News

4/16/2018
11:31 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

CrowdStrike Announces Real Time Response and Real Time Query to Help Organizations Get Back to Business Quickly After a Cyber Attack

Company enhances its endpoint detection and response (EDR) solution with Real-Time Response and Real-Time Query capabilities.

Sunnyvale, CA – April 16, 2018 – CrowdStrike® Inc., the leader in cloud-delivered endpoint protection, today announced the addition of Real Time Response and Real Time Query features to its Falcon Insight™ EDR solution. These new features empower incident responders with immediate access to systems across the distributed enterprise so that they can rapidly investigate incidents, take decisive action to eradicate threats with surgical precision and get back to business quickly. These new features build on the CrowdStrike Falcon platform’s ability to stop threats on endpoints by adding unparalleled ability to respond quickly and minimize costs associated with handling advanced cyber attacks.

When a cyber attack is discovered, Security Operations Center (SOC) teams have two urgent goals: to understand the threat quickly and then, take action to remediate it. According to CrowdStrike’s 2018 Global Threat Report, the average intrusion takes less than two hours to pivot from an initial point of attack toward the ultimate objective. This “breakout time” statistic shows how little time defenders have to investigate and eject the attacker from the network, before the incident escalates into a breach. Beyond its market leading prevention capabilities, CrowdStrike addresses this challenge by providing deep, direct access to all the systems they need to accomplish quick and effective remediation within the “breakout time” window.

By leveraging the existing Falcon sensor, cloud and console, CrowdStrike is able to deliver Real Time Response and Real Time Query capabilities to systems anywhere in the world, with no incremental cost in terms of performance or infrastructure. CrowdStrike Falcon’s EDR  capabilities ensure customers have comprehensive, real-time and historical visibility of everything that is executed in their environment. The Real Time Response feature adds powerful interactive capabilities, delivering instant visibility into the local file system, registry, network, and more. It also allows responders to close the door on threats by killing malicious processes and removing remaining traces left behind by the attacker. Real Time Query delivers ultimate visibility and control to responders, empowering them through custom-tailored information collection and response actions.

“With the launch of this capability, CrowdStrike is empowering SOC teams to remediate  security-related incidents faster, more effectively, and more efficiently than ever before”, says George Kurtz, CrowdStrike’s co-founder and chief executive officer. “CrowdStrike Falcon Insight Real Time Response and Real Time Query help customers be more strategic with their incident response efforts, take decisive remediation steps quickly to minimize damage from cyber incidents, while operating with full knowledge of what is happening in their environment.”

For more information about CrowdStrike’s Spring Platform launch, read a blog by George Kurtz, CrowdStrike’s CEO, here.

Visit CrowdStrike during the RSA Conference 2018 at booth #941 Moscone South to see presentations and demos and meet with our experts.

About CrowdStrike®

CrowdStrike is the leader in cloud-delivered endpoint protection. Leveraging artificial intelligence (AI), the CrowdStrike Falcon® platform offers instant visibility and protection across the enterprise and prevents attacks on endpoints on or off the network. CrowdStrike Falcon deploys in minutes to deliver actionable intelligence and real-time protection from Day One. It seamlessly unifies next-generation AV with best-in-class endpoint detection and response, backed by 24/7 managed hunting. Its cloud infrastructure and single-agent architecture take away complexity and add scalability, manageability, and speed.

CrowdStrike Falcon protects customers against all cyber attack types, using sophisticated signatureless AI and Indicator-of-Attack (IOA) based threat prevention to stop known and unknown threats in real time. Powered by the CrowdStrike Threat Graph™, Falcon instantly correlates over 100 billion security events a day from across the globe to immediately prevent and detect threats.

There’s much more to the story of how Falcon has redefined endpoint protection but there’s only one thing to remember about CrowdStrike: We stop breaches.

You can gain full access to CrowdStrike Falcon Prevent™ by starting your free trial here.

Learn more: https://www.crowdstrike.com/

Follow us: Blog | Twitter

© 2018 CrowdStrike, Inc. All rights reserved. CrowdStrike®, CrowdStrike Falcon®, CrowdStrike Threat Graph™, CrowdStrike Falcon Prevent™, Falcon Prevent™, CrowdStrike Falcon Insight™, Falcon Insight™, CrowdStrike Falcon Discover™, Falcon Discover™, CrowdStrike Falcon Intelligence™, Falcon Intelligence™, CrowdStrike Falcon DNS™, Falcon DNS™, CrowdStrike Falcon OverWatch™, Falcon OverWatch™, CrowdStrike Falcon Spotlight™ and Falcon Spotlight™ are among the trademarks of CrowdStrike, Inc. Other brands may be third-party trademarks.

Contacts

CrowdStrike, Inc.

Ilina Cashiola, 202-340-0517

[email protected]

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: White Privelege Day
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-17283
PUBLISHED: 2018-09-21
Zoho ManageEngine OpManager before 12.3 Build 123196 does not require authentication for /oputilsServlet requests, as demonstrated by a /oputilsServlet?action=getAPIKey request that can be leveraged against Firewall Analyzer to add an admin user via /api/json/v2/admin/addUser or conduct a SQL Inject...
CVE-2018-17282
PUBLISHED: 2018-09-20
An issue was discovered in Exiv2 v0.26. The function Exiv2::DataValue::copy in value.cpp has a NULL pointer dereference.
CVE-2018-14592
PUBLISHED: 2018-09-20
The CWJoomla CW Article Attachments PRO extension before 2.0.7 and CW Article Attachments FREE extension before 1.0.6 for Joomla! allow SQL Injection within download.php.
CVE-2018-15832
PUBLISHED: 2018-09-20
upc.exe in Ubisoft Uplay Desktop Client versions 63.0.5699.0 allows remote attackers to execute arbitrary code. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the processing of URI ha...
CVE-2018-16282
PUBLISHED: 2018-09-20
A command injection vulnerability in the web server functionality of Moxa EDR-810 V4.2 build 18041013 allows remote attackers to execute arbitrary OS commands with root privilege via the caname parameter to the /xml/net_WebCADELETEGetValue URI.