Endpoint

10/10/2017
09:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ForeScout, CrowdStrike Partner on Endpoint and Network Threat Protection

  • ForeScout and CrowdStrike join forces to help organizations combat endpoint and network threats targeting traditional and IoT devices
  • New partnership will enable joint threat hunting and automated incident response to help protect against data breaches
  • Technology alliance will allow organizations to improve security hygiene and reduce mean time to respond (MTTR) to advanced threats across the endpoint and network

SAN JOSE, Calif. – October 10, 2017 – ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, and CrowdStrike, the leader in cloud-delivered endpoint protection, today announced a strategic alliance that will deliver comprehensive visibility, threat detection and security response for joint customers. Through this partnership, the two companies will monitor threats across endpoint and network tiers, share threat analytics and extend protection and policy control to unmanaged Bring-Your-Own-Device (BYOD), guest and IoT devices.

“Enterprises continue to be impacted by massive data breaches and cybersecurity attacks largely due to blind spots caused by undetected devices. To help solve this problem, ForeScout and CrowdStrike are forming a new strategic partnership that will offer a combination of extended device discovery, security intelligence and greater control to keep threats out and strengthen cyber hygiene,” said Michael DeCesare, president and CEO, ForeScout. “The collaboration and joint value of two market-leading cybersecurity companies will provide our customers with increased visibility and advanced threat analytics for better protection against malicious activity.”

Modern enterprise networks are challenged with managing increasingly complex environments along with exponential growth in volume and diversity of devices. The rise of network-connected devices has increased the attack surface, making it more challenging for organizations to prevent, detect and respond to cyber attacks. ForeScout and CrowdStrike will streamline and improve security operations for customers by leveraging ForeScout’s advanced device visibility and control capabilities combined with CrowdStrike’s AI-enabled threat analytics platform.

“Many security solutions fail to deliver accurate and meaningful threat insight, which is why organizations are constantly falling prey to cyber attacks,” said George Kurtz, co-founder and CEO, CrowdStrike. “With real-time endpoint detection and response, combined with next-generation threat prevention and proactive threat hunting, organizations will be able to gain an advantage in today’s vast threat landscape. The alliance between ForeScout and CrowdStrike is a better-together approach that will transform how customers protect their network against today’s cybersecurity challenges and tomorrow’s threats.”

The technology partnership between ForeScout and CrowdStrike will provide the following benefits to joint customers:

  • Comprehensive visibility and posture assessment across network-connected devices, including corporate devices while employees are off the enterprise network
  • Improved agent health and compliance on CrowdStrike managed devices
  • Sharing of threat intelligence across solutions to take more informed actions
  • Joint threat hunting for Indicators of Attack (IoAs) across endpoint and network tiers
  • Automated threat response to protect against malware targeting traditional and IoT devices

In addition to the go-to-market relationship, ForeScout and CrowdStrike intend to build an integrated solution to further support their joint customers. CrowdStrike is an industry leader in the endpoint protection market and the latest partner in ForeScout’s portfolio of more than 70 technology and alliance partners. Through these partnerships and integrations, ForeScout is able to orchestrate infrastructure-wide security management to make formerly disjointed security products work as one, eliminating security gaps, accelerating incident response, automating workflows and optimizing existing investments.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I'm not sure I like this top down management approach!"
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17338
PUBLISHED: 2018-09-23
An issue has been found in pdfalto through 0.2. It is a heap-based buffer overflow in the function TextPage::dump in XmlAltoOutputDev.cc.
CVE-2018-17341
PUBLISHED: 2018-09-23
BigTree 4.2.23 on Windows, when Advanced or Simple Rewrite routing is enabled, allows remote attackers to bypass authentication via a ..\ substring, as demonstrated by a launch.php?bigtree_htaccess_url=admin/images/..\ URI.
CVE-2018-17332
PUBLISHED: 2018-09-22
An issue was discovered in libsvg2 through 2012-10-19. The svgGetNextPathField function in svg_string.c returns its input pointer in certain circumstances, which might result in a memory leak caused by wasteful malloc calls.
CVE-2018-17333
PUBLISHED: 2018-09-22
An issue was discovered in libsvg2 through 2012-10-19. A stack-based buffer overflow in svgStringToLength in svg_types.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because sscanf is misused.
CVE-2018-17334
PUBLISHED: 2018-09-22
An issue was discovered in libsvg2 through 2012-10-19. A stack-based buffer overflow in the svgGetNextPathField function in svg_string.c allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact because a strncpy copy limit is miscalculated.