CrowdStrike Advances Next-Generation Antivirus with Extended Ransomware Prevention as Part of Falcon Platform Spring Release

May 26, 2016

3 Min Read


Irvine, CA – May 25, 2016 – CrowdStrike Inc., a leader in cloud-delivered next-generation endpoint protection, threat intelligence and response services, today announced enhanced next-generation antivirus (AV) capabilities to its  CrowdStrike Falcon™ Platform to help customers identify and block popular ransomware families such as Locky, Cerber and Teerac, among others. The new protection is part of CrowdStrike’s Spring release of new solutions and services that also includes introducing an expanded and updated set of APIs for the Falcon Platform, along with CrowdStrike’s new open source tool, CrowdStrike Falcon Orchestrator.

When dealing with the uptick in ransomware attacks, organizations need a combination of security features to protect against new variants of ransomware that are launched faster than outmoded signature-based defenses can be updated. As part of its next-generation endpoint protection technology, CrowdStrike uses powerful machine learning algorithms and Indicators-of-Attack-based (IoA) threat prevention to identify and block not only previously unknown ransomware families, but also new and emerging script-based ransomware that do not use executable binaries to encrypt the systems of victims. CrowdStrike’s next-generation antivirus capabilities also offer complementary capabilities that include exploit blocking as well as cloud-driven anti-malware and machine learning to stop the execution and spread of ransomware.

“With today’s release of advanced next-generation antivirus features, CrowdStrike is providing the most comprehensive breach prevention platform that scales at the speed of business,” said Dmitri Alperovitch, CrowdStrike’s co-founder and chief technology officer. “Our machine learning and IoA prevention capabilities allow customers to detect and prevent threats that bypass traditional technologies such as virus definition files, whitelisting, or sandboxing.”

“CrowdStrike Falcon endpoint technology is providing a unique value to Telstra in its ability to detect and stop zero day exploits, malware attacks, along with hacker activity and ransomware, all of which go undetected by legacy security technologies,” said Mike Burgess, chief information security officer, Telstra. “Telstra relies on CrowdStrike’s combination of technology, people and intelligence to protect against the most sophisticated threats and help keep our customers’ data safe and networks secure. CrowdStrike Falcon’s next-generation threat protection capabilities, its DVR-like endpoint detection and response features, aided by the elite Falcon Overwatch managed hunting team, has proved its value to us time and again.”

Supporting Content Resources

  • Blog by George Kurtz on the Spring Product Launch

  • Click here for more information on CrowdStrike’s Next Gen AV Ransomware Protection

About CrowdStrike

CrowdStrike is the leader in next-generation endpoint protection, threat intelligence and response services. CrowdStrike’s core technology, the CrowdStrike Falcon™ platform, stops breaches by preventing and responding to all types of attacks – both malware and malware-free.  CrowdStrike has revolutionized endpoint protection by combining three crucial elements: next-generation AV, endpoint detection and response (EDR), and a 24/7 managed hunting service — all powered by intelligence and uniquely delivered via the cloud in a single integrated solution. Falcon uses the patent-pending CrowdStrike Threat Graph™ to analyze and correlate billions of events in real time, providing complete protection and five-second visibility across all endpoints. Many of the world’s largest organizations already put their trust in CrowdStrike, including three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies. CrowdStrike Falcon is currently deployed in more than 170 countries.

We Stop Breaches. Learn more:

Follow us: Blog | Twitter

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like

More Insights