• Tech News
    • Games
    • Pc & Laptop
    • Mobile Tech
    • Ar & Vr
    • Security
  • Startup
    • Fintech
  • Reviews
  • How To
What's Hot

Elementor #32036

January 24, 2025

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

April 18, 2024

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

April 16, 2024
Facebook Twitter Instagram
  • Contact
  • Privacy Policy
  • Terms & Conditions
Facebook Twitter Instagram Pinterest VKontakte
Behind The ScreenBehind The Screen
  • Tech News
    1. Games
    2. Pc & Laptop
    3. Mobile Tech
    4. Ar & Vr
    5. Security
    6. View All

    Bring Elden Ring to the table with the upcoming board game adaptation

    September 19, 2022

    ONI: Road to be the Mightiest Oni reveals its opening movie

    September 19, 2022

    GTA 6 images and footage allegedly leak

    September 19, 2022

    Wild west adventure Card Cowboy turns cards into weird and silly stories

    September 18, 2022

    7 Reasons Why You Should Study PHP Programming Language

    October 19, 2022

    Logitech MX Master 3S and MX Keys Combo for Business Gen 2 Review

    October 9, 2022

    Lenovo ThinkPad X1 Carbon Gen10 Review

    September 18, 2022

    Lenovo IdeaPad 5i Chromebook, 16-inch+120Hz

    September 3, 2022

    It’s 2023 and Spotify Still Can’t Say When AirPlay 2 Support Will Arrive

    April 4, 2023

    YouTube adds very convenient iPhone homescreen widgets

    October 15, 2022

    Google finishes iOS 16 Lock Screen widgets rollout w/ Maps

    October 14, 2022

    Is Apple actually turning iMessage into AIM or is this sketchy redesign rumor for laughs?

    October 14, 2022

    MeetKai launches AI-powered metaverse, starting with a billboard in Times Square

    August 10, 2022

    The DeanBeat: RP1 simulates putting 4,000 people together in a single metaverse plaza

    August 10, 2022

    Improving the customer experience with virtual and augmented reality

    August 10, 2022

    Why the metaverse won’t fall to Clubhouse’s fate

    August 10, 2022

    How Apple privacy changes have forced social media marketing to evolve

    October 16, 2022

    Microsoft Patch Tuesday October Fixed 85 Vulnerabilities – Latest Hacking News

    October 16, 2022

    Decentralization and KYC compliance: Critical concepts in sovereign policy

    October 15, 2022

    What Thoma Bravo’s latest acquisition reveals about identity management

    October 14, 2022

    What is a Service Robot? The vision of an intelligent service application is possible.

    November 7, 2022

    Tom Brady just chucked another Microsoft Surface tablet

    September 18, 2022

    The best AIO coolers for your PC in 2022

    September 18, 2022

    YC’s Michael Seibel clarifies some misconceptions about the accelerator • DailyTech

    September 18, 2022
  • Startup
    • Fintech
  • Reviews
  • How To
Behind The ScreenBehind The Screen
Home»Security»How CrowdStrike consolidates tech stacks as a growth strategy
Security

How CrowdStrike consolidates tech stacks as a growth strategy

September 26, 2022No Comments7 Mins Read
Facebook Twitter Pinterest LinkedIn Tumblr Email
How CrowdStrike consolidates tech stacks as a growth strategy
Share
Facebook Twitter LinkedIn Pinterest Email

Were you unable to attend Transform 2022? Check out all of the summit sessions in our on-demand library now! Watch here.


Driving tech stack consolidation by broadening the CrowdStrike Falcon platform is a proven strategy for driving growth, with Fal.con 2022 proving to be an inflection point. Four new product announcements stand out as core to CrowdStrike’s strategy. They include expanding cloud-native application protection platform (CNAPP) capabilities for CrowdStrike Cloud Security, including cloud infrastructure entitlement management (CIEM) and integration of the CrowdStrike Asset Graph; Falcon Insight XDR; Falcon Complete LogScale; and Falcon Discover for IoT.  

96% of CISOs plan to consolidate their security platforms, with 63% saying extended detection and response (XDR) is their top solution choice. Cynet’s 2022 survey of CISOs found that nearly all CISOs have consolidation on their roadmaps, up from 61% in 2021. CISOs believe consolidating their tech stacks will help them avoid missing threats (57%) and reduce the need to find qualified security specialists (56%), while streamlining the process of correlating and visualizing findings across their threat landscape (46%).

Gartner predicts that by 2025 [subscription required], 50% of midmarket security buyers will rely on XDR to accelerate the consolidation of workspace security technologies, including endpoint, cloud application and identity security.

XDR is a consolidation engine 

During his keynote, George Kurtz, CrowdStrike’s cofounder and CEO, provided insights into why XDR is such a high priority for its platform. He said, “80% of the security data you get the most value from [are] the endpoints and the workloads. That’s really where the attacks are. Yes, they happen across the network and other infrastructure. But the reality is [that] people are exploiting endpoints and workload.” 

Event

MetaBeat 2022

MetaBeat will bring together thought leaders to give guidance on how metaverse technology will transform the way all industries communicate and do business on October 4 in San Francisco, CA.

See also  Peter Eckersley, tech activist and founder of Let's Encrypt, dies at 43

Register Here

Ingesting and managing security data needs to start with a focused, intentional purpose, a point Kurtz made several times during his keynote. XDR’s core value is providing an integrated platform of threat detection, incident response and remediation with real-time monitoring and visibility of cloud platforms, apps, endpoints and networks, including remote sensors. 

Find attacks missed by traditional approaches
CrowdStrike emphasized that there are more sources of telemetry, endpoint, asset and identity data (both human and machine) than even the most advanced enterprise tech stack could handle today, making XDR indispensable in improving — and consolidating — tech stacks. Image source: CrowdStrike

During his keynote, Kurtz defined XDR as being “built on the foundation of endpoint detection and response (EDR). XDR extends enterprise-wide visibility across all key security domains (native and third-party) to speed and simplify real-time detection, investigation and response for the most sophisticated attacks.” XDR is so core to the future of CrowdStrike that every keynote provided a glimpse of how and where it will be designed to deliver value. “We’re excited that we can democratize XDR for all of our customers,” Kurtz said during his keynote.

Acquiring Reposify accelerates consolidation 

Protecting internal attack surfaces is a challenge that even the most advanced ITops and secops teams constantly deal with. It’s because internal threats can strike at the heart of an identity access management (IAM) or privileged access management (PAM) system using stolen credentials and take control of servers in as little as an hour and 24 minutes, according to CrowdStrike’s 2022 Global Threat Report. Internal attacks are among the most difficult to identify and stop.   

CrowdStrike’s acquisition of Reposify brings an integrated external attack surface management platform onto Falcon. Reposify scans the web daily for exposed assets, giving enterprises visibility over their exposed assets and defining which actions they need to take to remediate them. Additionally, CrowdStrike announced plans to use Reposify’s technology to help its customers stop internal attacks as well.

Blind spots grow as network complexity rises
Not knowing how many at-risk, unaccounted-for assets and endpoints are on the internet creates blind spots that leave organizations vulnerable to intrusion and breach attempts. Image source: CrowdStrike

“Reposify is a powerful external attack surface management platform. It scans the internet for vulnerabilities and exposes assets to identify and eliminate risk across your organization,” Kurtz said during his keynote. But, he added, “there’s no reason we can’t use it internally to continue to help you understand your risks inside, to continue to help you find those exposed assets.” 

See also  What is a cyberattack surface and how can you reduce it?

Reposify’s platform has proven successful in helping secops and ITops teams find unknown exposed assets, identifying shadow IT and internal threat risks in real time before attackers breach infrastructure. It solves an issue many CISOs are facing today: getting more in control of external threats while strengthening the argument for consolidating on a single platform.

Why the CrowdStrike consolidation strategy works

The ongoing shortage of security engineers combined with tighter IT and security budgets make selecting best-of-breed security apps a tough sell for many CISOs. Meanwhile, cyberattackers are out-automating many organizations, devising malware-free techniques to avoid detection. Gartner [subscription required] found that 85% of organizations currently pursuing a vendor consolidation strategy show a flat or increased number of vendors in the past year.

Cybersecurity platforms provide economies of scale, drive a strong network effect across any company’s ecosystem, and force security providers to make customer success a core strength. Getting customer success right combined with the labor shortage and skyrocketing inflationary prices of running a business all work in CrowdStrike’s favor from a consolidation-strategy standpoint. It’s common knowledge that even if a best-of-breed vendor is integrated into a tech stack, CISOs are adamant that the contract is just for one year in case the system doesn’t deliver the expected value.     

No CISO wants to hear that they have to hire a new engineer just for a new app. Secops teams are short-staffed already, with team members often having multiple assignments. Having one person own a new best-of-breed app means they have to spend time learning it while doing their current job. 

Conversely, most secops teams have dedicated platform engineers who specialize in core platforms and infrastructure their organization needs to operate. CrowdStrike’s approach to making each of its 22 modules adhere to UX and workflow standards is very similar to Salesforce’s approach of defining a common user experience and having all partners and internal devops teams build to it. 

See also  Report: 90% of orgs have software security checkpoints in their software development lifecycle (SDLC)

Kurtz mentioned during his keynote that he often hears the company is known as the Salesforce of security due to its reliance on cloud architecture. Cloud architectures bring greater UX and UI flexibility, making API integration possible with legacy on-premises systems.

Additionally, CrowdStrike’s devops discipline is clear from the announcements at Fal.con 2022, and the company’s product leaders take pride in how fast they can iterate on the platform. CrowdStrike’s reliance on the cloud helps speed up land-and-expand selling strategies in enterprises. Selling lower total cost of ownership and providing bundling options and pricing is how CrowdStrike turns consolidation into recurring revenue growth. 

IAM and PAM are due for consolidation 

With secops teams overwhelmed and cyberattackers looking to breach IAM and PAM systems to take control of servers full of identities and privileged access credentials, there’s room for consolidation in this market. Added to the urgency is how fast machine identities are growing, including the need to secure ephemeral containers.  

Organizations whose PAM and IAM systems are siloed today risk experiencing a breach and not knowing it. Many must improve their IAM infrastructure, updating systems to current standards while improving security best practices, including credential management and hardening security for Active Directory (AD).

Most importantly, consolidation of this market area would improve real-time monitoring of identity attack techniques while improving security access controls. In short, IAM and PAM would achieve the real-time visibility those systems need to stay secure while capitalizing on threat intelligence enterprise-wide, delivering a substantial benefit of choosing to consolidate on a single platform.

Source link

consolidates CrowdStrike Growth stacks strategy Tech
Share. Facebook Twitter Pinterest LinkedIn Tumblr Email

Related Posts

How To Make Curated Content A Winning Element Of Your Content Strategy

September 24, 2023

She Sacrificed Her Youth to Get the Tech Bros to Grow Up

September 2, 2023

How To Leverage Growth Marketing To Boost Slowing Sales

August 27, 2023

3 Ways To Set The Stage For Growth In Your Small Business

August 20, 2023
Add A Comment

Comments are closed.

Editors Picks

Why wait for another Fire Emblem when you can play Shining Force instead?

June 25, 2022

Elon Musk pitches a vision of the future in a magazine run by China’s internet censorship agency

August 13, 2022

Marvel’s Spider-Man Remaster particulars new PC options

July 21, 2022

Sweden is ideal breeding ground for a direct-to-consumer unicorn

September 10, 2022

Subscribe to Updates

Get the latest news and Updates from Behind The Scene about Tech, Startup and more.

Top Post

Elementor #32036

The Redmi Note 13 is a bigger downgrade compared to the 5G model than you might think

Xiaomi Redmi Watch 4 is a budget smartwatch with a premium look and feel

Behind The Screen
Facebook Twitter Instagram Pinterest Vimeo YouTube
  • Contact
  • Privacy Policy
  • Terms & Conditions
© 2025 behindthescreen.uk - All rights reserved.

Type above and press Enter to search. Press Esc to cancel.