Story image

CrowdStrike announces endpoint detection for mobile devices

06 Mar 2019

Endpoint protection provider CrowdStrike has released an enterprise endpoint detection and response (EDR) solution for mobile devices.

Based on CrowdStrike’s proven EDR technology for enterprise endpoints, Falcon for Mobile enables security teams to hunt for threats on mobile devices and provides visibility into malicious, unwanted, or accidental access to sensitive corporate data, while protecting user privacy and without impacting device performance.

Leveraging CrowdStrike’s cloud-native platform and single-agent architecture, customers extend their investment with CrowdStrike Falcon for mobile EDR protection.

With Falcon for Mobile, security teams have real-time visibility into mobile device activity to quickly identify, investigate and remediate threats.

The comprehensive mobile solution also integrates Falcon threat intelligence to provide guidance in mobile threat hunting activities, and Falcon OverWatch to proactively hunt for threats on mobile devices 24/7/365.

“We continue to expand the capabilities of the CrowdStrike Falcon platform, leveraging its cloud-native architecture built to protect the endpoint and stop the breach on every platform - workstations, servers, cloud workloads, containers, and now also mobile devices,” says CrowdStrike co-founder and chief executive officer George Kurtz.

“With today’s announcement of Falcon for Mobile, customers will be able to leverage the features of the CrowdStrike Falcon platform -- EDR, managed threat hunting, single agent architecture, and massive threat telemetry -- to effectively defend enterprise mobile devices.”

Cloud and mobility have completely changed the way employees work, providing speed and flexibility in accessing information, but also exposing the enterprise to yet another threat vector.

The workforce is more reliant than ever on business-critical applications, accessing confidential information from multiple devices anytime, anywhere.

Yet, security teams lack visibility into mobile threat activity due to inadequate and complex solutions that are difficult to implement.

IDC research vice president Frank Dickson says, “The targeting of mobile devices is a growing attack vector, yet, up until this point, mobile security has failed to provide adequate protection for the millions of devices that enter corporate networks every day, leaving organisations especially exposed given the growing need to deliver large amounts of corporate data to BYOD devices.

“The use of disparate solutions with little or no integration between the mobile endpoint and enterprise defence tools has left vulnerabilities in organisations’ security stance that attackers can exploit.”

Falcon for Mobile key features include:

  • Visibility -- Security teams have instant visibility into enterprise app behaviour on Android and iOS devices to protect sensitive corporate data. Falcon for Mobile also makes it fast and easy to identify vulnerable devices by providing real-time visibility into device health and security posture.

  • Proactive threat hunting -- Organisations can perform proactive threat hunting on mobile devices, leveraging new telemetry types such as mobile network activity, clipboard actions, and peripherals monitoring.

  • Enterprise application behaviour monitoring -- Falcon for Mobile monitors enterprise app behaviour on Android and iOS devices to enable security teams to uncover malicious or unwanted activity in their business-critical apps. On Android, its exclusive dynamic application shielding provides enhanced monitoring of enterprise apps, further protecting sensitive corporate data.

  • Single interface -- Telemetry from traditional endpoints is presented alongside telemetry from mobile devices in a single interface to enable rapid, comprehensive security incident investigations.

  • Privacy-by-Design -- Falcon for Mobile focuses on customer-designated corporate apps with no monitoring of personal applications on the device such as text messaging, email, photos, or browsing history.

  • Lightweight agent -- Sensors for Android and iOS are extremely high performance and lightweight with a nominal effect on battery life and data bandwidth usage of a device.

  • Seamless integration -- Falcon for Mobile is fully integrated with the CrowdStrike Falcon platform, natively delivering Falcon threat intelligence and Falcon OverWatch services with no extra implementations or integrations.

CrowdStrike recently launched the CrowdStrike Store, a unified cloud security ecosystem that opens the CrowdStrike Falcon platform to third-party applications, and allows customers to discover, try, buy, and deploy partner applications and add-ons alongside the Falcon platform.

Forescout strengthens investment in OT security
Forescout’s latest features will provide enterprises with improved productivity, lower risk profiles and faster mitigation of threats.
Hybrid cloud security big concern for business leaders
A new study highlights that IT and security professionals have significant concerns around security for hybrid cloud and multi-cloud environments.
GitHub launches fund to sponsor open source developers
In addition to GitHub Sponsors, GitHub is launching the GitHub Sponsors, GitHub will match all contributions up to $5,000 during a developer’s first year in GitHub Sponsors.
Check Point announces integration with Microsoft Azure
The integration of Check Point’s advanced policy enforcement capabilities with Microsoft AIP’s file classification and protection features enables enterprises to keep their business data and IP secure, irrespective of how it is shared. 
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Container survey shows adoption accelerating while security concerns remain top of mind
The report features insights from over 500 IT professionals.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.