Magazine Button
CrowdStrike introduces first cloud threat hunting service dedicated to stopping advanced cloud-based attacks

CrowdStrike introduces first cloud threat hunting service dedicated to stopping advanced cloud-based attacks

CloudCybersecuritySoftwareTop Stories

CrowdStrike, a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, has introduced Falcon OverWatch Cloud Threat Hunting.

This is the industry’s first standalone threat hunting service for hidden and advanced threats originating, operating or persisting in cloud environments.

Armed with the industry’s first cloud-oriented indicators of attack (IOAs) for the control plane and detailed adversary tradecraft, Falcon OverWatch Cloud Threat Hunting delivers unparalleled visibility into cloud environments to observe and disrupt the most sophisticated cloud threats.

Rapid adoption of cloud-native architectures have opened up new, broader attack surfaces and security teams are often left in the dark without visibility or the requisite skill sets to hunt continuously around the clock for sophisticated threats across these complex cloud environments.

As a result, adversaries are finding cloud assets and exploiting them faster than security teams can discover them.

Leveraging CrowdStrike’s agent-based and agentless Cloud Native Application Protection Platform (CNAPP) capabilities, Falcon OverWatch cloud threat hunters investigate suspicious and anomalous behaviors and novel attacker tradecraft.

Falcon OverWatch Cloud Threat Hunting conducts 24x7x365 operations and can prevent incidents and breaches while proactively alerting customers to cloud-based attacks.

“CrowdStrike pioneered the concept of blending industry-leading technology with proactive threat hunting to deliver truly comprehensive protection that closes the gap between detection and response,” said Shawn Henry, CrowdStrike Chief Security Officer and President of CrowdStrike Services.

Click below to share this article

Browse our latest issue

Intelligent CISO

View Magazine Archive