News

4/16/2018
11:31 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CrowdStrike Announces Real Time Response and Real Time Query to Help Organizations Get Back to Business Quickly After a Cyber Attack

Company enhances its endpoint detection and response (EDR) solution with Real-Time Response and Real-Time Query capabilities.

Sunnyvale, CA – April 16, 2018 – CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced the addition of Real Time Response and Real Time Query features to its Falcon Insight™ EDR solution. These new features empower incident responders with immediate access to systems across the distributed enterprise so that they can rapidly investigate incidents, take decisive action to eradicate threats with surgical precision and get back to business quickly. These new features build on the CrowdStrike Falcon platform’s ability to stop threats on endpoints by adding unparalleled ability to respond quickly and minimize costs associated with handling advanced cyber attacks.

When a cyber attack is discovered, Security Operations Center (SOC) teams have two urgent goals: to understand the threat quickly and then, take action to remediate it. According to CrowdStrike’s 2018 Global Threat Report, the average intrusion takes less than two hours to pivot from an initial point of attack toward the ultimate objective. This “breakout time” statistic shows how little time defenders have to investigate and eject the attacker from the network, before the incident escalates into a breach. Beyond its market leading prevention capabilities, CrowdStrike addresses this challenge by providing deep, direct access to all the systems they need to accomplish quick and effective remediation within the “breakout time” window.

By leveraging the existing Falcon sensor, cloud and console, CrowdStrike is able to deliver Real Time Response and Real Time Query capabilities to systems anywhere in the world, with no incremental cost in terms of performance or infrastructure. CrowdStrike Falcon’s EDR  capabilities ensure customers have comprehensive, real-time and historical visibility of everything that is executed in their environment. The Real Time Response feature adds powerful interactive capabilities, delivering instant visibility into the local file system, registry, network, and more. It also allows responders to close the door on threats by killing malicious processes and removing remaining traces left behind by the attacker. Real Time Query delivers ultimate visibility and control to responders, empowering them through custom-tailored information collection and response actions.

“With the launch of this capability, CrowdStrike is empowering SOC teams to remediate  security-related incidents faster, more effectively, and more efficiently than ever before”, says George Kurtz, CrowdStrike’s co-founder and chief executive officer. “CrowdStrike Falcon Insight Real Time Response and Real Time Query help customers be more strategic with their incident response efforts, take decisive remediation steps quickly to minimize damage from cyber incidents, while operating with full knowledge of what is happening in their environment.”

For more information about CrowdStrike’s Spring Platform launch, read a blog by George Kurtz, CrowdStrike’s CEO, here.

Visit CrowdStrike during the RSA Conference 2018 at booth #941 Moscone South to see presentations and demos and meet with our experts.

About CrowdStrike®

CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.

CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates over 100 billion security events a day from across the globe to immediately prevent and detect threats.

There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.

You can gain full access to CrowdStrike Falcon Prevent™ by starting your free trial here.

Learn more: https://www.crowdstrike.com/

Follow us: Blog | Twitter

© 2018 CrowdStrike, Inc. All rights reserved. CrowdStrike®, CrowdStrike Falcon®, CrowdStrike Threat Graph™, CrowdStrike Falcon Prevent™, Falcon Prevent™, CrowdStrike Falcon Insight™, Falcon Insight™, CrowdStrike Falcon Discover™, Falcon Discover™, CrowdStrike Falcon Intelligence™, Falcon Intelligence™, CrowdStrike Falcon DNS™, Falcon DNS™, CrowdStrike Falcon OverWatch™, Falcon OverWatch™, CrowdStrike Falcon Spotlight™ and Falcon Spotlight™ are among the trademarks of CrowdStrike, Inc. Other brands may be third-party trademarks.

Contacts

CrowdStrike, Inc.

Ilina Cashiola, 202-340-0517

[email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Microsoft, Mastercard Aim to Change Identity Management
Kelly Sheridan, Staff Editor, Dark Reading,  12/3/2018
Windows 10 Security Questions Prove Easy for Attackers to Exploit
Kelly Sheridan, Staff Editor, Dark Reading,  12/5/2018
Starwood Breach Reaction Focuses on 4-Year Dwell
Curtis Franklin Jr., Senior Editor at Dark Reading,  12/5/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: I guess this answers the question: who's watching the watchers?
Current Issue
10 Best Practices That Could Reshape Your IT Security Department
This Dark Reading Tech Digest, explores ten best practices that could reshape IT security departments.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-19980
PUBLISHED: 2018-12-08
Anker Nebula Capsule Pro NBUI_M1_V2.1.9 devices allow attackers to cause a denial of service (reboot of the underlying Android 7.1.2 operating system) via a crafted application that sends data to WifiService.
CVE-2018-19961
PUBLISHED: 2018-12-08
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because TLB flushes do not always occur after IOMMU mapping changes.
CVE-2018-19962
PUBLISHED: 2018-12-08
An issue was discovered in Xen through 4.11.x on AMD x86 platforms, possibly allowing guest OS users to gain host OS privileges because small IOMMU mappings are unsafely combined into larger ones.
CVE-2018-19963
PUBLISHED: 2018-12-08
An issue was discovered in Xen 4.11 allowing HVM guest OS users to cause a denial of service (host OS crash) or possibly gain host OS privileges because x86 IOREQ server resource accounting (for external emulators) was mishandled.
CVE-2018-19964
PUBLISHED: 2018-12-08
An issue was discovered in Xen 4.11.x allowing x86 guest OS users to cause a denial of service (host OS hang) because the p2m lock remains unavailable indefinitely in certain error conditions.