*** Welcome to piglix ***

CrowdStrike

CrowdStrike
Industry Information security
Founded 2011
Founders George Kurtz, Dmitri Alperovitch
Headquarters Irvine, California
Key people
George Kurtz, CEO
Dmitri Alperovitch, CTO
Products Falcon Host, Falcon Intelligence, Falcon Overwatch and Falcon DNS
Parent CrowdStrike Holdings, Inc.
Website crowdstrike.com

CrowdStrike, Inc. is an American cybersecurity technology company based in Irvine, California, and a wholly owned subsidiary of CrowdStrike Holdings, Inc. The company provides endpoint security, threat intelligence, and incident response services to customers in more than 170 countries. The company has been involved in response efforts to several high-profile cyber-attacks, including the Sony Pictures hack and the 2016 Democratic National Committee email leak, for which it concluded Russian state actors were responsible.

CrowdStrike was co-founded by entrepreneur George Kurtz (CEO),Dmitri Alperovitch (CTO), and Gregg Marston (CFO, retired). In 2012, Shawn Henry, a former FBI executive who lead both the FBI’s criminal and cyber divisions, was hired to lead sister company CrowdStrike Services, Inc., which is focused on proactive and incident response services.

The company gained recognition for providing threat intelligence and attribution to nation state actors conducting economic espionage and IP theft. This includes the outing of state-sponsored Chinese group, Putter Panda, linked to China's spying on US defense and European satellite and aerospace industries. In May 2014, supported by CrowdStrike’s reports, the US Department of Justice charged five Chinese military hackers for economic cyber espionage against US corporations. Similarly, the firm is known for uncovering the activities of Energetic Bear, an adversary group with a nexus to the Russian Federation that conducts intelligence operations against a variety of global victims with a primary focus on the energy sector.

Following the very public Sony Pictures hack, CrowdStrike produced attribution to the government of North Korea within 48 hours and demonstrated how the attack was carried out step-by-step. On May 2015, the company released Researcher Jason Geffner's discovery of VENOM, a critical flaw in open source hypervisor called Quick Emulator (QEMU), which is used in a number of common virtualization products.

In 2014, the company launched the Falcon platform, a technology that stops breaches by combining next-generation antivirus, endpoint detection and response, and proactive hunting. Also in 2014, CrowdStrike was instrumental in identifying members of PLA Unit 61486 as the perpetrators of a number of cyberattacks on U.S. infrastructure.


...
Wikipedia

...