Crowdstrike expands cloud-native falcon platform with new firewall management module
Crowdstrike inc. announced a new firewall management module and other updates to its cloud-native crowdstrike falcon platform at its third annual user conference, fal.con unite in san diego, california. with falcon firewall managementtm, crowdstrike delivers simple, centralized host firewall management to help customers transition from legacy endpoint suites to crowdstrike’s next-generation solution, providing comprehensive protection, improved performance and efficiency in managing and enforcing host firewall policies. falcon firewall management offers simple, cross-platform, management of host/os firewalls from the falcon console, providing customers with enhanced protection from network threats and enables security teams to granularly contain any threat exposure. delivered via the single, lightweight agent and cloud-native architecture of falcon, this module is immediately operational with no additional impact on the host. from initial enablement to ongoing use, customers benefit from 24/7/365 protection. falcon firewall management offers the following benefits to customers; reduced cost and complexity; eliminates the need for on-premises management infrastructure and complex integrations. installation and day-to-day operations are deployed without requiring an additional agent with minimal impact on hosts. increased efficiency; simplifies policy management and increases visibility into endpoint security controls. enhanced protection: strengthens networks against advanced threats by eliminating visibility gaps, as well as complex configuration and management. seamless, cloud-based protection; deploys and is operational within minutes without requiring reboots, fine-tuning, or complex configuration, offering customers peace of mind that they are protected immediately. in addition to announcing falcon firewall management, crowdstrike is introducing multiple platform updates to increase the efficacy of falcon. platform enhancements include the following; comprehensive visibility with falcon spotlight: new functionality includes enhanced reporting on a wide range of applications, such as desktop applications, server software and more. spotlight will also deliver significant enhancements in reporting, sophisticated visualizations and vulnerability trending, as well as an all-new vulnerability application programming interface (api), unlocking streamlined vulnerability management workflows and risk reduction, extensive container protection via falcon insight:crowdstrike is expanding its endpoint detection and response (edr) container capabilities by capturing even more detailed container activity and metadata, and providing full visibility into containers with the single lightweight falcon agent without any deployment on containers. this allows security teams to secure the container workloads without adding any friction to devops teams. by incorporating information such as containerid, images, mode, configuration type, etc., falcon insight enables and accelerates critical detection, investigation and threat hunting tasks to be performed on containers, even on ephemeral workloads after the container is decommissioned. falcon supports platforms that conform to the open container initiative (oci) standard, such as docker, and works on premise and on aws, gcp and azure, extended application visibility via falcon discover: enhanced application inventory proactively collects information on all installed applications across the enterprise, providing organizations with continuous awareness of software in use. with this information, organizations can identify and eliminate outdated or insecure applications and software that violates local policies, reducing attack surface and proactively, reducing exposure to threats, increased mobile threat detection for falcon for mobile: crowdstrike is expanding falcon for mobile, the industry’s first mobile edr solution, with proactive threat detections. leveraging falcon for mobile’s unprecedented visibility into malicious, unwanted or accidental activity on mobile devices, detections automatically uncover threats such as communication to known malicious servers, high risk device configurations, unauthorized apps and more.