SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers
Story image

Zscaler and CrowdStrike release integrations for end-to-end security

Wed, 31st Mar 2021
FYI, this story is more than a year old

Zscaler and CrowdStrike have announced a series of integrations that deliver end-to-end security protection from the endpoint to the application.

This collaboration between the two cloud-native security companies provides joint customers with adaptive, risk-based access control to private applications, enabling improved defence for people working from anywhere, the companies state.

The integration also enables automated workflow between the two platforms through threat intelligence and telemetry data sharing, providing zero-day malware protection, automatic update of inline custom blocklists, and faster data correlation and impact assessment.

The integrations will offer mutual customers four key benefits:

  • ZPA incorporates CrowdStrike's real-time ZTA to enforce access policy to private apps to reduce organisational risks
  • Zscaler Internet AccessTM (ZIATM) deployed inline stops malware propagation by triggering device quarantine through the CrowdStrike Falcon Platform
  • CrowdStrike's Falcon X threat intelligence and Falcon Endpoint Protection device telemetry data can be shared with Zscaler Zero Trust Exchange for usage when integrations are activated to provide stronger protection and increased visibility
  • Cross-platform workflow shortens response time and helps combat increasing volumes and sophistication of attacks

Zscaler is CrowdStrike's first cloud security partner to leverage CrowdStrike Zero Trust Assessment (ZTA) in general availability to enable secure access to applications from any endpoint, regardless of the user or location.

Utilising the expansive telemetry of the CrowdStrike Falcon platform that processes more than five trillion events a week, ZTA grants dynamic conditional access based on continuous real-time security posture assessments of device health and compliance checks.

Through the integration with Zscaler Private AccessTM (ZPATM), access to private applications can be automatically adapted based on the ZTA assessment score and updated access policies from Zscaler.

Zscaler president, chief technology officer and board member, Amit Sinha, says, "Employees are working from anywhere and applications are moving to the cloud.

"The enterprise perimeter doesn't exist anymore, the internet is the new corporate network, and security should follow users and workloads wherever they are.

"Zero trust requires decoupling application access from being on the corporate network and allowing access based on identity, context, and business policies.

"This dramatically reduces an organisation's attack surface and prevents lateral propagation of attacks that we've seen repeatedly when organisations rely on legacy firewall and network-centric solutions."

CrowdStrike chief technology officer Michael Sentonas says, "Recent high profile attacks involving compromised credentials have served as a moment of truth for organisations struggling with expanding remote workforces, growth of cloud applications, and an increasingly complex threat landscape.

"Modern organisations need to embrace an identity-centric approach to security with a mature zero trust architecture that is dynamic and end-to-end, automating workflows that ensure verified access across endpoints, networks, workloads, and devices.

"Zero trust must be the de facto standard in todays work-from-anywhere world."

As distributed workforces continue to grow and increasingly expose corporate environments to intensifying cyber threat activity, an identity-centric zero trust strategy must be implemented to ensure that access is verified and that organisational risks are minimised, the companies state.

Zscaler and CrowdStrike first partnered in 2019 to integrate the CrowdStrike Falcon platform with Zscaler's cloud security platform to provide customers with real-time threat detection and automated policy enforcement to improve security across networks and endpoints.

Follow us on:
Follow us on LinkedIn Follow us on X
Share on:
Share on LinkedIn Share on X