- CrowdStrike (CRWD, Financial) announces new Falcon Data Protection innovations to enhance data security across endpoints, cloud, GenAI, and SaaS applications.
- The platform provides real-time, unified data protection, eliminating the need for legacy tools for endpoint and cloud security.
- Key features include runtime cloud data protection, encrypted exfiltration prevention, and expanded coverage for macOS environments.
CrowdStrike (CRWD), a global leader in cybersecurity, unveiled its latest Falcon Data Protection innovations designed to secure sensitive data across diverse environments such as endpoints, cloud, GenAI, and SaaS applications. These advancements aim to prevent data exfiltration by insiders and identity-based attackers, offering real-time protection through a unified platform.
The new features address gaps exploited by attackers who target data misconfigurations and trusted identities. Adversaries like SCATTERED SPIDER and FAMOUS CHOLLIMA have shifted focus from disruption to data theft, using compromised SSO accounts and remote access tools to exfiltrate sensitive information.
Falcon Data Protection introduces revolutionary capabilities such as encryption detection for endpoints, which identifies and blocks data theft attempts involving encrypted archives. It also introduces runtime cloud data protection using eBPF technology, providing a comprehensive view of data flows across on-premises and multi-cloud environments.
Additionally, Falcon Data Protection incorporates GenAI data security measures with its Similarity Detection DNA technology, which prevents inadvertent exposure of sensitive information across GenAI applications. The platform extends support to macOS environments, ensuring consistent data protection across varied systems.
By consolidating data security tools into a single platform, CrowdStrike aims to offer businesses the real-time protection necessary to preempt data theft and enhance overall data security. For more information on these innovations, visit CrowdStrike's booth at RSA or read their detailed blog post.