CrowdStrike Asset Graph helps organizations proactively identify and eliminate attack surface blind spots. It provides a unique view of resources in an IT environment to optimize cyber defense strategies and manage risk.
CrowdStrike Holdings, Inc., a leading provider of cloud-based protection for endpoints, workloads, identity and data, has introduced CrowdStrike Asset Graph. It's a new graph database powered by CrowdStrike Security Cloud that gives IT and security leaders a 360-degree view of all assets (both managed and unmanaged) and a unique insight into the device attack surface, users, accounts, applications, cloud workloads, operational technology (OT) and more to simplify IT operations and prevent security breaches.
Accelerated digital change
In view of the accelerated digital change in companies, their attack surface is also increasing exponentially. This also increases the risk of an attack from actors who discover and exploit these soft targets and vulnerabilities, sometimes faster than IT and security teams can detect them. Visibility is one of the core principles of cybersecurity. After all, you can't protect and defend resources you don't know exist. This, in turn, creates a race between attackers and enterprise IT and security teams to find these blind spots. According to a 2022 Enterprise Strategy Group (ESG) report, “69% of organizations have experienced a cyberattack where the attack itself began by exploiting an unknown, unmanaged or poorly managed internet asset.”
CrowdStrike Asset Graph solves this problem by dynamically monitoring and tracking the complex interactions between assets, providing a single, holistic view of the risks posed by those assets. While other solutions merely provide a list of assets without context, Asset Graph graphically visualizes the relationships between all assets such as devices, users, accounts, applications, cloud workloads and OT, along with the comprehensive context needed for proper security hygiene and a proactive Security management is required to reduce risk in the enterprise.
Bridging the gap between IT operations and security
The CrowdStrike Falcon platform is purpose-built with a cloud-native architecture to leverage massive amounts of highly trusted security and enterprise data and deliver solutions through a single, lightweight agent to keep customers one step ahead of today's sophisticated attackers.
CrowdStrike's innovative graph technologies, rooted in the renowned Threat Graph, create a powerful, seamless and distributed data fabric connected into a single cloud - the Security Cloud - powering the Falcon platform and CrowdStrike's industry-leading solutions. Using a combination of artificial intelligence (AI) and behavioral pattern matching techniques to correlate and contextualize information across the vast data structure, CrowdStrike's graphs offer an approach to solving the biggest problems customers face. With the newly launched Asset Graph, CrowdStrike is taking the same approach to solve its customers' toughest unsolved challenges with proactive security and unparalleled IT visibility and risk management in mind.
The following three graph technologies form the basis of the Falcon platform
- Threat Graph: CrowdStrike's industry-leading Threat Graph leverages trillions of security data points from millions of sensors, enriched with threat intelligence and third-party sources, to identify and correlate threat activity to ensure complete visibility into attacks and threats automatically and in real-time for prevent CrowdStrike's global customer base.
- Intel Graph: By analyzing and correlating massive amounts of data about attackers, their victims, and their tools, Intel Graph provides unique insights into shifting tactics and techniques, complementing CrowdStrike's attacker-centric approach with best-in-class threat intelligence.
- Asset Graph: In this release, CrowdStrike solves one of today's most complex customer problems: Accurately identifying assets, identities and configurations across all systems - including cloud, on-premises, mobile, Internet of Things (IoT) and others - and linking them into shape of a graph. Unifying and contextualizing this information will lead to powerful new solutions that will transform the way organizations implement security hygiene and dynamically manage their security posture.
CrowdStrike Asset Graph enables new Falcon modules and capabilities to define, monitor and explore relationships between assets within an organization.
More at Crowdstrike.com
About CrowdStrike CrowdStrike Inc., a global leader in cybersecurity, is redefining security in the cloud age with its completely redesigned platform for protecting workloads and devices. The lean single-agent architecture of the CrowdStrike Falcon® platform uses cloud-scaled artificial intelligence and ensures protection and transparency across the company. This prevents attacks on end devices both inside and outside the network. With the help of the company's own CrowdStrike Threat Graph®, CrowdStrike Falcon correlates around 1 trillion endpoint-related events worldwide every day and in real time. This makes the CrowdStrike Falcon platform one of the world's most advanced data platforms for cybersecurity.