CrowdStrike, today announced the CrowdStrike Falcon platform is bolstering its Linux protection capabilities with additional features, including machine learning prevention, custom Indicators of Attack (IoAs) and dynamic IoAs.
CrowdStrike delivers proven breach prevention and visibility from its cloud-delivered platform via a single lightweight agent that supports endpoints and cloud workloads on all platforms including Windows, Mac, Linux and mobile devices.
As one of the primary OS of business-critical applications servers, Linux systems have frequently been the target of stealthy and brazen cyber criminals. Enterprise workloads continue to be migrated to the cloud at a rapid pace, and this migration has accelerated in the wake of the COVID-19 pandemic.
Today’s rapidly evolving cloud workloads require an all-encompassing solution that can provide deep runtime security for Linux hosts, whether they are running on public or private clouds or on-premise data centers, including securing container workloads running on Linux hosts.
CrowdStrike Falcon offers a unique platform-centric approach, securing these diverse workloads via a single agent. Falcon’s lightweight, intelligent agent detects and prevents malicious processes using dynamic IoAs. Falcon also enables customers to tune behavioral detection and prevention for their environment using custom IoAs.
CrowdStrike’s cloud machine learning engine is constantly tuned and enriched to provide timely and reliable malware detection without the need to manage and update signature files. More than 50% of CrowdStrike customers protect their cloud workloads through Falcon’s complexity-free user experience that allows them to avoid additional point products.
“At CrowdStrike, we remain laser focused on solving the most challenging customer pain points. A crucial part of that puzzle is protecting Linux systems through Falcon’s game-changing technology,” said Amol Kulkarni, chief product officer at CrowdStrike. “As workforces and workloads become increasingly complex, Falcon is able to protect Linux systems in a variety of environments including containers, offering our customers the ability to automatically prevent even the most complex malicious activity from cyber threat actors. We are committed to giving our customers the most transformative cloud workload protection platform on the market to keep their critical systems operational and their data secure 24/7.”