sb-nz logo
Story image

Proofpoint and CrowdStrike partner on endpoint protection integration

05 Sep 2019

Cybersecurity and compliance company Proofpoint has announced a partnership and integration with cloud-delivered endpoint protection provider CrowdStrike to provide organisations with advanced threat protection across email and endpoints.

In the initial integration, Proofpoint’s advanced Targeted Attack Protection (TAP) security intelligence will feed threat intelligence on malicious email attachments into CrowdStrike Falcon to further enhance device security and stop attackers.

“Companies are struggling day-to-day with protecting their organisations from advanced threats. A new approach is needed to secure devices and data against sophisticated malware and malware-free attacks,” says CrowdStrike business development and channels vice president Matthew Polly.

“We are excited to partner with Proofpoint to provide multi-layer threat protection, so that organisations may gain immediate visibility and context into adversaries and attack vectors to provide better protection for enterprise endpoints.”

The integration between Proofpoint and CrowdStrike will be quick and simple to enable, via cloud-to-cloud APIs, and ensure that joint customers can leverage their detection engines working in concert to stop attacks.

In the first technology integration, Proofpoint will check potentially malicious attachments with CrowdStrike Falcon Intel and will add new hashes to the customer’s custom intelligence.

An alert will then be created if new related malicious content tries to execute on the device.

“Proofpoint and CrowdStrike customers will benefit from our strategic partnership and threat intelligence integration as security teams work to protect their people from increasingly targeted malware attacks,” says Proofpoint cybersecurity strategy executive vice president Ryan Kalember.

“More than 90% of attacks are initiated by email, and nearly all require a user to click on a URL or malicious attachment to activate them, rather than exploiting a technical vulnerability. Our integration with CrowdStrike will provide our joint customers with automated context and visibility to further ensure all endpoints are protected from malicious attachments.”

Joint customers look to Proofpoint Targeted Attack Protection’s threat intelligence to help security teams stay ahead of attackers by detecting, analysing, and blocking advanced threats.

This includes advanced email threats delivered through malicious attachments and URLs, zero-day threats, polymorphic malware, weaponised documents, and phishing attacks.

These capabilities complement CrowdStrike’s Falcon endpoint protection, which unifies next-generation antivirus (NGAV), endpoint detection and response (EDR), managed threat hunting capabilities, and security hygiene — all contained in a single sensor that is cloud-managed and delivered.

The CrowdStrike Falcon platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) to offer real-time protection and visibility across the enterprise and provide an innovative approach to handle advanced threats.

CrowdStrike Falcon combines automated intelligence and human analysis to deliver unparalleled threat intelligence that allows organisations to gain deep, real-time visibility into endpoint activity, threat investigation and remediation to quickly stop breaches.

Story image
Why it’s essential to re-write IT security for the cloud era
Key components of network security architecture for the cloud era should be built from the ground up, as opposed to being bolted on to legacy solutions built for organisations functioning only on-premises or from only managed devices.More
Story image
Revealed: The behaviours exhibited by the most effective CISOs
As cyber-threats pile up, more is being asked of CISOs - and according to Gartner, only a precious few are 'excelling' by the standards of their CISO Effectiveness Index.More
Story image
Ripple20 threat could affect 35% of all IT environments – ExtraHop
The vulnerabilities have the potential to ‘ripple’ through complex software supply chains, enabling attackers to steal data or execute code.More
Story image
McAfee finds vulnerabilities in 'temi' the videoconferencing robot
Temi is commonly used in environments including businesses, healthcare, retail, hospitality, and other environments including the home.More
Story image
The SASE triangle: How a CASB protects managed apps
Enterprises that fail to adapt to the modern business world when it comes to security are likely to fall prey to data breaches and experience a host of other problems, writes Bitglass product marketing manager Will Houcheime.More
Story image
Gartner: By 2023, 65% of the world will have personal data covered under modern privacy regulations
“Security and risk management (SRM) leaders need to help their organisation adapt their personal data handling practices without exposing the business to loss."More