fbpx

Representative offices 

Request callback
btn

Сrowdstrike named leader in security Threat Detection, Response and Investigation of cyberincidents (MDMR)!

News

CrowdStrike CrowdStrike continues the good news streak, earning the highest scores on 11 criteria as well as in the market presence category in The Forrester Wave: Managed Detection And Response (MDR) for Q1 2021, making it a leader in its class.

As a reminder, the CrowdStrike Falcon X product was named the Forrester leader among Threat Intelligence providers last week. If you are new to this news, we recommend reading the full overview of the benefits for which CrowdStrike has received the highest marks and is universally recognized here.

CrowdStrike leverages the threat intelligence it collects through incident response and Falcon endpoint protection platforms, integrating organic threat intelligence from these sources into its MDR service delivery approach and delivering significant value to customers. In the Forrester report, CrowdStrike scored the highest possible score on 11 out of 19 criteria.

Based on the report, MDR will become a must-have in 2021. MDR has been around as a category of solutions for years, but analysts are predicting a sharp rise for the technology in the coming year, moving from a niche product to a necessity for many organizations.

For MDR, speed is one of the most important metrics, as it measures the ability to outrun increasingly sophisticated opponents. Forrester especially notes the speed of Falcon Complete:

  • Time of useful activity. Forrester scored 5/5 for its reactive deployment process, which ensures customers can be fully protected within days of installation, rather than weeks or months like many other vendors.
  • Threat response time. Forrester said customers interviewed highlighted that Falcon Complete's speed of response to security incidents is a key benefit and is key to staying ahead of attackers operating at increased speed. Falcon Complete closely monitors response times by following the 1-10-60 rule. This plays a significant role when cybercriminals can do damage in a matter of hours. In the latest report from CrowdStrike Services Cyber Front Lines, the Falcon Complete team showed that they can detect threats in the first minuteinvestigate in 6 minutes and remediate them in 29 minutes.
  • Quick support response. Customers also reported that general support issues such as help deploying the CrowdStrike Falcon or discovery questions were quickly and efficiently resolved by the Falcon Complete team.

CrowdStrike customer feedback highlights the speed with which the vendor responds to both detected security incidents and support issues in general, and the process-oriented nature of investigations as key strengths. Forrester also gave Falcon Complete the highest score possible for its presence in the market for MDR solutions. In less than three years since its first launch, Falcon Complete has grown to become one of the most widely deployed MDR solutions on the planet, providing 24/7 protection to thousands of customers representing millions of endpoints.


This recognition from Forrester strengthens CrowdStrike's position as the market leader in guided detection and response.

Full report The Forrester Wave: Managed Detection And Response (MDR), Q1 2021

The original source

Back

Falcon X від CrowdStrike визнаний лідер у звіті Forrester Wave: External Threat Intelligence Services за перший квартал 2021 року!

News

Forrester analysts rated Threat Intelligence providers on 26 criteria grouped into three high-level categories:

  • Current offering: Assessment of Analysis Requirements, Baseline Gathering, Information Analysis, Dissemination, Cyber Threats, Risk Analytics, and more.
  • Strategy: product vision, strategic partnerships, business model, and ancillary products and services.
  • Market presence: number of customers and revenue from product line.

CrowdStrike earned the highest possible score in 17 criteria and first place in the Market Presence category, showing us that more customers trust CrowdStrike than any other vendor.

Forrester Wave: External Threat Intelligence Services Q1 2021

Recognition of a company as a leader is associated with an assessment of the quality of the threat analysis life cycle. CrowdStrike defines five stages of the cycle:

  1. Intelligence Requirements: Define plans and targets for intelligence operations.
  2. Raw intelligence: gathering baseline information.
  3. Intelligent Analysis: Answers the questions asked during the requirements phase.
  4. Dissemination: Displays analysis results in a convenient format for end users.
  5. Feedback: Get feedback from customers and improve.

This set of five criteria is critical as they form the foundation upon which each vendor's threat intelligence capabilities are built. CrowdStrike received the highest scores on four of the above five criteria. These ratings confirm that CrowdStrike is unmatched in professionalism and analytics.

CrowdStrike received the highest score in the gathering phase of all vendors. We believe this important criterion highlights CrowdStrike's ability to collect data that no one else can, resulting in threat intelligence that no other vendor can provide.

Given the ratings, it is no surprise to us that CrowdStrike scored the highest possible score on Cyber Threat Intelligence.


CrowdStrike Falcon X enables organizations of all sizes and ages to easily deploy intelligence at the Security Management Center (SOC) and receive best-in-class analytics and technical analysis backed by a dedicated team of intelligence professionals. Based on CrowdStrike Threat Graph telemetry, which correlates over 5 trillion endpoint events per week, data collected from over a million unique sources and reviewed by the CrowdStrike analyst team, which tracks over 150 hacker groups, Falcon X gives organizations insight into tactics, methods and adversary actions, allowing clients to take proactive measures to detect and defend against current and future attacks.

CrowdStrike is also named a leader in The Forrester Wave: Enterprise Detection And Response, Q1 2020 and The Forrester Wave: Endpoint Security Suites (ESS), Q3 2019.

For more information on the benefits that helped Falcon X become a leader see CrowdStrike..

Read the full report The Forrester Wave: External Threat Intelligence Services, Q1 2021.

Back

New Forrester study shows all the economic benefits of using the Falcon Complete!

Articles and reviews

A recent large-scale study commissioned by Forrester Consulting commissioned by CrowdStrike, entitled “The Overall Economic Impact of Using CrowdStrike Falcon Complete,” uncovered the full benefits of CrowdStrike's Managed Detection and Response (MDR) approach.

Based on customer surveys, independent analysis, and financial simulations, Forrester estimates that a customer can save nearly $ 6 million in 3 years, representing an estimated return on investment (ROI) of 403% for Falcon Complete with a ROI in less than three months.

In interviews with a diverse group of Falcon Complete customers, Forrester assessed several distinct benefits that organizations can benefit from using Falcon Complete:


    • Operational efficiency and expansion.
      Organizations gain additional capabilities equivalent to 11 full-time SOC analysts.

    • The risk of being hacked is significantly reduced.
      Forrester's analysis found that the proactive management and customization provided by the Falcon Complete team, coupled with CrowdStrike's breach prevention guarantee, almost eliminates information security risks.

    • Eliminate redundant tools.
      CrowdStrike provides improved protection and performance while reducing costs by replacing many other security tools.

    • Reduced downtime due to security incidents.
      Falcon Complete can fully remediate violations in minutes, rather than relying on reimaging or replacing compromised endpoints.

Naturally, it is necessary to evaluate all the advantages in terms of the cost of certain solutions. Throughout its research, Forrester closely monitored the costs incurred by security services throughout the endpoint security lifecycle, including costs associated with:

    • acquisition and deployment of endpoint protection technologies;

    • 24/7/365 global monitoring and control;

    • 24/7/365 proactive threat search;

    • complete remediation and recovery of systems affected by incidents;

    • service and customization.

Comparing these overarching costs to the benefits organizations get from using Falcon Complete, Forrester has posted an astounding 403% ROI on the product.

More importantly, none of the organizations surveyed reported any serious intrusions since partnering with CrowdStrike Falcon Complete. As a result, Falcon Complete delivers amazing security results at a price far lower than purchasing and creating similar enterprise security environments with other solutions, manpower, and maintenance costs.

You can read the full study here.

Back

iITD is the official partner of the International Grand Forum "BIT & BIS-2021"!

Conference

On March 3, Kiev will host the main event of the domestic ICT market - the International Grand Forum "BIT & BIS-2021"!!


This annual unique industry event promises visitors a unique atmosphere and an impressive informational charge.

Partners and experts of the event will share the latest in the IT industry, their personal experience and advice.

Company iIT Distributionan official partner of the event, together with NetBrain and CrowdStrike, will share their knowledge in the field of information security.

The main problem for cybersecurity departments in most companies remains the lack of the necessary level of automation and visual control over the cyber environment. The lack of an automated mechanism for collecting data, contextual understanding of security incidents and visual control over hidden potential threats in the network significantly increases the risk of an organization becoming a victim of a cyber attack and reduces its confidence in its own security.

That is why Sergey Aleinikov, Head of Technical Department at iIT Distribution, will tell you about CrowdStrike – Identity Threat Detection. A solution for tracking the authentication process, questionable user behavior and detecting threats in real time! Identity Threat Detection correlates events around the user, their activity and the device to improve response to a threat, thereby reducing the need for complex, time-consuming analyzes by SOC employees, and shortening the response time to events.

Expect our second talk from Andrievsky, network engineer at iIT Distribution, who will tell you how to get rid of heavy manual work and save time and money with the Network Automation from NetBrain.

Organizations are constantly adding new solutions and connected devices to their networks. Traffic is increasing, and there is no understanding of the maximum capabilities of many products and ways to provide protection. During the pandemic and the transition to remote work, new devices were added spontaneously, and there was not enough time to fully study the functionality. It is time to structure the work of IT resources and build a unified and functional information security system! How exactly? We are ready to answer all your questions!

Back

CrowdStrike has announced the acquisition of Humio's leading high-performance log management platform!

Release

CrowdStrike introduces the industry-leading next generation XDR data processing platform.

CrowdStrike adds to its portfolio best-in-class Humio a logging and aggregation platform for unlimited, comprehensive event analysis - on-premises or in the cloud. The solution offers 1 TB of downloads per day, in-memory streaming, live, shared dashboards, alerts, analysis and real-time visualization of any events. Founded in 2016, Humio Event Log Management Platform is the fastest and most efficient solution with proven ability to do large scale jobs, making it ideal for extending CrowdStrike's capabilities.

The Humio data platform minimizes the problem of the ever-growing volume of event data and enables users to collect and analyze this data (structured or unstructured) at full scale. Leading organizations around the world such as Aruba HPE, Bloomberg, Decisiv and others have chosen Humio for the best technology and performance.

Humio will help CrowdStrike deliver a deeper, index-free XDR at a speed and scale that no other vendor can match. This EDR and XDR partnership is based on a combination of endpoint event logging with network visibility, account and identity management, and massive telemetry of all workloads, whether they are on-premises, in the cloud, or even deployed in a container.

Humio and CrowdStrike togetherwill create an enterprise-grade solution that solves the challenge of handling large and growing volumes of event data by empowering organizations to collect, observe, analyze and interact with all the structured and unstructured data in their environment to help meet enterprise IT challenges. including within the framework of the DevOps and DevSecOps models.

Customers and partners will be able to take advantage of the new data collection capabilities of the CrowdStrike Falcon platform to provide better analytics, threat detection and inter-event connectivity. All of this is delivered through a single intelligent server with great speed and efficiency.

CrowdStrike continues to innovate and improve its platform to solve real-world end-user problems, enriching it with additional capabilities.

Contact the iIT Distribution team , the official distributor of CrowdStrike, to learn more about the CrowdStrike Falcon platform and its new features!

Full release by the link.

Back

Crowdstrike's response to recent supply chain attacks

News

You have probably heard the latest news that attackers have used SolarWinds software to access corporate networks of many large institutions around the world.

An important signal is that after this kink, SolarWinds became a customer of CrowdStrike. This is a special message to our partners to keep you updated.

WHAT HAPPENED?

The recent high-profile disclosure of a supply chain attack on software by advanced attackers made it clear that identity-centric attacks are now an integral part of the kinks. Attacks that exploit this type of vulnerability, based on the use of "lateral movement" for further actions when performing penetrations. In doing so, they use valid credentials to access the victim's corporate network, as this approach leaves fewer traces of presence. In fact, after attackers gain access to the victim's network, the attack uses multiple credentials, making it even more difficult to detect.

HOW DOES CROWDSTRIKE PROTECT CUSTOMERS?

The most important thing to know is that CrowdStrike clients are protected from recent attacks! The CrowdStrike Intelligence Team obtained various trojanized binaries and reverse engineering them for additional details, including Indicators of Compromise (IOC) and Indicators of Attack (IOA), in addition to those publicly disclosed. All harmful hostnames, IP addresses, URLs, binary hashes, registry keys and other IOCs have been added to CrowdStrike ThreatGraph. CrowdStrike analysts have added two dozen new IOAs to detect tradecraft, signaling real host compromise, as opposed to detecting the simple presence of trojanized modules. In addition, the company has deployed various tools and capabilities on the Falcon platform to help facilitate the identification of potentially affected hosts, in particular:

  • A new SUNBURST vulnerability dashboard that identifies hosts with IOCs associated with this vulnerability, including the ability to inspect, endpoint devices have compromised files in the last 90 days.
  • The scorecard allows customers to determine if there has been evidence of file or host damage over the past year.
  • Finally, customers can see Sunburst IOC detections on hosts with Cloud ML detection enabled.

CrowdStrike launched the Sunburst public information site so that organizations can learn how to avoid the harmful effects of this fracture. This website provides information on how organizations can determine if they are not compromised, what can be done to remediate breaches, and how to protect infrastructure.

Please refer your clients to the Resource Center CrowdStrike,
https://www.crowdstrike.com/sunburst/ to learn more about how they can protect their corporate network from the threat Sunburst.

Back

Intelligent IT Distribution takes part in the third annual international forum "Cybersecurity - protect business, protect the state"

News

On the 6-th of October 2020 in Kyiv the Third Annual International Forum "Cybersecurity - Protect Business, Protect the State"was held in Kiev, in which iIT Distribution acted as a partner and sponsor.

We thank the organizers of the CIS Events Group and the Chamber of Commerce and Industry of Ukraine.We believe that the support of such state structures as the National Security and Defense Council of Ukraine, the State Service for Special Communications and Information Protection of Ukraine and the Cyberpolice shows that cybersecurity is finally being brought to the level of state strategy.

The Month of Cybersecurity, which has been held in Ukraine for three years in a row, received wide support in society, provided an opportunity to focus the attention of state structures, business and civil society on the urgency of problems, confirmed the effectiveness of public-private interaction in the development of safe cyberspace in Ukraine.

We, as a specialized IT distributor, presented at our booth at this event such partners as CrowdStrike (the world's number 1 leader in endpoint security) and GTB Technologies (a leading developer of solutions for protecting confidential information - DLP)Also with our support Alexander Pogrebnoy, the solution Manager of GTB Technologies, presented an informative and interesting report - "The hidden threat - the most unexpected points of information leakage".

The topic of cybersecurity today is no longer just a hype, it is a necessity of today. Our team iIT Distribution professionally works in the field of digital information protection and represents the best manufacturers on the market. Join us!

Back

Fal.Con 2020 by CrowdStrike

Conference

16.10.2020

CrowdStrike, the industry leader in cybersecurity, is inviting you to Falcon 2020. By joining this virtual event, you can choose from 70 training sessions that cover the hottest data protection topics.

IIT Distribution is an exclusive distributor of CrowdStrike products in Ukraine.

Fal.Con 2020 is an event that anyone interested in cybersecurity should attend.

Participants will be able to choose from panel presentations and training modules, participation in which will help develop effective strategies for their companies, increase their preparedness to counter cyber threats and effectively prepare their organization for functioning in today's threat landscape.

There are some of the planned reports below.

Time SessionsLecturer (s)
12:35 – 1:05 p.m. Moderator: Michael Sentonas, CTO, CrowdStrike

Work smarter: use AI for sound decisions

New advances in artificial intelligence will allow organizations to make decisions with unprecedented speed. Learn how organizations use AI and machine learning to achieve impressive results

Moderator: Michael Sentonas, CrowdStrike

Lauren Knausenberger
USAF
12:35 – 1:05 p.m.Under siege: How local authorities can stop ransomware attacks (Ransomware)

For state and local governments, the damage caused by extortion programs can become immeasurable. Such attacks disrupt the workflow and devastate already limited budgets. The expert group will share tips on preventing attacks and other important information gained from dealing with incidents.

Moderator: Thomas Etheridge, SVP, CrowdStrike

Michael Geraghty, CISO

Deborah Blyth
CISO

Joseph Daniels
12:35 – 1:05 p.m.COVID-19: How the global pandemic has changed cybersecurity and the world forever

The COVID-19 pandemic has forced organizations around the world to significantly increase the use of remote employees, and attackers have taken advantage of this, provoking a sharp increase in phishing, eCrime, and targeted intrusions. In this module, a group of government and industry experts will discuss best practices and consider ways to protect against the latest threat vectors.


Moderator: Jerry Dixon, CISO, CrowdStrike

Adam Hickey
Tonya Ugoretz
Deputy Director, Cyber Division, FBI

Ervan Rodgers
CIO and Deputy Director, Ohio
1:05 – 1:35 p.m.Inevitable cloud migration: a crucial factor in strengthening endpoint security in public institutions

As organizations continue to move their core services and applications to the cloud, cloud-based security measures are becoming a priority for professionals. In this discussion, you will learn how the cloud increases the ability to detect and prevent attacks, and the ability to respond to them compared to the limited capabilities of outdated security architectures.


Moderator: Elia Zaitsev, CrowdStrike

Danny Connelly, Acting CISO, Centers for Disease Control and Prevention (CDC)
1:05 – 1:35 p.m.Protection of the state election infrastructure in 2020

The organization of elections leads to a whole range of technical, logistical and managerial problems. Criminals use political intelligence and other methods to try to influence election results around the world. In this panel, the most respected national experts will discuss the dynamics of the threat environment and ways to strengthen security in the run-up to the 2020 US elections.

Moderator: Rob Sheldon, Head of Technology Strategy, Public Sector, CrowdStrike

Maurice Turner
Senior Advisor to the Executive Director of the US Election Commission

Matt Masterson
Senior Cyber Security Adviser, CISA

Maria Barsallo Lynch
Executive Director, Digital Democracy Protection Project (D3P), Harvard Belfer Center
1:05 – 1:35 p.m.Supply Chain Security: One weak link is enough

The level of protection of federal agencies directly depends on the security of their contractors, on the software used by Hosanna. Attackers attack second- and third-level subcontractors to advance up the supply chain. At this session, federal officials will discuss the latest methods to improve the security of the supply chain, and talk about the challenges they will have to overcome in the future.

Moderator: Curt Aubley, Senior Director, Public Sector Strategies and Solutions, CrowdStrike

Bob Kolasky
Director, National Center for Risk Management, CISA

Joyce Corell
Assistant Director, Supply Chain Directorate, National Counterintelligence and Security Center

Justin DePalmo
CISO, General Dynamics Ordnance and Tactical Systems
1:05 – 1:35 p.m.The future of education: creating safe and secure conditions for students

The pandemic has forced universities across the United States to switch to distance learning in a matter of days. In these circumstances, university staff are looking for a solution that enhances academic freedom and creates optimal conditions for students to study in the context of confidentiality and security. At this session, experts from higher education institutions will talk about their victories, outline the difficulties in the context of the transition to distance learning, and talk about plans for the future.

Moderator: Otavio Freire, President, CTO and Co-Founder, SafeGuard Cyber

Aaron Baillio, CISO, University of Oklahoma

Tina Thorstenson, Deputy Director of IT and CISO, Arizona State University

Back

Crowdstrike: Remote work and IT security during the crisis - a reduced licensed program for 3-6 months

Promotion

Dear Colleagues!

"Crowdstrike Remote work and IT security during a crisis reduced licensed program for 3-6 months."

Many companies sent their employees home and try to provide them with all necessary for remote work. Security maintenance is a serious risk for many organizations since cybercriminals develop and use new tactics and methods to take advantage of this wave of confusion and chaos.

Under these conditions, Crowdstrike adjusted licenses for new customers in accordance with the current situation.

"Paid Pilot Offer" from CrowdStrike Crowdstrike is a proposal for companies that are in the "home office" and which you need to quickly organize the protection of the IT infrastructure. Falcon Prevent licenses, Falcon Insight or Falcon Enterprise package can be purchased for a period of 3 to 6 months instead of ordinary 12 months.

CrowdStrike's cloud architecture and a single lightweight agent are ideal for supporting remote employees and providing targeted protection, and the best part is that it is easy to deploy and get ready in no time. In this way, you can quickly and flexibly protect your company from malicious access without long-term contractual obligations.

The offer "PAID PILOT OFFER" is valid until June 30, 2020.

Videos of the webinar: "Crowdstrike is the most effective solution to protect the final devices from cybergroms" is already available on our YouTube Channel: our YouTube Channel.
You can find out more about the Crowdstrike solution on our website.

________________________________________

On the organization of presentations, demonstrations, consultations on Crowdstrike solutions, you can contact with
Yuri Gatupov: tel.: +380 50 353 00 80 or e-mail: [email protected]

We wish you health!

Back

CrowdStrike Falcon Sandbox

The world's most powerful malware sandbox. It exposes state-of-the-art targeted attacks, going beyond general static and dynamic file analysis to control all malicious actions and connections in systems.

Order a demo - version

Full understanding of complex and unknown threats

When an organization is attacked, the visibility of the attack must be given the highest priority. You need to quickly understand what malware is trying to do and how it works so that you can minimize damage and know how to prevent such attacks in the future.


Today, malware analysis takes too much time and often provides incomplete information about the threat, which prevents security professionals from having confidence in their conclusions and leads to the endless need for further analysis. Worse, attackers are becoming smarter, constantly developing their malware to evade and find blind spots in common malware tools and methods.

CrowdStrike Falcon Sandbox defeats even the most secure hacking programs by working at the kernel level and using sophisticated techniques and techniques that make it almost invisible. This allows Falcon Sandbox to provide a wide range of compromising metrics in the industry.


Falcon Sandbox also saves you time and makes security teams more efficient: the solution provides clear and accessible reports for your SOC team. These malware reports include practical guidelines for prioritizing and responding to threats, while allowing teams to delve into memory captures and stack traces. The Falcon Sandbox API and pre-built integrations make it easy to interact with existing security solutions.

The main advantages of a solution

Detection of unknown threats:

  • Hybrid analysis
  • Anti-evasion technologies
  • Settings for the existing environment

Achieve full visibility:

  • Analytical reports
  • Extensive file support
  • Malware search

Faster response to threats:

  • Immediate sorting
  • Flexible deployment
  • Easy integration

How Falcon Sandbox Improves Threat Response

en_GBEnglish
ukUkrainian ru_RURussian en_GBEnglish