Press Release | Media on CrowdStrike

CrowdStrike™ Launches Intelligence Exchange Program

Seven industry-leading solutions join program to provide rich context and attack prioritization to end customers.

Irvine, CA – Aug 05, 2014 – CrowdStrike Inc., a global provider of security technologies and services focused on identifying advanced threats and targeted attacks, today announced the launch and immediate availability of the CrowdStrike Intelligence Exchange Program (CSIX).

CrowdStrike Intelligence Exchange (CSIX) enables vendor partners to access and share threat intelligence. This threat intelligence continuously improves vendor partners’ ability to detect and attribute attacks, allows for attack prioritization, and provides the end customer with rich context about the attacks in their environment.

“We are thrilled to launch the CrowdStrike Intelligence Exchange program and look forward to adding additional partners to a growing list of industry-leading solutions,” says Scott Fuselier, VP of WW Sales & Operations. “With today’s ever-changing threat landscape, it’s more important than ever to be able to gain context and prioritization into targeted attacks.”

CSIX launches with seven industry-leading partners: Agiliance, Centripetal Networks, Check Point Software Technologies, Ltd., General Dynamics Fidelis Cybersecurity Solutions, LogRhythm, ThreatQuotient, and ThreatStream. Security solution vendors can add rich context and attack prioritization through three go-to-market program options:

Option 1: CrowdID

  • OEM Partner can deliver basic attribution to help their customer understand if an attack is targeted or commodity, free of charge. The OEM Partner queries the CrowdStrike API with supported indicators and/or submits a malware sample receiving attribution information.

Option 2: Falcon Intelligence – Adversary Profile

  • Attribution data is made available to the OEM Partner’s solution to provide rich context and prioritization of targeted attacks. Content delivered to the customer includes both adversary name and full profile details, including targeted sectors, exploits used, and other trend data, under a license and revenue sharing model.

Option 3: Falcon Intelligence Connect

  • CrowdStrike and the OEM Partner certify the integration of CrowdStrike Intelligence to the OEM Partner’s solution for use with joint customers.

“In the fight against malicious actors, threat intelligence can be the difference between a massive breach and attempted attack,” said Peter George, president of General Dynamics Fidelis Cybersecurity Solutions. “Customers will be better able to protect their systems with the increased scope of intelligence we can provide as a result of our participation in the Intelligence Exchange. The integration through Fidelis XPS enables threat detection and remediation to be operationalized, with the new intelligence applied in real time.”

Becoming a Partner:

CSIX is the first program of many collaborative CrowdStrike partnerships within the security vendor community. CrowdStrike is committed to building an ecosystem that enhances the defensive posture and response capabilities of our customers. Participation in CSIX provides OEM Partners with multiple options to better enhance their offering with contextual information specific to major threat actors.

For more information, contact CSIX@crowdstrike or visit http://www.crowdstrike.com/intelligence-exchange/

CSIX Partners:

Agiliance

Agiliance, the Big Data Risk Company, is the leading independent provider of integrated solutions for Operational and Security Risk programs.

Centripetal Networks

Centripetal Networks is a cyber-security solutions provider specializing in Active Network Defense. Centripetal’s RuleGate® operationalizes threat intelligence at scale, which drives an active cyber defense without impacting network performance.

Check Point Software Technologies, Ltd.

Check Point Software Technologies, the worldwide leader in securing the Internet, provides customers with uncompromised protection against all types of threats, reduces security complexity, and lowers total cost of ownership. Check Point offers flexible and simple solutions that can be customized to meet an organization’s exact security needs.

General Dynamics Fidelis Cybersecurity Solutions

General Dynamics Fidelis Cybersecurity Solutions offers a comprehensive portfolio of products, services, and expertise to combat today’s sophisticated advanced threats and prevent data breaches.

LogRhythm

LogRhythm’s award-winning Security Intelligence Platform, unifying SIEM, log management, network forensics, host forensics, and advanced analytics, empowers organizations to detect and respond to today’s most sophisticated threats with unparalleled speed and accuracy.

ThreatQuotient

ThreatQuotient is an on-premise, vendor-agnostic threat intelligence management appliance that automates network defense workflows. Detect adversaries more quickly through streamlined threat intel lifecycles that automatically deploy to your enterprise security environment.

ThreatStream

ThreatStream offers the first-ever community-vetted cyber security intelligence platform that aggregates millions of threat indicators from around the Internet and integrates them directly to an organization’s existing security infrastructure. ThreatStream provides businesses and governments visibility into newly discovered security threats so they can proactively defend against malicious attacks.

About CrowdStrike

CrowdStrike is a global provider of security technology and services focused on identifying advanced threats and targeted attacks. Using big-data technologies, CrowdStrike’s next-generation threat protection platform leverages real-time Stateful Execution Inspection (SEI) at the endpoint and Machine Learning in the cloud instead of solely focusing on malware signatures, indicators of compromise, exploits, and vulnerabilities. The CrowdStrike Falcon® Platform is a combination of big-data technologies and endpoint-security driven by advanced threat intelligence. CrowdStrike Falcon® enables enterprises to identify unknown malware, detect zero-day threats, pinpoint advanced adversaries and attribution, and prevent damage from targeted attacks in real time.