How to Leverage CrowdStrike Integration with TrueFort

Introduction

In this video and article, we will look at the integration available between CrowdStrike and TrueFort – a CrowdStrike Store partner. TrueFort can leverage the existing CrowdStrike agent and event data to provide application visibility and security..

Video

Overview

TrueFort’s real time application mapping gives security, application, and operations teams unparalleled visibility to understand the environment in the context of applications and identify unusual behaviors. The value of TrueFort’s solution can be immediately realized given the CrowdStrike agent is installed and collecting the necessary event data.

 

Integration in the TrueFort UI

Based on the CrowdStrike event data, TrueFort’s UI can provide a real time visual representation of how applications are communicating in your environment. In this example, we see three applications communicating.

truefort UI

 

From this view, you can drill down on a specific application to see the details behind both external and internal communications.

truefort details

 

In this application view, the middle section illustrates a three tier application. There are web servers, application servers, and database servers. The lines indicate expected communication between the backup servers and the database server. In addition, the web server primarily communications with the app server while the app server connects to the database server.

truefort application

 

There is also the option to drill down to look at a specific server to understand what processes are actively running and how they are communicating.

truefort processes

 

TrueFort provides an illustration of the exact processes responsible for each network connection along with information about the destination. TrueFort’s machine learning and profiling capabilities help establish baselines so that unusual and potentially suspect activity can be identified.

truefort network

 

CrowdStrike UI

In this example, we saw rogue communication of a workstation connecting directly to a database server which may indicate data exfiltration. Having the visibility to identify this is kind of unusual behavior is critical to helping us identify process and security gaps. We can use the hostname from the TrueFort alert and search for that managed system in the CrowdStrike UI. Even without a CrowdStrike detection event, we can take action to network contain the system and use real time response to investigate further.

truefort crowdstrike ui

Conclusion

Combining the power of CrowdStrike’s event data with TrueFort’s application visibility tools yields immediate value to your organization. TrueFort’s machine learning can use the existing telemetry data to determine baseline behaviors, offer visibility into how applications are communicating, and highlight unusual activity. 

You can begin your trial of TrueFort today directly in the CrowdStrike store.

truefort store

More resources

 

CrowdStrike Falcon Free Trial
 

Try CrowdStrike Free for 15 Days Get Started with A Free Trial