CIO Influence
CIO Influence News Cloud Datacentre Security

Zscaler and CrowdStrike Extend Zero Trust Security from Devices to Business Applications

A New Era of Cybersecurity: Ridge IT Corporation Named Global Services Partner Of The Year by Zscaler
Security Cloud Giants Expand Global Strategic Partnership to Provide Organizations with Seamless, Dynamic and Data and Identity-Centric Protection through New Integrations

Zscaler, Inc. and CrowdStrike Holdings, Inc., two leaders in cloud-native security, announced a series of integrations that deliver end-to-end security protection from the endpoint to the application. These integrations for joint customers strengthen security by providing an identity-centric and data-centric zero trust approach that encompasses data, people, devices, workloads, and networks.

Recommended ITech News: Study Finds 22% of Internal Audit Teams Plan to Implement Cloud-Based Audit Management or GRC Software in 2021

Zscaler is CrowdStrike’s first cloud security partner to leverage CrowdStrike Zero Trust Assessment (ZTA) in general availability to enable secure access to applications from any endpoint, regardless of the user or location. Utilizing the expansive telemetry of the CrowdStrike Falcon® platform that processes over 5 trillion events a week, ZTA grants dynamic conditional access based on continuous real-time security posture assessments of device health and compliance checks. Through the integration with Zscaler Private AccessTM (ZPATM), access to private applications can be automatically adapted based on the ZTA assessment score and updated access policies from Zscaler.

“Employees are working from anywhere and applications are moving to the cloud,” said Amit Sinha, president, chief technology officer, board member, Zscaler. “The enterprise perimeter doesn’t exist anymore, the internet is the new corporate network, and security should follow users and workloads wherever they are. Zero trust requires decoupling application access from being on the corporate network and allowing access based on identity, context, and business policies. This dramatically reduces an organization’s attack surface and prevents lateral propagation of attacks that we’ve seen repeatedly when organizations rely on legacy firewall and network-centric solutions.”

Recommended ITech News: Contegix to Offer Tugboat CI on its BlackMesh Platform

This collaboration between the two cloud-native security leaders provides joint customers with adaptive, risk-based access control to private applications, enabling improved defense for people working from anywhere. The integration also enables automated workflow between the two platforms through threat intelligence and telemetry data sharing, providing zero-day malware protection, automatic update of inline custom blocklists, and faster data correlation and impact assessment.

“Recent high profile attacks involving compromised credentials have served as a moment of truth for organizations struggling with expanding remote workforces, growth of cloud applications, and an increasingly complex threat landscape,” said Michael Sentonas, chief technology officer at CrowdStrike. “Modern organizations need to embrace an identity-centric approach to security with a mature zero trust architecture that is dynamic and end-to-end, automating workflows that ensure verified access across endpoints, networks, workloads, and devices. Zero trust must be the de facto standard in today’s work-from-anywhere world.”

Recommended ITech News: Einfochips Teams With Tricentis to Offer AI Driven Test Automation Services

“CrowdStrike and Zscaler’s scalable and complementary solutions enabled our organization’s security transformation by providing increased visibility of endpoints and workloads across our approximately 400 offices in 60 countries. Immediate detection and response are critical for stopping potential breaches, and we are able to significantly accelerate our response,” said Erik Hart, chief information security officer for Cushman & Wakefield. “As distributed workforces continue to grow and increasingly expose corporate environments to intensifying cyber threat activity, an identity-centric zero trust strategy must be implemented to ensure that access is verified and that organizational risks are minimized.”

The integrations will offer mutual customers four key benefits:

  • ZPA incorporates CrowdStrike’s real-time ZTA to enforce access policy to private apps to reduce organizational risks
  • Zscaler Internet Access (ZIATM) deployed inline stops malware propagation by triggering device quarantine through the CrowdStrike Falcon Platform
  • CrowdStrike’s Falcon X threat intelligence and Falcon Endpoint Protection device telemetry data can be shared with Zscaler Zero Trust Exchange for seamless usage when integrations are activated to provide stronger protection and increased visibility
  • Cross-platform workflow shortens response time and helps combat increasing volumes and sophistication of attacks

Zscaler and CrowdStrike first partnered in 2019 to integrate the CrowdStrike Falcon platform with Zscaler’s cloud security platform to provide customers with real-time threat detection and automated policy enforcement to improve security across networks and endpoints.

To learn more about the integration and hear from customers, register for the Beyond the Perimeter virtual events happening around the world.

Recommended ITech News: Pure Storage FlashBlade Nears $1B in Sales and is Used by More Than 25% of the Fortune 100

Forward-Looking Statements

This press release contains forward-looking statements that involve risks and uncertainties, including statements regarding benefits customers may receive from Zscaler and CrowdStrike’s new integrations. There are a significant number of factors that could cause actual results to differ materially from statements made in this press release.

You should not rely on these forward-looking statements, as actual outcomes and results may differ materially from those contemplated by these forward-looking statements as a result of such risks and uncertainties. All forward-looking statements in this press release are based on information available to us as of the date hereof, and we do not assume any o********* to update the forward-looking statements provided to reflect events that occur or circumstances that exist after the date on which they were made.

Recommended ITech News: HighByte Intelligence Hub Named DataOps Solution of the Year

Related posts

Partners Accelerate Profitability with New Customer Lifecycle Incentives from VMware

CIO Influence News Desk

Orion Governance Named Best Database Solution for Data Management by the A-Team Group

CIO Influence News Desk

Optii Solutions Announces Two-Way Integration with RMS Cloud