sb-as logo
Story image

CrowdStrike acquires Preempt Security for $96m, develops zero trust security offerings

CrowdStrike will acquire Preempt Security with the intention of offering customers enhanced zero trust security capabilities.

Under the terms of the agreement, CrowdStrike will pay approximately US$96 million to acquire Preempt Security, subject to adjustments.

The acquisition is expected to close during CrowdStrike’s fiscal third quarter, subject to customary closing conditions.

Together, CrowdStrike and Preempt will provide a modern zero trust security architecture and threat protection to keep organisations users, endpoints, and data safe from modern attacks, without compromising productivity or the user experience, the companies state.

Combining workload security with identity protection is key when establishing true zero trust environments, CrowdStrike states.

With this acquisition, the company plans to offer customers enhanced zero trust security capabilities and strengthen the CrowdStrike Falcon platform with conditional access technology.

The addition of Preempt's technology to the CrowdStrike Falcon platform will help customers achieve end-to-end visibility and enforcement on identity data.

In a statement, CrowdStrike states the acquisition was undertaken due to the growing trend of customers are actively looking for solutions that enhance their ability to detect advanced adversaries and network attacks, including insider threats.

As organisations continue to operate in hybrid work environments and focus on digital transformation, the need to establish a modern zero trust security environment at scale has never been greater, the company states

According to Forrester, with the loss of a physical perimeter in protecting applications and data from external and internal threats, the people domain of zero trust extended (ZTX) is one of the most dynamically changing and growing areas.

CrowdStrike co-founder and CEO George Kurtz says, “Hybrid work environments will become the norm for many organisations which means that zero trust security with an identity-centric approach and detecting threats in real-time are critical for business continuity.

"With the addition of Preempt Security's capabilities, the CrowdStrike Falcon platform will provide enhanced protection against identity-based attacks and insider threats.

“Combining Preempt's technology with the CrowdStrike Falcon platform will help customers achieve end-to-end visibility and enforcement through identity, behaviour and risk-based decisions to stop attacks in real time.”

Founded in 2014 by Ajit Sancheti and Roman Blachman, Preempt has a modern approach to authentication and securing identity, delivering the market's first zero trust and conditional access solution for continuously detecting and preempting threats based on identity, behaviour and risk.

Preempt's patented technology allows enterprises to optimise identity hygiene and stop attackers and insider threats in real-time before they can impact business, the company states.

Preempt co-founder and CEO Ajit Sancheti says, “We are thrilled about joining CrowdStrike, the industry leader in stopping breaches that shaped modern endpoint security and pioneered the security cloud.

“Combining Preempt's identity security expertise with CrowdStrike’s incredible scale and threat telemetry, we will be able to offer customers complete protection for hybrid workloads and remote workforces wherever they are."

Story image
Network visibility is the crux of security in 2020
Resilience sits at the heart of security, and there is a need for organisations’ architecture, processes and strategies to be more impervious in order to continue to ensure protection, writes Gigamon A/NZ manager George Tsoukas.More
Story image
Interview: How cyber hygiene supports security culture - ThreatQuotient
We spoke with ThreatQuotient’s APJC regional director Anthony Stitt to dig deeper into cyber hygiene, security culture, threat intelligence, and the tools that support them.More
Link image
Why the threat of ransomware requires quality resources to keep it at bay
With this ransomware prevention kit, learn actionable tactics for IT departments on how to manage backups and enable staff so that ransomware is a managed and controlled risk.More
Story image
Microsoft is most imitated brand for phishing attacks in Q3
Popular phishing tactics using the Microsoft brand used email campaigns to steal credentials of Microsoft accounts, luring victims to click on malicious links which redirect them to a fraudulent Microsoft login page. More
Story image
Microsoft takes legal action to disrupt botnet and combat ransomware
Microsoft has announced it took action to disrupt a botnet, Trickbot, one of the world's most infamous botnets and prolific distributors of malware and ransomware.More
Story image
Radware launches DDoS protection for online gaming
“Online games are a massive, multi-billion-dollar industry, but they frequently fall victim to powerful and targeted DDoS attacks,"More