Fast, Effective Vulnerability Assessment
The presence of vulnerabilities in applications and operating systems provides attackers with flaws they can exploit to compromise your systems. That’s why it’s critical that organizations detect and patch vulnerabilities quickly. However, it’s easier said than done — the large number of breaches that begin with the exploitation of a vulnerability proves it.
Vulnerabilities impact organizations of all sizes, giving rise to three common issues:
1. SCANNING IS SLOW AND BURDENSOME
Legacy vulnerability scanners are dinosaurs; they are slow, hard to manage and can have a major impact on your environment. Scans can take days to deliver results, which may be obsolete as soon as they arrive.
2.VULNERABILITY REPORTS ARE UNUSABLE
Legacy vulnerability scanners generate a mountain of results and lock them away in a silo. Access is funneled through unwieldy thousand-page reports. During incident response, timely information on security posture could cut minutes or hours from response time, but not if that information is locked away in a massive PDF on the other side of the planet.
3. VULNERABILITY SCANS HAVE BLIND SPOTS
Corporate assets are becoming increasingly fluid. With remote workers, virtualization and the cloud, assets are not always connected directly to the corporate network — which means assessments based on network scans will miss them.
It’s time for a new approach:
With Falcon Spotlight and the Falcon platform, you not only see your security gaps, you see which gaps your adversary is targeting. This arms you with powerful proactive protection to block advanced attacks.
Falcon Spotlight delivers information that is always up to date, putting it seamlessly into the hands of security analysts to help improve response time and reduce the effort needed to understand your security posture.
here are no scanners to deploy and manage and no new agents. Just turn on Falcon Spotlight and start seeing results. Spotlight sees it all, whether the endpoint is physical or virtual, on- or off-premises, or on-the-move.
CrowdStrike’s cloud-based architecture enables constant visibility into endpoint vulnerabilities without cumbersome and resource-intensive network or host scans.
KEY FEATURES OF FALCON SPOTLIGHT
The Falcon platform provides unprecedented endpoint protection and situational awareness that shortens response time to threats and reduces risks.
The Falcon platform mitigates the risk from vulnerabilities that cannot be patched quickly by preventing and detecting exploit attempts as well as post exploitation activities.
Tight integration with other Falcon modules means you can quickly pivot between vulnerability information, incident details and endpoint activities, not only in real time but also historically.
No scanners, no new agents
Falcon Spotlight is cloud-native and delivers vulnerability assessment seamlessly and with no performance impact. No additional agents, hardware, scheduled scans, firewall exceptions or admin credentials are required.
By taking advantage of the Falcon platform and eliminating the overhead and burden of scanning, Falcon Spotlight provides immediate time-to-value with minimal endpoint and network impact. It eliminates waiting on long scans, outdated reports, and untrustworthy asset inventory.
Falcon Spotlight makes data easily available to security analysts through a series of intuitive dashboards and real-time search. Legacy solutions lock critical information in silos and thousand-page reports. Spotlight unleashes this information in real time — when and where it’s needed.
Falcon Spotlight monitors all endpoints via the Falcon agent, whether on- or off-network, on-premises, off-premises or in the cloud.
Falcon Spotlight scales to cover your entire organization, with no on-premises infrastructure.