Help AG has today announced its partnership with CrowdStrike. As a member of the CrowdStrike Elevate Partner Program, Help AG will offer the CrowdStrike Falcon platform for comprehensive, real-time endpoint protection to businesses in the Middle East, with an initial focus on organizations in the United Arab Emirates (UAE).
“This partnership with CrowdStrike aligns with Help AG’s cloud-first strategy and offers our customers near-instant access to one of the industry’s highest-rated endpoint detection and response solutions with no upfront CapEx,” said Stephan Berner, chief executive officer at Help AG. “CrowdStrike provides a powerful, and an intelligent solution that is simple to deploy and that goes beyond just detecting malware to stopping breaches before they occur,” explained Berner. Commenting on the synergy between the two companies, he said, “CrowdStrike Falcon is unique in that it is a truly stand-alone solution that perfectly integrates with technologies from several of our other market-leading vendor partners. This enhances Help AG’s value-proposition and enables us to offer a comprehensive cybersecurity solution that delivers instant visibility and protection across the enterprise and prevents attacks on endpoints, whether they are on or off the network.”
CrowdStrike Falcon unifies next-generation antivirus (NGAV), endpoint detection and response (EDR), cyber threat intelligence, managed threat hunting capabilities and security hygiene via a single, lightweight agent that is cloud-managed and delivered. The benefits of this unified and lightweight approach include immediate time-to-value, better performance, reduced cost and complexity, and better protection that goes beyond detecting malware to stop breaches before they occur.
Help AG will also utilize the Falcon platform within its own Cybersecurity Operations Centre (CSOC) for the further advancement of its Incident Response capabilities. Falcon Insight – the Endpoint Detection and Response (EDR) component of the platform – provides remote visibility across endpoints throughout an organization’s IT environment, enabling instant access to the ‘who, what, when, where and how’ of an attack.