Cloud

2/8/2019
03:30 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CrowdStrike Opens Endpoint Protection Platform to Third-party Applications

The CrowdStrike Store delivers single-cloud experience to the security industry to improve the security stack and threat protection.

Sunnyvale, CA — CrowdStrike® Inc. today announced the availability of The CrowdStrike Store, a cloud-native security solution that opens the CrowdStrike Falcon® platform to third-party applications, enabling a single-agent, single-cloud ecosystem experience. The CrowdStrike Store allows customers to discover, try, buy, and deploy trusted partner applications and add-ons alongside the Falcon platform, without having to deploy additional agents or manage other infrastructures. Through the CrowdStrike Store, security technology providers can bring innovation and new capabilities to market faster without the headaches of having to build, maintain and support endpoint agents and cloud platforms.

For years, new deployments, agents and platforms were required to tackle each unique cybersecurity challenge. The CrowdStrike Store introduces a unified security cloud ecosystem of trusted applications, granting organizations the benefits of agent consolidation while providing a choice of vendors and security technologies managed by a single cloud platform.

The CrowdStrike Store leverages the power of the security cloud for both scale and telemetry, enabling applications to deliver faster, smarter, and more effective solutions. At the same time, existing CrowdStrike customers will be able to seamlessly access and deploy vetted third-party applications. Applications are categorized and tiered within the CrowdStrike Store. CrowdStrike is also providing customers free trials of Falcon applications within this ecosystem.

"We built the CrowdStrike Store to revolutionize the enterprise security experience for our customers through the speed and efficacy of the CrowdStrike Falcon platform. The CrowdStrike security cloud platform is a holistic ecosystem of leading tools and applications that enable customers to better architect their security stack and seamlessly deploy and manage new resources — all through the Falcon platform," said George Kurtz, chief executive officer and co-founder of CrowdStrike.

Through the CrowdStrike Store, trusted partners are able to efficiently market their applications and add-ons to Falcon customers through a singular user interface, accelerating time-to-value and uncovering new business opportunities.

"Organizations rely on mission-critical applications to run their business efficiently, and often they are inadequately secured," said Sameer Malhotra, chief executive officer at TrueFort. "TrueFort’s strategic partnership with CrowdStrike leverages the power of the CrowdStrike Falcon platform to offer our joint customers rapid discovery and mapping of enterprise applications, understand application behavior, alert on anomalies, alert on indicators of insider or persistent threats, and implement network micro-segmentation via the TrueFort application, all without requiring any additional agent or deployments."

The CrowdStrike Falcon platform unifies next-generation antivirus (AV), IT Hygiene, endpoint detection and response (EDR), threat intelligence, and managed hunting. CrowdStrike’s open API platform model allows for various integrations, tools, and services to be deployed and run seamlessly.

Learn more: https://www.crowdstrike.com/

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Russia Hacked Clinton's Computers Five Hours After Trump's Call
Robert Lemos, Technology Journalist/Data Researcher,  4/19/2019
Why We Need a 'Cleaner Internet'
Darren Anstee, Chief Technology Officer at Arbor Networks,  4/19/2019
4 Tips to Protect Your Business Against Social Media Mistakes
Guy Bunker, CTO of Clearswift,  4/22/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-16558
PUBLISHED: 2019-04-25
Contao 3.0.0 to 3.5.30 and 4.0.0 to 4.4.7 contains an SQL injection vulnerability in the back end as well as in the listing module.
CVE-2018-18369
PUBLISHED: 2019-04-25
Norton Security (Windows client) prior to 22.16.3 and SEP SBE (Windows client) prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22 & SEP-12.1.7484.7002, may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for executi...
CVE-2018-19442
PUBLISHED: 2019-04-25
A Buffer Overflow in Network::AuthenticationClient::VerifySignature in /bin/astro in Neato Botvac Connected 2.2.0 allows a remote attacker to execute arbitrary code with root privileges via a crafted POST request to a nucleo.neatocloud.com:4443/vendors/neato/robots/[robot_serial]/messages Neato clou...
CVE-2019-9135
PUBLISHED: 2019-04-25
DaviewIndy 8.98.7 and earlier versions have a Heap-based overflow vulnerability, triggered when the user opens a specific file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution. .
CVE-2019-9136
PUBLISHED: 2019-04-25
DaviewIndy 8.98.7 and earlier versions have a Heap-based overflow vulnerability, triggered when the user opens a malformed JPEG2000 format file that is mishandled by Daview.exe. Attackers could exploit this and arbitrary code execution.