Endpoint

10/10/2017
09:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

ForeScout, CrowdStrike Partner on Endpoint and Network Threat Protection

  • ForeScout and CrowdStrike join forces to help organizations combat endpoint and network threats targeting traditional and IoT devices
  • New partnership will enable joint threat hunting and automated incident response to help protect against data breaches
  • Technology alliance will allow organizations to improve security hygiene and reduce mean time to respond (MTTR) to advanced threats across the endpoint and network

SAN JOSE, Calif. – October 10, 2017 – ForeScout Technologies, Inc., a leading Internet of Things (IoT) security company, and CrowdStrike, the leader in cloud-delivered endpoint protection, today announced a strategic alliance that will deliver comprehensive visibility, threat detection and security response for joint customers. Through this partnership, the two companies will monitor threats across endpoint and network tiers, share threat analytics and extend protection and policy control to unmanaged Bring-Your-Own-Device (BYOD), guest and IoT devices.

“Enterprises continue to be impacted by massive data breaches and cybersecurity attacks largely due to blind spots caused by undetected devices. To help solve this problem, ForeScout and CrowdStrike are forming a new strategic partnership that will offer a combination of extended device discovery, security intelligence and greater control to keep threats out and strengthen cyber hygiene,” said Michael DeCesare, president and CEO, ForeScout. “The collaboration and joint value of two market-leading cybersecurity companies will provide our customers with increased visibility and advanced threat analytics for better protection against malicious activity.”

Modern enterprise networks are challenged with managing increasingly complex environments along with exponential growth in volume and diversity of devices. The rise of network-connected devices has increased the attack surface, making it more challenging for organizations to prevent, detect and respond to cyber attacks. ForeScout and CrowdStrike will streamline and improve security operations for customers by leveraging ForeScout’s advanced device visibility and control capabilities combined with CrowdStrike’s AI-enabled threat analytics platform.

“Many security solutions fail to deliver accurate and meaningful threat insight, which is why organizations are constantly falling prey to cyber attacks,” said George Kurtz, co-founder and CEO, CrowdStrike. “With real-time endpoint detection and response, combined with next-generation threat prevention and proactive threat hunting, organizations will be able to gain an advantage in today’s vast threat landscape. The alliance between ForeScout and CrowdStrike is a better-together approach that will transform how customers protect their network against today’s cybersecurity challenges and tomorrow’s threats.”

The technology partnership between ForeScout and CrowdStrike will provide the following benefits to joint customers:

  • Comprehensive visibility and posture assessment across network-connected devices, including corporate devices while employees are off the enterprise network
  • Improved agent health and compliance on CrowdStrike managed devices
  • Sharing of threat intelligence across solutions to take more informed actions
  • Joint threat hunting for Indicators of Attack (IoAs) across endpoint and network tiers
  • Automated threat response to protect against malware targeting traditional and IoT devices

In addition to the go-to-market relationship, ForeScout and CrowdStrike intend to build an integrated solution to further support their joint customers. CrowdStrike is an industry leader in the endpoint protection market and the latest partner in ForeScout’s portfolio of more than 70 technology and alliance partners. Through these partnerships and integrations, ForeScout is able to orchestrate infrastructure-wide security management to make formerly disjointed security products work as one, eliminating security gaps, accelerating incident response, automating workflows and optimizing existing investments.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Printers: The Weak Link in Enterprise Security
Kelly Sheridan, Associate Editor, Dark Reading,  10/16/2017
20 Questions to Ask Yourself before Giving a Security Conference Talk
Joshua Goldfarb, Co-founder & Chief Product Officer, IDDRA,  10/16/2017
Why Security Leaders Can't Afford to Be Just 'Left-Brained'
Bill Bradley, SVP, Cyber Engineering and Technical Services, CenturyLink,  10/17/2017
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.