Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

2/8/2019
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CrowdStrike Opens Endpoint Protection Platform to Third-party Applications

The CrowdStrike Store delivers single-cloud experience to the security industry to improve the security stack and threat protection.

Sunnyvale, CA — CrowdStrike® Inc. today announced the availability of The CrowdStrike Store, a cloud-native security solution that opens the CrowdStrike Falcon® platform to third-party applications, enabling a single-agent, single-cloud ecosystem experience. The CrowdStrike Store allows customers to discover, try, buy, and deploy trusted partner applications and add-ons alongside the Falcon platform, without having to deploy additional agents or manage other infrastructures. Through the CrowdStrike Store, security technology providers can bring innovation and new capabilities to market faster without the headaches of having to build, maintain and support endpoint agents and cloud platforms.

For years, new deployments, agents and platforms were required to tackle each unique cybersecurity challenge. The CrowdStrike Store introduces a unified security cloud ecosystem of trusted applications, granting organizations the benefits of agent consolidation while providing a choice of vendors and security technologies managed by a single cloud platform.

The CrowdStrike Store leverages the power of the security cloud for both scale and telemetry, enabling applications to deliver faster, smarter, and more effective solutions. At the same time, existing CrowdStrike customers will be able to seamlessly access and deploy vetted third-party applications. Applications are categorized and tiered within the CrowdStrike Store. CrowdStrike is also providing customers free trials of Falcon applications within this ecosystem.

"We built the CrowdStrike Store to revolutionize the enterprise security experience for our customers through the speed and efficacy of the CrowdStrike Falcon platform. The CrowdStrike security cloud platform is a holistic ecosystem of leading tools and applications that enable customers to better architect their security stack and seamlessly deploy and manage new resources — all through the Falcon platform," said George Kurtz, chief executive officer and co-founder of CrowdStrike.

Through the CrowdStrike Store, trusted partners are able to efficiently market their applications and add-ons to Falcon customers through a singular user interface, accelerating time-to-value and uncovering new business opportunities.

"Organizations rely on mission-critical applications to run their business efficiently, and often they are inadequately secured," said Sameer Malhotra, chief executive officer at TrueFort. "TrueFort’s strategic partnership with CrowdStrike leverages the power of the CrowdStrike Falcon platform to offer our joint customers rapid discovery and mapping of enterprise applications, understand application behavior, alert on anomalies, alert on indicators of insider or persistent threats, and implement network micro-segmentation via the TrueFort application, all without requiring any additional agent or deployments."

The CrowdStrike Falcon platform unifies next-generation antivirus (AV), IT Hygiene, endpoint detection and response (EDR), threat intelligence, and managed hunting. CrowdStrike’s open API platform model allows for various integrations, tools, and services to be deployed and run seamlessly.

Learn more: https://www.crowdstrike.com/

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3331
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).