadog (developer self-serve) but lower than most enterprise security platforms.


Thermodynamic Summary

CRWD's primary resistance to intelligence collapse is its crowdsourced telemetry network — 88K organizations generating 1 trillion events/day that train AI models no local agent can replicate. The collective signal IS the product. An endpoint running a local LLM can generate detection rules but cannot access real-time global adversary behavior patterns across 88K diverse environments.

The compound cognition (C=3) is re-derivable — the detection algorithms, graph schemas, and adversary taxonomy are deep engineering but not irreplicable. What makes the system durable is the infrastructure (E=4): the network that generates the data that trains the models. C depends on E, not the reverse. If the infrastructure erodes (competitive convergence from MSFT/Google), the cognition erodes with it.

The ceiling is U=3: all 33 modules serve the CIO/CISO umbrella. CRWD cannot escape into cross-department platform territory (HR, Finance, Supply Chain) without a fundamental business model change. This caps the thermodynamic resistance below ServiceNow (U=4) and SAP (U=5).

Revenue durability split:

Layer% RevenueThermodynamic Basis
Durable (≈80%)Endpoint, identity, threat intel, MDRRequires centralized AI on crowdsourced telemetry. No local substitute.
Exposed (≈20%)IT ops, standalone log mgmt, basic complianceLocal AI agents with sufficient compute could substitute.

Conviction Weight

κ_CRWD = (V − 3.0)⁺ = (3.01 − 3.0)⁺ = 0.01

w_CRWD ∝ κ_CRWD = 0.01 → near-zero allocation

κ is purely structural, regime-invariant. It does not depend on the trailing factor regression, price action, or IR. CRWD's near-zero weight reflects its structural position: barely above the EMBEDDED threshold, one dimension shift from AT_RISK.


Basket Verdict: FILTER

CRWD survives AI. It doesn't earn a basket allocation.

Three independent signals converge:

  1. κ = 0.01 — structural conviction near zero. CRWD is EMBEDDED by the thinnest margin. Any single dimension downgrade (E→3 if MSFT closes detection gap, U stalls at 3, A fails to reach agent-native routing) drops V below 3.0 into AT_RISK.

  2. δ = V − V_market ≈ −1.0 — the market at 60× forward P/E prices V > 4.0 (FORTRESS territory). The stock trades as if it were ServiceNow or S&P Global. The V-Score says EMBEDDED. The gap is roughly one full tier of durability that doesn't exist in the structural properties.

  3. IR ≈ 0 (regime context, does not gate) — the trailing 15-week window shows ρ_intra → 1 across cybersecurity names. Idiosyncratic signal is unobservable in this regime. This is a measurement artifact, not an alpha statement — but it means the market cannot currently distinguish CRWD from the sector. When ρ_intra normalizes, idiosyncratic signal re-emerges, and the δ gap becomes observable.

Sensitivity to score revision:

ScenarioVκVerdict
Base (C=3, E=4)3.010.01FILTER
U→4 + A→4 (bull)3.310.31WATCH
E→3 (MSFT parity)2.790.00FILTER (AT_RISK)
C reverts to 43.260.26WATCH

Even in the bull case (U and A both upgrade), κ = 0.31 with δ still negative. CRWD would need to trade at a substantial discount to its structural properties to generate a positive δ — roughly 30-35× forward P/E vs current 60×.

Prior V-Score trajectory: 4.00 → 3.26 → 3.01. Three rounds of calibration, each tighter. The company hasn't changed — the scoring has gotten more honest about what's E vs C, what's deep vs broad, and what the rubric exemplars actually require.

Evidence

SourceClaimTierLR
10-K (2026-03-05)1T events/day, 15PB, 88K orgs, 97% GRR, FedRAMP/IL5/DHS CDM1
Q4 FY26 transcript (2026-03-04)$5.25B ARR, $331M net new ARR, Charlotte 6x, AIDR 5x, Flex $1.69B21.8
10-K risk factorsJuly 2024 litigation, customer deferrals, SBC $1.1B10.8
90-day factor regressionα≈0%, β_CIBR=1.78, idio variance 28.6%Quant0.8
Gartner MQ (cited in 10-K)CRWD #1 both axes, 3 consecutive years31.5
Cross-corpus transcript search (3,962 transcripts)Zero companies report reduced cybersec spend from AI substitution22.2
Anthropic Claude Code Security (Feb 2026)SAST tool, not runtime security — sector selloff was category error22.0
MSFT competitive dynamics28.6% IDC share from legacy AV replacement, not CRWD displacement; CRWD 97% GRR unchanged31.5