Crowdstrike Zero Trust Solutions
Crowdstrike Zero Trust Solutions
CROWDSTRIKE
ZERO TRUST
A frictionless Zero Trust approach to stop
modern attacks in your enterprise
The CrowdStrike Zero Trust solution secures the modern Stop breaches such as supply chain attacks, ransomware exploits
enterprise with its cloud-delivered approach to stop and other sophisticated threats in real time from any endpoint,
breaches in real time on any endpoint, cloud workload workload and meet cyber insurance requirements
or identity, wherever they are. CrowdStrike does all of
the heavy lifting for enterprise security teams to enforce
Realize frictionless Zero Trust security with high-fidelity cloud-
frictionless Zero Trust with its industry-leading CrowdStrike delivered attack correlations, behavioral risk analytics and policy
Security Cloud — the world’s largest unified, threat-centric enforcement, and reduce the blast radius across on-premises and
data fabric to stop breaches. The CrowdStrike Security multi-cloud data centers
Cloud processes trillions of events, enabling hyper accurate
attack correlation and real-time threat analytics and
Improve security operations center (SOC) analysts’ mean time to
response that can scale any deployment model, whether effectively detect and respond to evolving adversarial tactics by
they are multi-cloud or hybrid enterprises that may also run reducing the need for cumbersome log analysis
legacy and proprietary applications.
CrowdStrike Solutions
KEY CAPABILITIES
CrowdStrike follows the NIST SP 800-207 framework, widely followed by governments and
private organizations, to enable security in the cloud-first, work-from-anywhere environment.
REQUESTOR DATA
CHALLENGE/BLOCK
SECURITY CLOUD ALLOW
SENSOR/AGENT RESOURCES
Endpoint Threat Graph PUBLIC CLOUD
Identity PRIVATE CLOUD
Risk Engine
Workload DATACENTER
ALLOW
CHALLENGE/BLOCK
Policy Engine
API ZTA
SSO, AD, AZURE AD, SIEM, SOAR, IDENTITY PROVIDERS,
50+ INTEGRATIONS SECURE ACCESS, OTHERS
imit the attack surface with segmentation: Limit the scope of what applications can
L
do; control where regular users, third-party contractors and privileged users can go; and
limit what service accounts can access with segmentation. Apply the principles of least
privilege and dynamic risk assessment to reduce the attack surface.
utomate security tied to context: Use signals from users, devices, networks and
A
workloads to gain unified visibility, improve analytics, enforce policies and automate
security — all tied to context to improve the fidelity of alerts and incident response.
ontinuously verify accesses with the least friction: Verify every access to applications,
C
resources and workloads with deep knowledge of the risks and deviations, and not based
on trust or access timeouts (i.e., continuously monitor what’s happening even after granting
access to a resource). The key is to verify access continuously without degrading the user
experience or affecting business productivity.
CrowdStrike Solutions
OPTIMIZE
PROTECTION
M I T I GAT E
• Enhance UX with intelligent
conditional access
V I SUALI Z E • Protect endpoints, • Extend MFA to improve
identities, workloads in security coverage
real time with behavioral • Assess and share endpoint
• Discover endpoints, and real-time analytics security posture
identities, applications • Automatically segment • Unlock the full potential
• Visualize attack paths identities of frictionless Zero Trust
• Discover and assess • Enrich telemetry with with CrowdStrike Zero Trust
multi-cloud workloads threat context and intel Ecosystem partners
ADOPTION
By adopting frictionless CrowdStrike Zero Trust aligned with the key principles described, the
enterprise can maximize enterprise-wide coverage across endpoints, identities, and applications
and workloads, with rapid and scalable deployment.
Purpose-built in the cloud with a single lightweight-agent architecture, the CrowdStrike Zero
Trust solution provides automated protection and remediation, elite threat hunting and prioritized
observability of vulnerabilities, with the least friction for users and IT and security teams. With
industry-leading sets of endpoint, workload, container and identity telemetry, threat intelligence
and AI-powered analytics, security teams can automatically predict and prevent modern threats in
real time. CrowdStrike’s cloud-native approach is the only solution that empowers security teams to
achieve Zero Trust protection without the combined overhead of managing terabytes of data, threat
feeds, hardware and software, and related ongoing personnel management costs.
The enterprise can start the Zero Trust journey with CrowdStrike Identity Protection solution
and extend the CrowdStrike Zero Trust solution to cover the other most vulnerable areas such
as endpoints or workloads. Falcon sensors can be deployed in minutes to tens of thousands of
endpoints in a day.
Existing CrowdStrike customers can easily continue their Zero Trust journey with the power of the
CrowdStrike Security Cloud, without additional hardware, storage provisioning and personnel costs.
VISUALIZE
CrowdStrike Zero Trust provides granular visibility across endpoints, users and multi-cloud
workloads to help security teams understand what’s happening in hybrid environments and
accurately assess threats and attack paths.
CrowdStrike Solutions
Discover all endpoints, identities and applications: Discover managed and unmanaged
endpoints and identify systems that could be a risk on the network, such as unprotected
“bring your own device” (BYOD) or third-party systems, with the inventory of all systems in
the network. Discover privileged account activity with complete visibility of the usage and
creation of administrator credentials to identify unusual behavior across on-premises and
cloud environments. Understand application inventory along with unwanted and vulnerable
applications. Identify all applications that are running in your enterprise, along with versions,
hosts and users. Visualize suspicious applications in the network, and pinpoint unprotected or
unmanaged applications that impact security posture.
Get full attack visibility across endpoints, identity stores, workloads and container
environments: Unravel an entire attack happening across endpoints in an intuitive process tree
with complete context enriched with threat intelligence data. Gain multi-directory identity store
visibility to understand the scope and impact of identities and their privileges across Microsoft
Active Directory (AD) and Azure AD. Integrate with single sign-on (SSO) and federation solutions,
such as Active Directory Federation Services (AD FS), PingFederate and Okta to get the big
picture of what users are doing in the organization. Get visibility into cloud workloads and
container environments, identify images, registries and libraries, and understand file access,
network communications and process activity with full visibility into running containers.
Discover and assess multi-cloud workloads: Automatically discover existing cloud workload
deployments with real-time information about workloads including context-rich metadata about
system size and configuration, networking, and security group information for AWS, GCP and
Azure. Understand the security posture by identifying workloads that are not protected by the
Falcon platform. Get complete visibility into the container footprint across on-premises and cloud
deployments.
MITIGATE
Powered by the CrowdStrike Security Cloud, detect and stop threats in real time with automatic
segmentation and high-fidelity threat correlations.
Protect endpoints, identities and workloads from malicious attacks: Protect Windows,
Windows Server, macOS and Linux endpoints from ransomware, malware and fileless attacks by
combining machine learning, artificial intelligence (AI), indicators of attack (IOAs), exploit blocking
and more. Protect hybrid identity stores, assess directory configuration and continuously
analyze every user account across on-premises and cloud identity stores with visibility into live
authentication traffic and encrypted protocol usage (e.g., LDAP/S). Protect cloud workloads and
containers from malware, and investigate and stop malicious behavior early. Prevent attacks on
container-based applications by uncovering hidden threats in open source packages and third-
party images.
Detect and respond to incidents without manual threat correlations: Automatically detect
and prioritize malicious and attacker activity with IOAs. Contain and investigate compromised
systems with powerful response actions through intelligent endpoint detection and response
(EDR). Mitigate identity threats in real time, without using logs and time-consuming analysis.
Detect and prevent reconnaissance (e.g., LDAP, BloodHound, credential compromise attacks),
lateral movement (e.g., RDP, Pass-the-Hash (PtH), Mimikatz tool, interactive service logins), and
persistence (e.g., Golden Tickets, privilege escalation) with advanced analytics and correlation in
the CrowdStrike Security Cloud.
CrowdStrike Solutions
Reduce costs and management overhead: Reduce false positives with high-fidelity
telemetry from endpoints, workloads and identities distributed across the hybrid enterprise.
Powered by petabytes of data at scale, detect new and unusual threats in real time with deep
AI and behavioral analysis from endpoints, identities and workloads, and take the appropriate
action based on policies. Eradicate threats with precision using powerful response actions,
and contain compromised systems to stop attacks before they become breaches. Reduce
SIEM and UEBA costs by sending only those curated/analyzed authentication and incident
logs, instead of gigabytes of data dump that require finding the needles in the haystack
by writing the detection rules. Because authentication, endpoint and workload anomalies
are monitored and detected by the CrowdStrike Security Cloud, there’s no need to write
correlation rules in SIEM and UEBA solutions.
Enrich telemetry with threat intelligence: Identify new campaigns associated with known
threat actors by enriching the telemetry with context about real-world threats. Automatically
identify and investigate nation-state, eCrime and related threats with reduced manual effort.
OPTIMIZE
Provide maximum Zero Trust security coverage across the organization, improve the user
experience and leverage CrowdStrike’s Zero Trust ecosystem partners as you scale up your
Zero Trust journey.
Enhance the user experience with intelligent conditional access: Define and enforce
access policies with simple rules, based on authentication patterns, behavior baselines and
individual risk scores. Ensure consistent login experience for genuine users while enforcing
identity verification when the risk increases.
Extend multifactor authentication (MFA) to improve security posture: Increase ROI and
reduce the attack surface by extending MFA to any resource or application, including those
on-premises legacy/proprietary systems and tools (e.g., PowerShell and protocols such as
RDP over NTLM) that could not be integrated with MFA solutions.
Assess and share endpoint security posture: With real-time security posture assessment
scores, determine endpoint health across the enterprise. Maximize security by identifying
and updating sensor policies and OS settings that are non-compliant and increase risk.
Enforce real-time conditional access to resources from compliant endpoints by sharing the
assessment scores with CrowdStrike Zero Trust ecosystem partners.
Leverage APIs to connect your favorite tools: Integrate third-party and custom security
solutions with the CrowdStrike Security Cloud. Unlock the full potential of frictionless Zero
Trust with CrowdStrike Zero Trust Ecosystem partners. In addition to APIs, CrowdStrike
Zero Trust Assessment (ZTA) provides pre-integrations with the CrowdStrike Zero Trust
ecosystem partners including Zscaler, Okta, Proofpoint and Netskope.
CrowdStrike Solutions
ABOUT CROWDSTRIKE
CrowdStrike Holdings, Inc. (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern
security with one of the world’s most advanced cloud-native platforms for protecting critical areas of
enterprise risk – endpoints and cloud workloads, identity and data.
Powered by the CrowdStrike Security Cloud, the CrowdStrike Falcon® platform leverages real-time
indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across
the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat
hunting and prioritized observability of vulnerabilities.
Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform enables
customers to benefit from rapid and scalable deployment, superior protection and performance, reduced
complexity and immediate time-to-value.
© 2022 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat
Graph are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and
in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to
identify their products and services.