Challenge Crowdstrike Overview S PDF
Challenge Crowdstrike Overview S PDF
CROWDSTRIKE
CUSTOMER CHALLENGES ARE FACING
§ Endpoint Protection Silo… lack of visibility to understand root cause and remediate
(by endpoint types e.g. PC, Server, Cloud VM, containers)
§ Limited telemetry data from endpoint (E.g. server )
§ Cannot find root cause of problems (process tree)
§ High TCO to run EPP but still getting breached
(Management servers, signature updates, endpoint performance exhausted, admin
staff hours)
§ The vulnerability is increasing everyday both Know and Unknow(in 2021 18,xxx
vulnerabilities).
§ How to be secured from the technology silent failure
§ Don’t know who is attacking us and don’t know how to fight back.
What is CrowdStrike Mission?
WE STOP BREACHES
CROWDSTRIKE
NON-MALWARE
MALWARE ATTACKS
YOU NEED COMPLETE
BREACH
40% PREVENTION
60%
HIGH
HARDER TO PREVENT
NON-MALWARE
ATTACKS
LOW
& DETECT
THREAT
SOPHISTICATION
LOW
MALWARE
1 3 5 7 9 11
2 4 6 8 10 12
12
11
BREAKOUT TIME
10
9
8
1 2 3 4 5 6 7
Initial Execution Persistence Privilege Defense Credential Discovery Lateral Collection Exfiltration Command Impact
Access Escalation Evasion Access Movement & Control
SIGNATURELESS APPROACH
40% MALWARE 60% NON-MALWARE
BEHAVIORAL
ANALYSIS
MACHINE PROCESS
EXECUTES
LEARNING
PROCESS DELETES
AI BACKUPS
7 TRILLION
EVENTS/WEEK
155
ADVERSARIES TRACKED
MACHINE
LEARNING PREVENT ZERO DAY
FALCON
AGENT
INDICATOR
OF ATTACK
SIMPLIFIED
ARCHITECTURE
PROTECTING EVERY ENDPOINT EVERYWHERE
ST
CO
F RA
IN
NO
~35 MB IN
NO RESTART
MEMORY
STOPPING BREACHES WITH TECHNOLOGY, EXPERTISE, THREAT INTEL
EPP Magic Quadrant 2021 Managed Detection and Response, Q1 2021 Threat Intelligence Service, Q1 2021
TIVE
HIDDE PROAC ING
N HUN T
ADVAN
CED
TTPs EDR
Machine
C1O
. 0M
Known*
0M0 .O
0D0 I0T
M
M AALLW WAARREE Y N G A Va r n i n g
& ne Le is
KNPO ER M ac h io r al A n aly s
WD NATYT P s Be h a v i
SIGNA
TU
HAS FA RE
ILED
2020 CROWDSTRIKE, INC. ALL RIGHTS RESERVED.
24X7 MANAGED
THREAT HUNTING
SOC
SENSOR – CCTV FOR ENDPOINTS
CAPTURE ALL ACTIVITY
(ATTACKERS AND USERS)
FALCON
AGENT
WORKLOAD COVERAGE
Threat Hunting - Sample notification to inform customers threat
SOC2
SSL
MACHINE
SOC LEARNING SENSOR – CCTV FOR ENDPOINTS
CAPTURE ALL ACTIVITY
FALCON
(ATTACKERS AND USERS)
INDICATOR AGENT
OF ATTACKS
WORKLOAD COVERAGE
POST REMEDIATION
INTELLIGENCE
Remediation Actions taken
Detection Information
Host/User Information
IP Address
1 2 3
No infrastructure No fine-tuning, Install the Verify the No reboot No signatures No scan Remove legacy
setup rule writing Falcon Agent installation updates products
CROWDSTRIKE
FALCON PLATFORM PROTECTS ALL WORKLOADS