U.K. University Gains 24/7 Protection, Visibility and Response with CrowdStrike MDR
- Legacy antivirus (AV) software. The university lacked sufficient threat detection and response capabilities because of its reactive security posture and because its legacy AV could not keep up with increasingly sophisticated cyber threats.
- Unacceptably high risk of attacks and reputational harm. The university wanted to reduce the risk of cyber incidents and to protect its students and staff from the consequences of malicious attacks, which for the university could include damage to its reputation.
- Surging threat of ransomware attacks. Higher education was facing a particularly high risk of ransomware attacks.¹
- Limited security coverage. Because higher education IT and security teams typically work 9 a.m.-5 p.m. on weekdays, the university’s security leaders were concerned with the lack of coverage after hours when most ransomware is deployed.²
- Rapidly evolving needs of remote working and learning. The expansion of IT facilities to support remote employees and students during the pandemic, combined with decreasing capacity and increasing workloads caused by an evolving threat landscape, had led to a reactive security posture.
- Major security visibility gaps and blindspots. The university’s legacy security solutions couldn’t provide unified visibility across a variety of operating systems.
How the University of Westminster Chose and Deployed CrowdStrike MDR
In addition to CrowdStrike, the university evaluated MDR solutions from two other security vendors. The primary appeal of CrowdStrike, Delaitre said, was the speed, scalability and ease of deployment of Falcon Complete and the entire suite of tools the MDR team leverages across the CrowdStrike Falcon® platform. He also noted CrowdStrike’s wide range of supported operating systems — including macOS, Windows and Linux — and the impressive maturity of Falcon Complete’s MDR capabilities, both in terms of its security tech stack and its team of experienced, highly skilled security analysts. “Falcon Complete's powerful combination of industry-leading security technology and elite MDR expertise are a match made in heaven, because with security vendors we often get great products but not a great team, or the team’s great but not the product,” said Russell Poole, Director of Information Systems and Support, adding that the CrowdStrike team is clearly experienced with working in a higher education environment. Deployment was smooth and efficient, with the team installing the Falcon agent to more than 5,000 endpoints and 400 servers in four weeks. “The CrowdStrike team has a very well-oiled onboarding process, bringing us online in a very short period of time,” Poole said. Prior to the university-wide deployment, security leaders opted to phase in the security software, first running a proof-of-value trial with about 200 devices and servers. The success of this pilot program — which included 77 tests of Falcon Complete’s deployment, management and threat detection, response and hunting capabilities — eased any remaining concerns and secured the decision to proceed with the full deployment. Implementation of the lightweight Falcon sensor was quick and caused “absolutely no” performance issues, Delaitre said, and the transition from legacy AV to CrowdStrike’s next-gen AV was “very smooth.”
University Immediately Gains Expanded, 24/7 Coverage and Unprecedented Visibility
Falcon Complete MDR demonstrated its value from the start. In one instance during rollout, it detected malicious activity where an unapproved web browser had been installed on some endpoints. In another instance, it shut down malware initiating command-and-control attempts from endpoints in a student lab. Overall, the university has better coverage for security protection than it had before, Delaitre and Poole said, with CrowdStrike protecting all of its operating systems on all of its endpoints and servers, and regardless of if its assets are on-premises or remote. “We have better visibility of detections, prompt remediation of security incidents and root-cause analysis of these incidents,” Delaitre said. “And we have a unified view across our endpoints and servers regardless of OS, whereas previously we were using different technologies on different systems. In addition, with the Falcon Complete MDR team, we now have an incredibly responsive 24/7 SOC that rapidly analyzes and remediates every new inbound detection, regardless of the time of day or night.” The improved visibility and coverage extends to the university’s Computer Science and Engineering School, whose servers are controlled outside of the Information Systems and Support department. In particular, the school is leveraging CrowdStrike cloud security modules for when staff and students do processing in virtual machines on AWS. “CrowdStrike's ability to help us protect our on-premises systems and AWS workloads gives us an additional layer of security we did not have before,” Delaitre said. Crucially, with the 24/7 coverage of the Falcon Complete team, Delaitre said the university now enjoys a detection response time of one hour versus the previous “at best” 24-hour response time that was limited by the in-house security team’s 9 a.m.-5 p.m. weekday schedule. “CrowdStrike has given us a better understanding of what's happening across our IT estate, whereas before without a doubt things were happening that we never saw and therefore could never control,” Poole said. “With our prior solution, what kept us awake most was the threat of ransomware and our ability to detect and respond to it. CrowdStrike has allowed us some extra hours of sleep.”