Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Zscaler and CrowdStrike Extend Zero Trust Security from Devices to Business Applications

Security Cloud Giants Expand Global Strategic Partnership to Provide Organizations with Seamless, Dynamic and Data and Identity-Centric Protection through New Integrations

Zscaler, Inc. and CrowdStrike Holdings, Inc., two leaders in cloud-native security, announced a series of integrations that deliver end-to-end security protection from the endpoint to the application. These integrations for joint customers strengthen security by providing an identity-centric and data-centric zero trust approach that encompasses data, people, devices, workloads, and networks.

Zscaler is CrowdStrike’s first cloud security partner to leverage CrowdStrike Zero Trust Assessment (ZTA) in general availability to enable secure access to applications from any endpoint, regardless of the user or location. Utilizing the expansive telemetry of the CrowdStrike Falcon platform that processes over 5 trillion events a week, ZTA grants dynamic conditional access based on continuous real-time security posture assessments of device health and compliance checks. Through the integration with Zscaler Private Access (ZPA), access to private applications can be automatically adapted based on the ZTA assessment score and updated access policies from Zscaler.

Recommended AI News: AiDANT Selects Core Scientific to Provide AI-Powered GPU-as-a-Service

“Employees are working from anywhere and applications are moving to the cloud,” said Amit Sinha, president, chief technology officer, board member, Zscaler. “The enterprise perimeter doesn’t exist anymore, the internet is the new corporate network, and security should follow users and workloads wherever they are. Zero trust requires decoupling application access from being on the corporate network and allowing access based on identity, context, and business policies. This dramatically reduces an organization’s attack surface and prevents lateral propagation of attacks that we’ve seen repeatedly when organizations rely on legacy firewall and network-centric solutions.”

Related Posts
1 of 15,217

This collaboration between the two cloud-native security leaders provides joint customers with adaptive, risk-based access control to private applications, enabling improved defense for people working from anywhere. The integration also enables automated workflow between the two platforms through threat intelligence and telemetry data sharing, providing zero-day malware protection, automatic update of inline custom blocklists, and faster data correlation and impact assessment.

Recommended AI News: SlashNext Launches Secure Risk Assessment to Detect Unseen Next Generation 2.0 Phishing Threats

“Recent high profile attacks involving compromised credentials have served as a moment of truth for organizations struggling with expanding remote workforces, growth of cloud applications, and an increasingly complex threat landscape,” said Michael Sentonas, chief technology officer at CrowdStrike. “Modern organizations need to embrace an identity-centric approach to security with a mature zero trust architecture that is dynamic and end-to-end, automating workflows that ensure verified access across endpoints, networks, workloads, and devices. Zero trust must be the de facto standard in today’s work-from-anywhere world.”

“CrowdStrike and Zscaler’s scalable and complementary solutions enabled our organization’s security transformation by providing increased visibility of endpoints and workloads across our approximately 400 offices in 60 countries. Immediate detection and response are critical for stopping potential breaches, and we are able to significantly accelerate our response,” said Erik Hart, chief information security officer for Cushman & Wakefield. “As distributed workforces continue to grow and increasingly expose corporate environments to intensifying cyber threat activity, an identity-centric zero trust strategy must be implemented to ensure that access is verified and that organizational risks are minimized.”

Recommended AI News: Guardian and Atidot Partner to Create New Insurance Models and Customer Experiences Using Artificial Intelligence and Predictive Analytics

Comments are closed.