CrowdStrike: Zero Trust support on macOS and Linux

Share post

CrowdStrike Falcon ZTA helps organizations implement a holistic cybersecurity approach to protect data and users from supply chain attacks, ransomware and wormable exploits. CrowdStrike extends Zero Trust support to macOS and Linux, enabling cross-platform protection.

CrowdStrike Inc., a leading provider of cloud-based endpoint, workload, identity and data protection, announced that Zero Trust Assessment is now available for macOS and Linux. With this, CrowdStrike extends its comprehensive protection to all platforms with an identity- and data-centric approach. Additionally, CrowdStrike announced new Zero Trust partner integrations with Airgap, Appgate, CyberArk, TruU, and Twingate, all of which will leverage CrowdStrike's Falcon Zero Trust Assessment (ZTA) to help joint customers reduce their attack surface and advance their Zero Trust journey simplify, support and accelerate. This expands CrowdStrike's Zero Trust partner ecosystem, which already includes Akamai, Cloudflare, Google Cloud, Netskope, Okta, and Zscaler.

Zero trust beyond authentication

CrowdStrike Falcon ZTA extends Zero Trust beyond authentication, enabling detection, alerting, and enforcement of risk-based access policies driven by device health and compliance checks. With new support for macOS and Linux, CrowdStrike Falcon ZTA provides visibility into all endpoints, across all operating platforms in an organization. CrowdStrike Falcon ZTA monitors more than 120 different endpoint settings—including sensor health, applied CrowdStrike policies, and native operating system security settings—and provides key partners with a risk score to help them create powerful and granular security policies. Customers receive actionable reports through the CrowdStrike Falcon console and APIs to ensure the highest level of device security is maintained.

“Enterprises have recognized the importance of zero trust, but are struggling to implement it broadly in heterogeneous environments while leveraging existing security investments. We see tremendous opportunity in automatically sharing endpoint risk analytics with partners in real-time to eliminate manual workflows, reduce friction, and maintain a holistic approach to cybersecurity with solutions that meet their unique needs,” said Amol Kulkarni, Chief Product Officer at CrowdStrike. "By leveraging the power of the CrowdStrike Falcon platform with additional OS support, customers can simplify their Zero Trust implementation across their enterprise."

Zero Trust implementation across the enterprise

CrowdStrike Falcon ZTA works with best-of-breed platforms to provide customers with a wide range of options that tightly integrate with their existing security system and ensure continuous and dynamic assessment of device status regardless of location, network and user. The latest partner integrations with CrowdStrike Falcon ZTA are available natively in the partner products to streamline operations and simplify management:

  • Google Cloud's BeyondCorp Enterprise to provide real-time protection from untrusted or compromised hosts. This integration enables access policies and access decisions based on a health assessment and provides comprehensive protection for data, applications and cloud resources, reducing risk for businesses and users.
  • Netskope to share threat telemetry, including IOCs, between the cloud and endpoints and support malware detection with enhanced, actionable, real-time threat forensics.
  • Okta to unify insights from user and device states to assess enrollment risks and give teams real-time visibility so they can make confident access decisions.

The continued expansion of the CrowdStrike Zero Trust partner ecosystem enables seamless integrations that reduce complexity and exposure by giving customers the flexibility to better tune alerts or access data at the device, IP, or application level block and manage firewall policies and dynamically adjust access permissions based on threat assessments.

More at CrowdStrike.com

 


About CrowdStrike

CrowdStrike Inc., a global leader in cybersecurity, is redefining security in the cloud age with its completely redesigned platform for protecting workloads and devices. The lean single-agent architecture of the CrowdStrike Falcon® platform uses cloud-scaled artificial intelligence and ensures protection and transparency across the company. This prevents attacks on end devices both inside and outside the network. With the help of the company's own CrowdStrike Threat Graph®, CrowdStrike Falcon correlates around 1 trillion endpoint-related events worldwide every day and in real time. This makes the CrowdStrike Falcon platform one of the world's most advanced data platforms for cybersecurity.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more