Cloud

2/8/2019
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CrowdStrike Opens Endpoint Protection Platform to Third-party Applications

The CrowdStrike Store delivers single-cloud experience to the security industry to improve the security stack and threat protection.

Sunnyvale, CA — CrowdStrike® Inc. today announced the availability of The CrowdStrike Store, a cloud-native security solution that opens the CrowdStrike Falcon® platform to third-party applications, enabling a single-agent, single-cloud ecosystem experience. The CrowdStrike Store allows customers to discover, try, buy, and deploy trusted partner applications and add-ons alongside the Falcon platform, without having to deploy additional agents or manage other infrastructures. Through the CrowdStrike Store, security technology providers can bring innovation and new capabilities to market faster without the headaches of having to build, maintain and support endpoint agents and cloud platforms.

For years, new deployments, agents and platforms were required to tackle each unique cybersecurity challenge. The CrowdStrike Store introduces a unified security cloud ecosystem of trusted applications, granting organizations the benefits of agent consolidation while providing a choice of vendors and security technologies managed by a single cloud platform.

The CrowdStrike Store leverages the power of the security cloud for both scale and telemetry, enabling applications to deliver faster, smarter, and more effective solutions. At the same time, existing CrowdStrike customers will be able to seamlessly access and deploy vetted third-party applications. Applications are categorized and tiered within the CrowdStrike Store. CrowdStrike is also providing customers free trials of Falcon applications within this ecosystem.

"We built the CrowdStrike Store to revolutionize the enterprise security experience for our customers through the speed and efficacy of the CrowdStrike Falcon platform. The CrowdStrike security cloud platform is a holistic ecosystem of leading tools and applications that enable customers to better architect their security stack and seamlessly deploy and manage new resources — all through the Falcon platform," said George Kurtz, chief executive officer and co-founder of CrowdStrike.

Through the CrowdStrike Store, trusted partners are able to efficiently market their applications and add-ons to Falcon customers through a singular user interface, accelerating time-to-value and uncovering new business opportunities.

"Organizations rely on mission-critical applications to run their business efficiently, and often they are inadequately secured," said Sameer Malhotra, chief executive officer at TrueFort. "TrueFort’s strategic partnership with CrowdStrike leverages the power of the CrowdStrike Falcon platform to offer our joint customers rapid discovery and mapping of enterprise applications, understand application behavior, alert on anomalies, alert on indicators of insider or persistent threats, and implement network micro-segmentation via the TrueFort application, all without requiring any additional agent or deployments."

The CrowdStrike Falcon platform unifies next-generation antivirus (AV), IT Hygiene, endpoint detection and response (EDR), threat intelligence, and managed hunting. CrowdStrike’s open API platform model allows for various integrations, tools, and services to be deployed and run seamlessly.

Learn more: https://www.crowdstrike.com/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
New Free Tool Scans for Chrome Extension Safety
Dark Reading Staff 2/21/2019
Making the Case for a Cybersecurity Moon Shot
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  2/19/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
How Enterprises Are Attacking the Cybersecurity Problem
How Enterprises Are Attacking the Cybersecurity Problem
Data breach fears and the need to comply with regulations such as GDPR are two major drivers increased spending on security products and technologies. But other factors are contributing to the trend as well. Find out more about how enterprises are attacking the cybersecurity problem by reading our report today.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6485
PUBLISHED: 2019-02-22
Citrix NetScaler Gateway 12.1 before build 50.31, 12.0 before build 60.9, 11.1 before build 60.14, 11.0 before build 72.17, and 10.5 before build 69.5 and Application Delivery Controller (ADC) 12.1 before build 50.31, 12.0 before build 60.9, 11.1 before build 60.14, 11.0 before build 72.17, and 10.5...
CVE-2019-9020
PUBLISHED: 2019-02-22
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc...
CVE-2019-9021
PUBLISHED: 2019-02-22
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file...
CVE-2019-9022
PUBLISHED: 2019-02-22
An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parser...
CVE-2019-9023
PUBLISHED: 2019-02-22
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcom...