Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

2/8/2019
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CrowdStrike Opens Endpoint Protection Platform to Third-party Applications

The CrowdStrike Store delivers single-cloud experience to the security industry to improve the security stack and threat protection.

Sunnyvale, CA — CrowdStrike® Inc. today announced the availability of The CrowdStrike Store, a cloud-native security solution that opens the CrowdStrike Falcon® platform to third-party applications, enabling a single-agent, single-cloud ecosystem experience. The CrowdStrike Store allows customers to discover, try, buy, and deploy trusted partner applications and add-ons alongside the Falcon platform, without having to deploy additional agents or manage other infrastructures. Through the CrowdStrike Store, security technology providers can bring innovation and new capabilities to market faster without the headaches of having to build, maintain and support endpoint agents and cloud platforms.

For years, new deployments, agents and platforms were required to tackle each unique cybersecurity challenge. The CrowdStrike Store introduces a unified security cloud ecosystem of trusted applications, granting organizations the benefits of agent consolidation while providing a choice of vendors and security technologies managed by a single cloud platform.

The CrowdStrike Store leverages the power of the security cloud for both scale and telemetry, enabling applications to deliver faster, smarter, and more effective solutions. At the same time, existing CrowdStrike customers will be able to seamlessly access and deploy vetted third-party applications. Applications are categorized and tiered within the CrowdStrike Store. CrowdStrike is also providing customers free trials of Falcon applications within this ecosystem.

"We built the CrowdStrike Store to revolutionize the enterprise security experience for our customers through the speed and efficacy of the CrowdStrike Falcon platform. The CrowdStrike security cloud platform is a holistic ecosystem of leading tools and applications that enable customers to better architect their security stack and seamlessly deploy and manage new resources — all through the Falcon platform," said George Kurtz, chief executive officer and co-founder of CrowdStrike.

Through the CrowdStrike Store, trusted partners are able to efficiently market their applications and add-ons to Falcon customers through a singular user interface, accelerating time-to-value and uncovering new business opportunities.

"Organizations rely on mission-critical applications to run their business efficiently, and often they are inadequately secured," said Sameer Malhotra, chief executive officer at TrueFort. "TrueFort’s strategic partnership with CrowdStrike leverages the power of the CrowdStrike Falcon platform to offer our joint customers rapid discovery and mapping of enterprise applications, understand application behavior, alert on anomalies, alert on indicators of insider or persistent threats, and implement network micro-segmentation via the TrueFort application, all without requiring any additional agent or deployments."

The CrowdStrike Falcon platform unifies next-generation antivirus (AV), IT Hygiene, endpoint detection and response (EDR), threat intelligence, and managed hunting. CrowdStrike’s open API platform model allows for various integrations, tools, and services to be deployed and run seamlessly.

Learn more: https://www.crowdstrike.com/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
7 Truths About BEC Scams
Ericka Chickowski, Contributing Writer,  6/13/2019
DNS Firewalls Could Prevent Billions in Losses to Cybercrime
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/13/2019
Cognitive Bias Can Hamper Security Decisions
Kelly Sheridan, Staff Editor, Dark Reading,  6/10/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12855
PUBLISHED: 2019-06-16
In words.protocols.jabber.xmlstream in Twisted through 19.2.1, XMPP support did not verify certificates when used with TLS, allowing an attacker to MITM connections.
CVE-2013-7472
PUBLISHED: 2019-06-15
The "Count per Day" plugin before 3.2.6 for WordPress allows XSS via the wp-admin/?page=cpd_metaboxes daytoshow parameter.
CVE-2019-12839
PUBLISHED: 2019-06-15
In OrangeHRM 4.3.1 and before, there is an input validation error within admin/listMailConfiguration (txtSendmailPath parameter) that allows authenticated attackers to achieve arbitrary command execution.
CVE-2019-12840
PUBLISHED: 2019-06-15
In Webmin through 1.910, any user authorized to the "Package Updates" module can execute arbitrary commands with root privileges via the data parameter to update.cgi.
CVE-2019-12835
PUBLISHED: 2019-06-15
formats/xml.cpp in Leanify 0.4.3 allows for a controlled out-of-bounds write in xml_memory_writer::write via characters that require escaping.