Azure Sentinel News
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
  • Home
    • Home – Layout 1
    • Home – Layout 2
    • Home – Layout 3
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence
No Result
View All Result
Azure Sentinel News
No Result
View All Result
Home Security Operations

With new release, CrowdStrike targets Google Cloud, Azure and container adopters

Azure Sentinel News Editor by Azure Sentinel News Editor
November 25, 2020
in Security Operations
0
With new release, CrowdStrike targets Google Cloud, Azure and container adopters
3.5kViews
383 Shares Share on Facebook Share on Twitter

After bringing its flagship Falcon endpoint protection platform to Amazon Web Services last year, CrowdStrike Inc. is adding better support for Microsoft Corp.’s Azure and Google Cloud to court enterprises with heterogeneous cloud environments.

The company unveiled the update today at the RSA Conference in San Francisco.

Falcon is used by organizations to protect cloud environments, servers, employee devices and other endpoints from hackers. The improved cloud support unveiled at RSA takes the form of upgrades to Discover, Falcon’s monitoring module, that enable Discover to be used inside Azure and Google Cloud deployments. 

SECURITY

Discover gives administrators information on virtual machines that don’t have Falcon installed and may therefore be vulnerable to attack. In addition, the tool provides general system data for instances that administrators can consult when investigating a potential breach. Discover shows the unique identifier of a breached instance, the operating system it runs, its IP address and related details.

The second major focus of the new Falcon release is container security. CrowdStrike says that the platform now provides endpoint detection and response features, as well as real-time runtime protection, for software containers and the servers on which they’re deployed. 

“Security teams operate in heterogeneous environments and need a unified solution that seamlessly and reliably protects workloads across all environments,” said CrowdStrike Chief Product Officer Amol Kulkarni.

The approach CrowdStrike is taking to address this need, providing a one-stop-shop endpoint protection platform that can secure a variety of different systems, is one competitors have adopted as well. SentinelOne Inc. is among the most prominent examples. The startup, which this month raised $200 million in funding, sells an endpoint protection platform that can likewise protects a variety of assets ranging from employee laptops to containers.

One-stop-shop solutions and product suites have found a niche in the security market simply because using one integrated toolkit is easier than using multiple point solutions. Tasks such as syncing breach data among tools becomes less of a challenge.

The complex reality of network protection in the enterprise is influencing not just security software makers’ product roadmaps but also the decisions of cybersecurity investors. SentinelOne’s mammoth funding round is just one example. Another is SCVX Corp., a firm that went public this year with the sole purpose of buying up security companies and assembling them into what Chief Product Officer Hank Thomas described in a recent interview with SiliconANGLE as a “multicapable platform.”

Reference: https://siliconangle.com/2020/02/24/crowdstrike-targets-google-cloud-azure-container-adopters-new-release/

Azure Sentinel News Editor

Azure Sentinel News Editor

Related Posts

What’s new: Microsoft Teams connector in Public Preview
Security Operations

AMA for Azure Sentinel on the Microsoft Security Insights Podcast and Twitch Stream

January 25, 2021
What’s new: Microsoft Teams connector in Public Preview
Security Operations

How to Setup a Managed Identity for the Azure Sentinel Logic App Connector

January 21, 2021
Microsoft suspends 18 Azure accounts tied to China-based hackers
Security Operations

Azure Sentinel Daily Task: Hunting Queries and Bookmarks

January 1, 2021
Next Post
Microsoft is quietly becoming a cybersecurity powerhouse

Windows Server Netlogon Exploit Code Publicly Exposed, CISA Warns

ThreatConnect integrates its TIP and SOAR platform with Microsoft Graph Security API

Making buildings smarter with Azure IoT

O365 & AAD Multi-Tenant Custom Connector – Azure Sentinel

Looking Back at Microsoft Ignite 2019 - Tech Intensity, End to End Security and AI

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Follow Us

  • 21.8M Fans
  • 81 Followers

Recommended

With new release, CrowdStrike targets Google Cloud, Azure and container adopters

Guy who named ‘BlueKeep’ Windows flaw joins Microsoft Threat Protection

3 months ago
Microsoft is quietly becoming a cybersecurity powerhouse

Official Azure Sentinel PowerShell Module Released

2 months ago
Mimecast® Email Security for Azure Sentinel is now available in the Microsoft Azure Marketplace

Mimecast® Email Security for Azure Sentinel is now available in the Microsoft Azure Marketplace

4 months ago
What’s new: Microsoft Teams connector in Public Preview

Ingest Fastly Web Application Firewall logs into Azure Sentinel

3 months ago

Instagram

    Please install/update and activate JNews Instagram plugin.

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

Topics

anomaly automation Azure Azure DevOps Azure Security Center Azure Sentinel Azure Sentinel API Azure Sentinel Connector BlueVoyant Call cybersecurity Detection file GitHub Hunting Huntingy IAC incident response Incident Triage infrastructure as code Investigation jupyter LAQueryLogs MDR Microsoft microsoft 365 mssp Multitenancy Notebooks Pester Playbooks PowerShell python Records Security Sentinel Sharing SIEM signin Supply Chain teams Threat hunting Watchlists Workbooks XDR
No Result
View All Result

Highlights

New Items of Note on the Azure Sentinel GitHub Repo

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

New Search Capability for Azure Sentinel Incidents

Follow-up: Microsoft Tech Talks Practical Sentinel : A Day in the Life of a Sentinel Analyst

Changes in How Running Hunting Queries Works in Azure Sentinel

Azure Sentinel can now Analyze All Available Azure Active Directory Log Files

Trending

What’s new: Microsoft Teams connector in Public Preview
IR

How to Generate Azure Sentinel Incidents for Testing

by Azure Sentinel News Editor
February 26, 2021
0

Do you want to generate an Incident in Azure Sentinel for testing/demoing? Here’s a couple easy ways...

What’s new: Microsoft Teams connector in Public Preview

Azure Sentinel Notebooks Loses It’s Preview Tag

February 25, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting

February 22, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

New Items of Note on the Azure Sentinel GitHub Repo

February 18, 2021
Microsoft’s newest sustainable datacenter region coming to Arizona in 2021

Tuning the MCAS Analytics Rule for Azure Sentinel: System Alerts and Feature Deprecation

February 17, 2021

We bring you the best, latest and perfect Azure Sentinel News, Magazine, Personal Blogs, etc. Visit our landing page to see all features & demos.
LEARN MORE »

Recent News

  • How to Generate Azure Sentinel Incidents for Testing February 26, 2021
  • Azure Sentinel Notebooks Loses It’s Preview Tag February 25, 2021
  • The Holy Grail of Azure Sentinel Data Connections: The Azure Service Diagnostic Setting February 22, 2021

Categories

  • AI & ML
  • Artificial Intelligence
  • Incident Response
  • IR
  • KQL
  • Security and Compliance
  • Security Ochestration & Automated Response
  • Security Operations
  • SIEM
  • SOAR
  • SOC
  • Threat Intelligence
  • Uncategorized

[mc4wp_form]

Copyright © 2020 - Azure Sentinel News

No Result
View All Result
  • Home
  • Security and Compliance
  • SOC
  • Threat Intelligence
  • Security Ochestration & Automated Response
  • SOAR
  • Security Operations
  • Artificial Intelligence

Copyright © 2020 Azure Sentinel News