Falcon platform with External Attack Surface Management technology

Falcon platform with External Attack Surface Management technology

Share post

The Falcon platform will be expanded to include attacker-centric EASM (External Attack Surface Management) technology. The platform of CrowdStrike, a leading provider of cloud-based protection for endpoints, cloud workloads, identity and data, announced the expansion.

It offers further information about attackers and is used to identify exposed assets on the Internet. CrowdStrike Falcon Surface is powered by technology from Reposify, a company recently acquired by CrowdStrike, and is available as a standalone module on the CrowdStrike Falcon platform.

EASM rethought

Traditional security solutions are designed to give organizations visibility into the risk potential of internal attack surfaces, leading to severe blind spots to external attack surfaces. According to a study by the Enterprise Strategy Group (ESG), only 9 percent of companies monitor 100 percent of their attack surface. CrowdStrike Falcon Surface redefines EASM by enabling organizations to understand the external attack surface from an attacker's perspective, based on CrowdStrike's industry-leading threat intelligence.

CrowdStrike Falcon Surface uses proprietary technology to scan the entire Internet 24/7 to identify known and unknown assets at risk based on domain addresses alone. The high level of data accuracy with advanced assignment methods and quickly applicable solution steps further characterize the module.

CrowdStrike Falcon Surface enables the following

  • Understand the external attack surface: Gain ongoing visibility into your organization's exposed assets and security posture. Thanks to an inventory that is always up-to-date, you can keep track of all changes.
  • Gain Tailored Insights: Stay informed about exposures and security issues that are flagged and prioritized for your organization so you know what to address first. Customizable alerts are sent directly to your inbox or the system of your choice.
  • Review and remediate issues: Create an action plan with CrowdStrike Falcon Surface's optimizer, which automatically suggests remediation actions to quickly mitigate the risks that have the greatest impact on your security posture.

Augmenting the CrowdStrike Falcon platform with EASM

With the launch of CrowdStrike Falcon Surface, CrowdStrike will also integrate EASM technology across the CrowdStrike Falcon platform - starting with the industry-leading Threat Intelligence and Security & IT Operations product line. This CrowdStrike Falcon Surface integration enables organizations to:

  • Gain advanced visibility into external attacker activity with CrowdStrike Falcon Intelligence Recon: Stay one step ahead of attackers by monitoring cybercriminal activity with CrowdStrike's Digital Risk Protection module and correlating this threat intelligence with external attack surface data to provide proactively protect high-risk, exposed assets.
  • Reduce security risk with CrowdStrike Falcon Discover and CrowdStrike Falcon Spotlight: Get a 360-degree view of your organization's attack surface and exposure, both from the outside and inside, with integrations to IT hygiene and vulnerability management modules by CrowdStrike.
More at CrowdStrike.com

 


About CrowdStrike

CrowdStrike Inc., a global leader in cybersecurity, is redefining security in the cloud age with its completely redesigned platform for protecting workloads and devices. The lean single-agent architecture of the CrowdStrike Falcon® platform uses cloud-scaled artificial intelligence and ensures protection and transparency across the company. This prevents attacks on end devices both inside and outside the network. With the help of the company's own CrowdStrike Threat Graph®, CrowdStrike Falcon correlates around 1 trillion endpoint-related events worldwide every day and in real time. This makes the CrowdStrike Falcon platform one of the world's most advanced data platforms for cybersecurity.


 

Matching articles on the topic

Cybersecurity platform with protection for 5G environments

Cybersecurity specialist Trend Micro unveils its platform-based approach to protecting organizations' ever-expanding attack surface, including securing ➡ Read more

Data manipulation, the underestimated danger

Every year, World Backup Day on March 31st serves as a reminder of the importance of up-to-date and easily accessible backups ➡ Read more

Printers as a security risk

Corporate printer fleets are increasingly becoming a blind spot and pose enormous problems for their efficiency and security. ➡ Read more

The AI ​​Act and its consequences for data protection

With the AI ​​Act, the first law for AI has been approved and gives manufacturers of AI applications between six months and ➡ Read more

Windows operating systems: Almost two million computers at risk

There are no longer any updates for the Windows 7 and 8 operating systems. This means open security gaps and therefore worthwhile and ➡ Read more

AI on Enterprise Storage fights ransomware in real time

NetApp is one of the first to integrate artificial intelligence (AI) and machine learning (ML) directly into primary storage to combat ransomware ➡ Read more

DSPM product suite for Zero Trust Data Security

Data Security Posture Management – ​​DSPM for short – is crucial for companies to ensure cyber resilience against the multitude ➡ Read more

Data encryption: More security on cloud platforms

Online platforms are often the target of cyberattacks, such as Trello recently. 5 tips ensure more effective data encryption in the cloud ➡ Read more