CrowdStrike Introduces Tools to Combat Threats to Cloud-Native Applications

We’re excited to bring Transform 2022 back to users on July 19 and July 20-28. Join AI and knowledge leaders for in-depth discussions and exciting networking opportunities. Sign up today!

CrowdStrike has introduced new features for its adversary-centric cloud-native application coverage platform (CNAPP). These developments shorten the time it takes to respond to risks in cloud environments and workloads by accelerating the search for risks.

CrowdStrike specializes in cloud endpoint protection, identity, and insight for cloud workloads. CrowdStrike Security Cloud and world-class artificial intelligence run on the CrowdStrike Falcon platform. This platform uses real-time attack indicators, risk intelligence, the progression of harsh advertising devices, and rich telemetry across the enterprise to enable ultra-accurate detections, automated coverage and remediation, elite risk search, and vulnerability precedence visibility.

The Falcon platform, specially designed in the cloud with a unique lightweight agent architecture, is designed to facilitate fast and flexible configuration, improve security and efficiency, simple deployment, and faster return on investment.

Introduced on the Falcon platform, CNPP’s new adversary-centric features combine two of CrowdStrike’s cloud responses into a shared cloud activity dashboard. The popular Agentless Falcon Horizon called Cloud Security Posture Management (CSPM) and Falcon Cloud Workload Protection (CWP) modules.

Built for security and progression groups that prioritize the most critical cloud security issues, address execution risks, and enable cloud risk search, the updates also come with new tactics to leverage Falcon Fusion (CrowdStrike’s SOAR framework) to automate Amazon Web Services (AWS) remediation. ); New Traditional Misconfiguration Signals (IOM) for AWS, Google Cloud Platform (GCP), and Microsoft Azure New tactics to avoid identity-based risks and more.

Organizations using multi-cloud environments and hybrid work models have broken down the boundaries of classic work. Developers move clouds up and down in minutes and notice any possible misalignment.

Similarly, public cloud times are made for quick use without the use of MFA (multi-factor authentication) or other security procedures. An attacker can exploit a security flaw in less than a moment and release a fast-looking breach. Before a malicious actor adapts to them, corporations want to think like attackers.

Recently named Strong Performer in The Forrester Wave, CrowdStrike addresses this desire with cnapp’s adversary-centric approach, which is based on the most advanced risk intelligence.

“CrowdStrike stands out from other vendors in the market because we offer agent- and agentless solutions, offering organizations complete visibility, detection and remediation capabilities for their cloud infrastructure,” said Amol Kulkarni, director of product and engineering at CrowdStrike.

According to Kulkarni, CrowdStrike also provides breach coverage for cloud, container, and Kubernetes workloads. The company does this for corporations with hybrid and multi-cloud infrastructures, providing them with real-time alerts and reports on more than 150 cloud risks. CrowdStrike’s adversary CNAPP-centric technology, which is based on state-of-the-art risk intelligence, ensures that businesses are well prepared to protect against cloud breaches.

Dave Worthington, general manager of virtual security and threats at Jemena, said CrowdStrike’s CNPP provides deep and accurate insight into the cloud threat landscape. That, he said, sets CrowdStrike apart from the competition.

“CrowdStrike’s cloud security services, like Falcon Horizon, which we use to monitor our cloud environment and stumble upon misconfigurations, vulnerabilities and security threats, are evolving and improving, which is one of the biggest benefits I’ve seen,” Worthington said. .

Jason Waits, director of cybersecurity at Inductive Automation, also believes that expanding the Falcon platform to allow CNPP to provide comprehensive cloud security with threat hunting features that no other vendor can replicate.

“The functionality of CrowdStrike surprises us because of its minimal CPU usage and its relatively low effect on the overall functionality of the formula. We can reduce security blind spots with Falcon Horizon by frequently tracking our cloud environment for misconfigurations,” waits said.

Cloud Activity Dashboard: Combines Falcon Horizon CSPM with Falcon CWP workload coverage in a single user interface. This enables faster assessment and reaction through prioritizing critical issues, addressing execution risks, and enabling risk search in the cloud.

Custom Misconfiguration Indicators (IOM) for AWS, Azure, and GCP: Ensures that security is a component of each and every cloud deployment, with traditional policies that align with your organization’s goals.

Identity Access Analyzer for Azure: Protects against identity threats. It also ensures that permissions are applied with least privileges for users and programs in Azure Active Directory (AD) groups. capacity.

Automated remediation workflow for AWS: Respond to threats with guided, automated remediation powered by Falcon Fusion. Workflows provide context and prescriptive direction to problems and reduce incident resolution time.

Falcon Container Detection: Protects against malware and complicated threats that target boxes with device learning (ML), synthetic intelligence (AI), attack signs (IoA), deep kernel visibility, and traditional signs of compromise (IoC), as well as behavioral blocking.

Malicious container detection: Tracks container deployments and decommissioning. It detects and analyzes malicious photographs and also identifies and prevents the creation of privileged or write containers, which can be used as access issues for attacks.

VentureBeat’s project is to become a virtual public position for technical decision makers to gain insight into transformative generation and complete transactions. Learn more about membership.

Leave a Comment

Your email address will not be published. Required fields are marked *