For more than eight years, we at CrowdStrike have been united behind our mission of stopping breaches. We’ve assembled a team of passionate people, revolutionary technology, and world-class technology partners to fulfill this mission.

Now, we’re thrilled to have the opportunity to be at Ivanti Interchange 2019 as a Gold Sponsor! 

We’ll be on the show floor all week at BOOTH #5 to answer all questions CrowdStrike, endpoint security, and how we can work together as partners to bring security at scale.

Shedding Light on Breakout Time

Breakout Time is a critical metric in security, as teams strive to pinpoint when to stop attackers. Once that threshold is passed, attackers move laterally from their point of initial access to propagate throughout an environment.

At #interchange19, we’ll be shedding light on this topic during our spotlight session:

The 1/10/60 Minute Challenge – How Defenders Win and Adversaries Lose

Tuesday, April 30, 3:15–3:45 PM – Bayou A

This session will highlight:

  • What breakout time is and what it means for defenders that are responding to attacks in real time
  • How the incident response process unfolds and the barriers that keep organizations from mounting a rapid and efficient response
  • The key steps you can take to improve your organization’s ability to rapidly detect, investigate, and remediate threats
  • Best practices for preventing and detecting in less than one minute, analyzing in less than 10 minutes, and responding in less than 60 minutes to stop adversaries

This in-depth discussion will cover many of the common issues organizations face in establishing an effective incident response process. You will also learn how next-gen technology including endpoint detection and response (EDR) can help you overcome them.

Better Together

There’s an old systems engineering adage that says “the whole is greater than the sum of its parts.” This has never been truer than in the security industry. Architecturally, all segments of an organization’s security stack should seamlessly work with one another. Teams need to communicate and collaborate openly about risks they anticipate to stay effective. This applies to partnerships as well. We need to work together to defeat organizations and fulfill our mission of keeping organizations safe.

Ivanti’s tried and true partner network and long-time stance as a security solution provider are world class. CrowdStrike’s approach to cloud-delivered endpoint protection has fast become an industry standard. Together, however, the integrations between CrowdStrike and Ivanti, as well as the expertise and enthusiasm our united organizations serve as a solution “force multiplier.” As Gold Sponsors of this event, we are fully committed to continuing this fight together, and thrilled to have the opportunity to meet each and every one of you attending this year.

Survival of the Fastest

Breaches happen almost every day, and prevention is never 100%. Today, roughly 40% of attacks do not use malware. Antivirus (next-gen or “legacy”), although effective, stops only 60% of the problem. In an industry where a prevention-centric paradigm has reigned supreme for the past 30 years, it’s no surprise that news of breaches lands in our inboxes daily.

The endpoint has become the attackers’ cyber menu pièce de resistance. It’s where organizations keep their valuable data, and where endpoint detection and prevention technology are struggling to stay ahead of what attackers can do. It’s no surprise then that attackers continue to develop sophisticated attack methods to maintain persistence in organizations’ environments and opportunistic script kiddies hire ransomware as a service or download open-source exploit toolkits, seeing and identifying when prevention fails is paramount.

Organizations of all sizes will continue to be targeted because of cyber attacks’ low-cost barrier to entry and high reward. Cyber criminals made almost $3 billion in 2018, and one US-based individual made over $4 million with 13 well-placed emails. To combat increasing sophistication, threats, and new entrants to the world of cyber-attacks – organizations need visibility and speed.
CrowdStrike’s threat intelligence team notes that on average attackers can circumvent prevention and laterally move to another endpoint in an hour and 58 minutes. To stem the threat when this happens and ultimately stop the breach – organizations need to be faster.

The CrowdStrike 1/10/60 rule is a best practice for security teams that dictates organizations:

1 – detect an attack in one minute

10 – investigate and gain as much detail as you can about an incident in 10 minutes

60 – remediate and respond to the threat in 60 minutes

Changing the Game and Stopping the Breach with the Cloud

On-premises endpoint detection and response (EDR) solutions have been touted as the way to address when prevention fails. From a deployment and visibility perspective, this is not the case. On-premises solutions’ heavy footprint and limited scalability give security and IT teams headaches alike. If an alert is missed, an endpoint is offline, or a terminal is not checked, attackers have the same window of opportunity to pivot and propagate.

Cloud-delivered endpoint security solutions are rapidly gaining market share and popularity because they provide the speed and scalability organizations need. Cloud-computing’s scale and speed make it an ideal solution for addressing fast-moving, targeted cyber-attacks. Pivoting from an on-premises security solution to the cloud provides the immediate visibility needed to see and stop threats as they occur in real time.

This visibility can only truly be achieved by a cloud-native endpoint detection and response solution. By recording and showing all relevant security activity in your environment, with the speed of a cloud-delivered solution, meeting the 1/10/60 rule is possible. Ivanti and CrowdStrike have united to bring that solution to our partners and your customers at scale.

Stop by the CrowdStrike Booth, get to know us, ask tough questions, and together – LET'S STOP BREACHES.

Reduce risks of cybersecurity threats