Зарегистрируйтесь сейчас для лучшей персонализированной цитаты!

CrowdStrike chosen by CISA for government endpoint security initiative

1 декабря 2021 г Hi-network.com

CrowdStrike and CISA have announced a new partnership that will see the cybersecurity company provide endpoint security for the government organization -- and others -- while also "operationalizing" the Executive Order endpoint detection and response (EDR) initiative.

CrowdStrike was chosen as one of the platforms to support the initiative at multiple federal agencies and will use its CrowdStrike Falcon platform to "secure critical endpoints and workloads for CISA and multiple other major civilian agencies."

Featured

  • iPhone 15 Pro review: Prepare to be dazzled
  • Generative AI will far surpass what ChatGPT can do. Here's everything on how the tech advances
  • Google Pixel 8 vs. Google Pixel 8 Pro: Which one is right for you?
  • The best USB-C cables for the iPhone 15: What the experts recommend

Executive Order (EO) 14028, which President Joe Biden signed in May, listed a variety of measures that needed to be taken across the government to better secure systems in the wake of the SolarWinds scandal and other breaches. Government organizations were urged to do more threat hunting, EDR, and IT modernization while also further embracing cloud technologies. 

George Kurtz, co-founder and CEO of CrowdStrike, said CISA is on the front lines when it comes to defending the US government's most critical assets against evolving threats that nation-state and eCrime adversaries present. 

"Improving our nation's defenses and cyber resiliency requires strong collaboration between the government and the private sector. This partnership will arm CISA and government agencies with CrowdStrike's powerful technology and elite human expertise to stop sophisticated attacks and protect our nation's critical infrastructure," Kurtz said. 

James Yeager, a vice president at CrowdStrike, toldZDNetthat CISA was looking to beef up its Continuous Diagnostics and Mitigation (CDM) program and "advance its mission of securing civilian '.gov' networks and leading the national effort to understand and manage cyber and physical risk to critical infrastructure."

The White House is providing funds for the project through the American Rescue Plan. Yeager said the company encouraged agencies to work with CISA to ensure their security program is equipped to enable proactive threat hunting and a coordinated response strategy to combat advanced threats.

"The United States and allied nations face unprecedented threats from today's adversaries. Continuous cyberattacks on critical infrastructure, supply chains, government agencies, etc., present significant ongoing threats to national security and the critical services millions of citizens rely on every day," Yeager said. 

"The federal government cannot afford to stay static amidst an evolutionary and highly dynamic threat landscape. Visibility is key. You cannot defend what you cannot see. The state of the endpoint has evolved, yielding a highly complex and expanded attack surface. As a result, we need to broaden the scope of visibility. Agencies need solutions that can collect and correlate data across multiple security layers -- email, endpoint, server, cloud workload, and the network -- for faster detection of threats and improved investigation and response times through automation and data analysis."

Yeager added that with the shift toward a remote workforce, security policies need to include remote working access management, the use of personal devices, and updated data privacy considerations for employee access to documents and other information. 

"Moreover, agencies need to employ protection measures that can quickly adapt and scale to support this modified IT landscape, by leveraging innovative tooling that is effective against all types of threats and that supports all workloads -- on-premise systems, remote devices, cloud instances, and virtual machines," Yeager explained.

Security

8 habits of highly secure remote workersHow to find and remove spyware from your phoneThe best VPN services: How do the top 5 compare?How to find out if you are involved in a data breach -- and what to do next
  • 8 habits of highly secure remote workers
  • How to find and remove spyware from your phone
  • The best VPN services: How do the top 5 compare?
  • How to find out if you are involved in a data breach -- and what to do next

tag-icon Горячие метки: Технологии и оборудование Безопасность и охрана

Copyright © 2014-2024 Hi-Network.com | HAILIAN TECHNOLOGY CO., LIMITED | All Rights Reserved.