Story image

CrowdStrike announces endpoint detection for mobile devices

06 Mar 2019

Endpoint protection provider CrowdStrike has released an enterprise endpoint detection and response (EDR) solution for mobile devices.

Based on CrowdStrike’s proven EDR technology for enterprise endpoints, Falcon for Mobile enables security teams to hunt for threats on mobile devices and provides visibility into malicious, unwanted, or accidental access to sensitive corporate data, while protecting user privacy and without impacting device performance.

Leveraging CrowdStrike’s cloud-native platform and single-agent architecture, customers extend their investment with CrowdStrike Falcon for mobile EDR protection.

With Falcon for Mobile, security teams have real-time visibility into mobile device activity to quickly identify, investigate and remediate threats.

The comprehensive mobile solution also integrates Falcon threat intelligence to provide guidance in mobile threat hunting activities, and Falcon OverWatch to proactively hunt for threats on mobile devices 24/7/365.

“We continue to expand the capabilities of the CrowdStrike Falcon platform, leveraging its cloud-native architecture built to protect the endpoint and stop the breach on every platform - workstations, servers, cloud workloads, containers, and now also mobile devices,” says CrowdStrike co-founder and chief executive officer George Kurtz.

“With today’s announcement of Falcon for Mobile, customers will be able to leverage the features of the CrowdStrike Falcon platform -- EDR, managed threat hunting, single agent architecture, and massive threat telemetry -- to effectively defend enterprise mobile devices.”

Cloud and mobility have completely changed the way employees work, providing speed and flexibility in accessing information, but also exposing the enterprise to yet another threat vector.

The workforce is more reliant than ever on business-critical applications, accessing confidential information from multiple devices anytime, anywhere.

Yet, security teams lack visibility into mobile threat activity due to inadequate and complex solutions that are difficult to implement.

IDC research vice president Frank Dickson says, “The targeting of mobile devices is a growing attack vector, yet, up until this point, mobile security has failed to provide adequate protection for the millions of devices that enter corporate networks every day, leaving organisations especially exposed given the growing need to deliver large amounts of corporate data to BYOD devices.

“The use of disparate solutions with little or no integration between the mobile endpoint and enterprise defence tools has left vulnerabilities in organisations’ security stance that attackers can exploit.”

Falcon for Mobile key features include:

  • Visibility -- Security teams have instant visibility into enterprise app behaviour on Android and iOS devices to protect sensitive corporate data. Falcon for Mobile also makes it fast and easy to identify vulnerable devices by providing real-time visibility into device health and security posture.

  • Proactive threat hunting -- Organisations can perform proactive threat hunting on mobile devices, leveraging new telemetry types such as mobile network activity, clipboard actions, and peripherals monitoring.

  • Enterprise application behaviour monitoring -- Falcon for Mobile monitors enterprise app behaviour on Android and iOS devices to enable security teams to uncover malicious or unwanted activity in their business-critical apps. On Android, its exclusive dynamic application shielding provides enhanced monitoring of enterprise apps, further protecting sensitive corporate data.

  • Single interface -- Telemetry from traditional endpoints is presented alongside telemetry from mobile devices in a single interface to enable rapid, comprehensive security incident investigations.

  • Privacy-by-Design -- Falcon for Mobile focuses on customer-designated corporate apps with no monitoring of personal applications on the device such as text messaging, email, photos, or browsing history.

  • Lightweight agent -- Sensors for Android and iOS are extremely high performance and lightweight with a nominal effect on battery life and data bandwidth usage of a device.

  • Seamless integration -- Falcon for Mobile is fully integrated with the CrowdStrike Falcon platform, natively delivering Falcon threat intelligence and Falcon OverWatch services with no extra implementations or integrations.

CrowdStrike recently launched the CrowdStrike Store, a unified cloud security ecosystem that opens the CrowdStrike Falcon platform to third-party applications, and allows customers to discover, try, buy, and deploy partner applications and add-ons alongside the Falcon platform.

Privacy: The real cost of “free” mobile apps
Sales of location targeted advertising, based on location data provided by apps, is set to reach $30 billion by 2020.
Myth-busting assumptions about identity governance - SailPoint
The identity governance space has evolved and matured over the past 10 years, changing with the world around it.
Forrester names Crowdstrike leader in incident response
The report provides an in-depth evaluation of the top 15 IR service providers across 11 criteria.
Slack doubles down on enterprise key management
EKM adds an extra layer of protection so customers can share conversations, files, and data while still meeting their own risk mitigation requirements.
Security professionals want to return fire – Venafi
Seventy-two percent of professionals surveyed believe nation-states have the right to ‘hack back’ cybercriminals.
Alcatraz AI to replace corporate badges with AI security
The Palo Alto-based startup supposedly leverages facial recognition, 3D sensing, and machine learning to enable secure access control.
Ensign and IronNet partner to create cyber analytics capabilities
The Singapore-based joint venture will form a Cyber Analytics Center for Excellence focused on securing regional enterprises from sophisticated cyber threats.
Unencrypted Gearbest database leaves over 1.5mil shoppers’ records exposed
Depending on the countries and information requirements, the data could give hackers access to online government portals, banking apps, and health insurance records.