Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

2/8/2019
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CrowdStrike Opens Endpoint Protection Platform to Third-party Applications

The CrowdStrike Store delivers single-cloud experience to the security industry to improve the security stack and threat protection.

Sunnyvale, CA — CrowdStrike® Inc. today announced the availability of The CrowdStrike Store, a cloud-native security solution that opens the CrowdStrike Falcon® platform to third-party applications, enabling a single-agent, single-cloud ecosystem experience. The CrowdStrike Store allows customers to discover, try, buy, and deploy trusted partner applications and add-ons alongside the Falcon platform, without having to deploy additional agents or manage other infrastructures. Through the CrowdStrike Store, security technology providers can bring innovation and new capabilities to market faster without the headaches of having to build, maintain and support endpoint agents and cloud platforms.

For years, new deployments, agents and platforms were required to tackle each unique cybersecurity challenge. The CrowdStrike Store introduces a unified security cloud ecosystem of trusted applications, granting organizations the benefits of agent consolidation while providing a choice of vendors and security technologies managed by a single cloud platform.

The CrowdStrike Store leverages the power of the security cloud for both scale and telemetry, enabling applications to deliver faster, smarter, and more effective solutions. At the same time, existing CrowdStrike customers will be able to seamlessly access and deploy vetted third-party applications. Applications are categorized and tiered within the CrowdStrike Store. CrowdStrike is also providing customers free trials of Falcon applications within this ecosystem.

"We built the CrowdStrike Store to revolutionize the enterprise security experience for our customers through the speed and efficacy of the CrowdStrike Falcon platform. The CrowdStrike security cloud platform is a holistic ecosystem of leading tools and applications that enable customers to better architect their security stack and seamlessly deploy and manage new resources — all through the Falcon platform," said George Kurtz, chief executive officer and co-founder of CrowdStrike.

Through the CrowdStrike Store, trusted partners are able to efficiently market their applications and add-ons to Falcon customers through a singular user interface, accelerating time-to-value and uncovering new business opportunities.

"Organizations rely on mission-critical applications to run their business efficiently, and often they are inadequately secured," said Sameer Malhotra, chief executive officer at TrueFort. "TrueFort’s strategic partnership with CrowdStrike leverages the power of the CrowdStrike Falcon platform to offer our joint customers rapid discovery and mapping of enterprise applications, understand application behavior, alert on anomalies, alert on indicators of insider or persistent threats, and implement network micro-segmentation via the TrueFort application, all without requiring any additional agent or deployments."

The CrowdStrike Falcon platform unifies next-generation antivirus (AV), IT Hygiene, endpoint detection and response (EDR), threat intelligence, and managed hunting. CrowdStrike’s open API platform model allows for various integrations, tools, and services to be deployed and run seamlessly.

Learn more: https://www.crowdstrike.com/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Unreasonable Security Best Practices vs. Good Risk Management
Jack Freund, Director, Risk Science at RiskLens,  11/13/2019
Breaches Are Inevitable, So Embrace the Chaos
Ariel Zeitlin, Chief Technology Officer & Co-Founder, Guardicore,  11/13/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2016-5285
PUBLISHED: 2019-11-15
Null pointer dereference vulnerability exists in K11_SignWithSymKey / ssl3_ComputeRecordMACConstantTime in NSS before 3.26, which causes the TLS/SSL server using NSS to crash.
CVE-2009-5047
PUBLISHED: 2019-11-15
Jetty 6.x before 6.1.22 suffers from an escape sequence injection vulnerability from two different vectors: 1) "Cookie Dump Servlet" and 2) Http Content-Length header. 1) A POST request to the form at "/test/cookie/" with the "Age" parameter set to a string throws a &qu...
CVE-2013-4584
PUBLISHED: 2019-11-15
Perdition before 2.2 may have weak security when handling outbound connections, caused by an error in the STARTTLS IMAP and POP server. ssl_outgoing_ciphers not being applied to STARTTLS connections
CVE-2013-7087
PUBLISHED: 2019-11-15
ClamAV before 0.97.7 has WWPack corrupt heap memory
CVE-2013-7088
PUBLISHED: 2019-11-15
ClamAV before 0.97.7 has buffer overflow in the libclamav component