Endpoint

10/10/2017
09:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ForeScout, CrowdStrike Partner on Endpoint and Network Threat Protection

  • ForeScout and CrowdStrike join forces to help organizations combat endpoint and network threats targeting traditional and IoT devices
  • New partnership will enable joint threat hunting and automated incident response to help protect against data breaches
  • Technology alliance will allow organizations to improve security hygiene and reduce mean time to respond (MTTR) to advanced threats across the endpoint and network

SAN JOSE, Calif. – October 10, 2017 – ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, and CrowdStrike, the leader in cloud-delivered endpoint protection, today announced a strategic alliance that will deliver comprehensive visibility, threat detection and security response for joint customers. Through this partnership, the two companies will monitor threats across endpoint and network tiers, share threat analytics and extend protection and policy control to unmanaged Bring-Your-Own-Device (BYOD), guest and IoT devices.

“Enterprises continue to be impacted by massive data breaches and cybersecurity attacks largely due to blind spots caused by undetected devices. To help solve this problem, ForeScout and CrowdStrike are forming a new strategic partnership that will offer a combination of extended device discovery, security intelligence and greater control to keep threats out and strengthen cyber hygiene,” said Michael DeCesare, president and CEO, ForeScout. “The collaboration and joint value of two market-leading cybersecurity companies will provide our customers with increased visibility and advanced threat analytics for better protection against malicious activity.”

Modern enterprise networks are challenged with managing increasingly complex environments along with exponential growth in volume and diversity of devices. The rise of network-connected devices has increased the attack surface, making it more challenging for organizations to prevent, detect and respond to cyber attacks. ForeScout and CrowdStrike will streamline and improve security operations for customers by leveraging ForeScout’s advanced device visibility and control capabilities combined with CrowdStrike’s AI-enabled threat analytics platform.

“Many security solutions fail to deliver accurate and meaningful threat insight, which is why organizations are constantly falling prey to cyber attacks,” said George Kurtz, co-founder and CEO, CrowdStrike. “With real-time endpoint detection and response, combined with next-generation threat prevention and proactive threat hunting, organizations will be able to gain an advantage in today’s vast threat landscape. The alliance between ForeScout and CrowdStrike is a better-together approach that will transform how customers protect their network against today’s cybersecurity challenges and tomorrow’s threats.”

The technology partnership between ForeScout and CrowdStrike will provide the following benefits to joint customers:

  • Comprehensive visibility and posture assessment across network-connected devices, including corporate devices while employees are off the enterprise network
  • Improved agent health and compliance on CrowdStrike managed devices
  • Sharing of threat intelligence across solutions to take more informed actions
  • Joint threat hunting for Indicators of Attack (IoAs) across endpoint and network tiers
  • Automated threat response to protect against malware targeting traditional and IoT devices

In addition to the go-to-market relationship, ForeScout and CrowdStrike intend to build an integrated solution to further support their joint customers. CrowdStrike is an industry leader in the endpoint protection market and the latest partner in ForeScout’s portfolio of more than 70 technology and alliance partners. Through these partnerships and integrations, ForeScout is able to orchestrate infrastructure-wide security management to make formerly disjointed security products work as one, eliminating security gaps, accelerating incident response, automating workflows and optimizing existing investments.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
'Hidden Tunnels' Help Hackers Launch Financial Services Attacks
Kelly Sheridan, Staff Editor, Dark Reading,  6/20/2018
Inside a SamSam Ransomware Attack
Ajit Sancheti, CEO and Co-Founder, Preempt,  6/20/2018
Tesla Employee Steals, Sabotages Company Data
Jai Vijayan, Freelance writer,  6/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-12697
PUBLISHED: 2018-06-23
A NULL pointer dereference (aka SEGV on unknown address 0x000000000000) was discovered in work_stuff_copy_to_from in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30. This can occur during execution of objdump.
CVE-2018-12698
PUBLISHED: 2018-06-23
demangle_template in cplus-dem.c in GNU libiberty, as distributed in GNU Binutils 2.30, allows attackers to trigger excessive memory consumption (aka OOM) during the "Create an array for saving the template argument values" XNEWVEC call. This can occur during execution of objdump.
CVE-2018-12699
PUBLISHED: 2018-06-23
finish_stab in stabs.c in GNU Binutils 2.30 allows attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact, as demonstrated by an out-of-bounds write of 8 bytes. This can occur during execution of objdump.
CVE-2018-12700
PUBLISHED: 2018-06-23
A Stack Exhaustion issue was discovered in debug_write_type in debug.c in GNU Binutils 2.30 because of DEBUG_KIND_INDIRECT infinite recursion.
CVE-2018-11560
PUBLISHED: 2018-06-23
The webService binary on Insteon HD IP Camera White 2864-222 devices has a stack-based Buffer Overflow leading to Control-Flow Hijacking via a crafted usr key, as demonstrated by a long remoteIp parameter to cgi-bin/CGIProxy.fcgi on port 34100.