CrowdStrike

CrowdStrike
Industry Information security
Founded 2011
Founder George Kurtz & Dmitri Alperovitch
Headquarters Irvine, California
Key people
George Kurtz, CEO
Dmitri Alperovitch, CTO
Products Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS
Parent CrowdStrike Holdings, Inc.
Website crowdstrike.com

CrowdStrike, Inc. is an American cybersecurity technology company based in Irvine, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services.[1] Founded in 2011, CrowdStrike has customers in more than 170 countries [2] and offices in the North America; Europe, the Middle East and Africa; and Asia-Pacific regions. The company has detected, prevented, and attributed complex cyber attacks, including the Sony Pictures hack,[3] the DNC email leak,[4] as well as nation state, criminal, and hacktivist adversaries.

History and growth

CrowdStrike was co-founded by entrepreneur George Kurtz (CEO),[5][6] Dmitri Alperovitch (CTO),[7] and Gregg Marston (CFO, retired). In 2012, Shawn Henry, a former FBI executive who lead both the FBI’s criminal and cyber Divisions, was hired to lead sister company CrowdStrike Services, Inc., which is focused on proactive and incident response services.[8]

The company quickly gained notoriety for providing threat intelligence and attribution to nation state actors[9] conducting economic espionage and IP theft. This includes the outing of state-sponsored Chinese group, Putter Panda, linked to China's spying on US defense and European satellite and aerospace industries.[10] In May 2014, supported by CrowdStrike’s reports, the US Department of Justice charged five Chinese military hackers for economic cyber espionage against US corporations. Similarly, the firm is known for uncovering the activities of Energetic Bear, an adversary group with a nexus to the Russian Federation that conducts intelligence operations against a variety of global victims with a primary focus on the energy sector.

Following the very public Sony Pictures hack, CrowdStrike produced attribution to the government of North Korea within 48 hours and demonstrated how the attack was carried out step-by-step.[11] On May 2015, the company released its discovery of VENOM, a critical flaw in open source hypervisor called Quick Emulator (QEMU),[12] which is used in a number of common virtualization products.

In 2014, the company launched its signature technology, the Falcon platform, that stops breaches by combining next-generation antivirus, endpoint detection and response, and proactive hunting. Also in 2014, CrowdStrike was instrumental in identifying members of PLA Unit 61486 as the perpetrators of a number of cyberattacks on U.S. infrastructure.[13][14]

In July 2015 Google invested in the company's Series C funding round, which in total raised $100 million. To date, CrowdStrike has achieved total funding of $156 million, with other investors including Rackspace, Accel Partners and Warburg Pincus.[15][16] According to the company, its customers include three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.[17]

Industry recognition

References

  1. "CrowdStrike's security software targets bad guys, not their malware". TechRepublic.
  2. "CrowdStrike About Us Page". 2016. Retrieved 2016-06-09.
  3. "CrowdStrike demonstrates how attackers wiped the data from the machines at Sony". International Data Group. 2015. Retrieved 2016-06-09.
  4. "Clinton campaign — and some cyber experts — say Russia is behind email release". Washington Post. July 24, 2016.
  5. George Kurtz, President/CEO & co-founder of CrowdStrike
  6. "Standing up at the gates of hell: CrowdStrike CEO George Kurtz". Fortune. 29 July 2015.
  7. Dmitri Alperovitch, Co-Founder and CTO of CrowdStrike
  8. Messmer, Ellen. "Top FBI cyber cop joins startup CrowdStrike to fight enterprise intrusions". Network World.
  9. "U.S. firm CrowdStrike claims success in deterring Chinese hackers". Reuters. 2015-04-13. Retrieved 2016-06-14.
  10. Perlroth, Nicole (2014-06-09). "2nd China Army Unit Implicated in Online Spying". The New York Times. ISSN 0362-4331. Retrieved 2016-06-14.
  11. "What's in a typo? More evidence tying North Korea to the Sony hack". PCWorld. Retrieved 2016-06-14.
  12. "'Venom' vulnerability: Serious computer bug shatters cloud security". Fortune. 2015-05-13. Retrieved 2016-06-14.
  13. Perlroth, Nicole (9 June 2014). "2nd China Army Unit Implicated in Online Spying". The New York Times. Retrieved 9 June 2014.
  14. "Second China unit accused of cyber crime". Financial Times. 10 June 2014. Retrieved 10 June 2014.
  15. Miller, Ron. "Security Company CrowdStrike Scores $100M Led By Google Capital". TechCrunch.
  16. "CrowdStrike - Warburg Pincus".
  17. "Why Use CrowdStrike for Your Endpoint Protection". www.crowdstrike.com. Retrieved 2016-06-14.
  18. "INC. 500". 2016. Retrieved 2016-08-24.
  19. "MIT Technology Review's World's 50 Most Innovative Companies". 2015. Retrieved 2016-06-08.
  20. "SC Magazine, 2016 Best Security Company Finalist". 2016. Retrieved 2016-06-08.
  21. "CRN Magazine 2014 and 2015 Top Emerging Vendors". 2015. Retrieved 2016-06-08.
  22. "Dark Reading's 20 Most Disruptive Startups to Watch". 2015. Retrieved 2016-06-08.

Further reading

External links

This article is issued from Wikipedia - version of the 11/14/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.