AUSTIN, Texas and SAN FRANCISCO-(WIRE OF BUSINESS)-CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workload, identity and data, today introduced the CrowdStrike Asset Graph, a new graph database powered by the CrowdStrike Security Cloud that provides of IT and security leaders a 360-degree view of all assets (both managed and unmanaged) along with unprecedented visibility on their attack surface across devices, users, accounts, applications, cloud workload, operational technology (OT) and more to simplify IT operations and stop violations.
As organizations accelerate their digital transformation, they are expanding their attack drastically. This has dramatically increased their risk of exposure to adversaries who detect and exploit these soft targets and vulnerabilities faster than IT and security teams can discover them. Visibility is one of the core principles of cybersecurity because you can’t secure and defend assets that you didn’t know existed. This, in turn, creates a race between competitors and the company’s IT and security teams to find these blind spots. According to a 2022 report from the Enterprise Strategy Group (ESG), 69% of organizations have experienced a cyberattack where the attack itself began by exploiting an unknown, unmanaged, or unmanaged asset. facing the internet. ”
The CrowdStrike Asset Graph solves this problem by dynamically tracking and tracing complex interactions between assets, providing a holistic view of the risks posed by those assets. While other solutions only provide a list of assets without context, Asset Graph provides graphic visualizations of relationships between all assets such as devices, users, accounts, applications, cloud workload and OT, along with the rich context necessary for proper security hygiene and proactive management of security posture to reduce risk to their organizations.
“Digital innovation has led to an even and clear acceleration of security change in modern business. For the companies furthest along this journey, IT operations and security teams – which are sometimes distinct loops – converge. , which creates a more proactive posture when it comes to security and risk management, ”said Amol Kulkarni, chief product and engineering officer at CrowdStrike. “Specifically developed to address this new dynamic, the CrowdStrike Asset Graph allows organizations to see the assets they have and how they interact with each other, helping them make smart risk -based decisions – from security to IT performance, utilization, capacity, license management and more – to actively protect and manage their IT environment. ”
Bridging the gap between IT operations and security
The CrowdStrike Falcon platform is specifically built using cloud-native architecture to leverage a wealth of high-fidelity security and enterprise data, and deliver solutions through a single, lightweight agent to keep customers ahead of the curve. sophisticated opponents today.
CrowdStrike’s groundbreaking graph technologies, started with the company’s renowned Threat Graph, form a powerful, fluid and distributed data fabric, interconnected in a single cloud-the Security Cloud-that powers the Falcon platform and industry -leading CrowdStrike solutions. Using a combination of AI and behavioral pattern-matching techniques to associate and contextualize information across the broad data fabric, CrowdStrike graphs have created a “collect data once, reuse it multiple times” approach to solving the biggest problems faced by customers. With the introduction of Asset Graph, CrowdStrike applies the same approach to solving the most difficult, unmet challenges of customers with an eye on proactive security, as well as unprecedented IT visibility and risk management.
Three very advanced graph technologies underpinning the Falcon platform now include:
- Threat Graph: The Threat Graph that defines the CrowdStrike industry draws trillions of security data points from millions of sensors, enriched with threat intelligence data and third-party sources, to identify and correlate threat activity. together to provide full visibility of attacks and automatically prevent real-time threats across CrowdStrike’s overall customer base.
- Intel Graph: By analyzing and linking vast amounts of data to adversaries, their victims and their tools, Intel Graph provides unparalleled insights into changes in tactics and strategy, enabling strategy-focused to the opponent of CrowdStrike using world-class threat intelligence.
- Asset Graph: With this release, CrowdStrike solves one of today’s most complex customer problems: accurate asset identification, identity and configuration across all systems including cloud, on-premises, mobile, Internet of Things (IoT) and more, and connecting them together in a graph form. Consolidating and organizing this information into context will lead to powerful new solutions that are changing how organizations implement security hygiene and dynamically manage their security posture.
The CrowdStrike Asset Graph will allow new Falcon modules and features built on top of it to identify, track and explore relationships between assets within an organization. The first Falcon module to use Asset Graph was Falcon Discover (Security Hygiene), which includes the following enhancements:
- New enhanced dashboards, highly customizable filters and sharing options: IT teams can adapt their experience with Asset Graph map visualization and powerful search capabilities, all conveniently presented within the Falcon Discover console.
- New integration of third-party data with ServiceNow: Combining this integration with Asset Graph and Falcon Discover, IT teams get another layer of asset visibility around devices in one console, providing enhanced tracking of unmanaged and unsupported assets.
“It’s cliche for a reason. You cannot protect what you cannot see. The first step in wrangling shadow IT or shining light on blind spots is understanding what assets you need to secure and how they interact with unexpected insecure assets, ”he said. Juan Jose Chang, CISO at Bladex. “We believe the Falcon Discover combined with the CrowdStrike Asset Graph will be the difference between using a flashlight versus a row of street lamps to see where you’re going.”
Additional Resources
-
For more information on the CrowdStrike Asset Graph and Falcon Discover enhancements, please visit our blog.
About CrowdStrike
CrowdStrike (Nasdaq: CRWD), a global leader in cybersecurity, has redefined modern security using one of the world’s most advanced cloud-native platforms for protecting critical enterprise risk areas- endpoint and cloud workload, identity and data.
Powered by CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform uses real-time attack indicators, threat intelligence, emerging adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper Accurate detection, automated protection and remediation, elite threat hunting and priority observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers fast and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.
CrowdStrike: We stopped violations.
Learn more: https://www.crowdstrike.com/
Follow us: Blog | Twitter | LinkedIn | Facebook | Instagram
Start a free trial today: https://www.crowdstrike.com/free-trial-guide/
© 2022 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, the CrowdStrike Falcon and the CrowdStrike Threat Graph are trademarks of CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to identify their products and services.