• Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • Skip to footer

My TechDecisions

  • COVID-19 Update
  • Best of Tech Decisions
  • Topics
    • Video
    • Audio
    • Mobility
    • Unified Communications
    • IT Infrastructure
    • Network Security
    • Physical Security
    • Facility
    • Compliance
  • RFP Resources
  • Resources
  • Podcasts
  • Subscribe
  • Project of the Week
  • About Us
    SEARCH
IT Infrastructure, Network Security, News

CrowdStrike, CounterFlow AI Partner to Accelerate Threat Detection

CrowdStrike, CounterFlow AI form partnership to leverage machine learning to more quickly detect cybersecurity threats and respond.

November 7, 2019 Zachary Comeau Leave a Comment

Featured Video Play Icon

Counterflow AI, a systems security provider delivering artificial intelligence for IT operations, is partnering with cloud-delivered cybersecurity software firm CrowdStrike to accelerate threat detection and response for business security teams.

CounterFlow AI is enhancing its machine learning engine with Falcon X, CrowdStrike’s customizable, automated incident investigation platform. According to the joint release, the integration allows organizations to gather more data from threat insights gained from their networks’ endpoints without creating a large security stack or larger data storage footprint.

The companies said the integration brings more automation to the way security teams assess streaming network data with real-time contextualized threat intelligence, recording just the data with a high investigative value.

Customers will be alerted with detailed indicators of compromise, like domain and IP information, to help security teams detect existing threats and perform incident investigations more effectively and efficiently.

CounterFlow AI said its ThreatEye AIOps platform for network forensics is designed for hybrid cloud deployments, merging machine learning with full packet capture and visualization to provide insights. The platform integrates seamlessly with CrowdStrike’s cloud-native intelligent, single-agent Falcon platform, which CounterFlow AI said enables frictionless deployment at scale to stream high-fidelity data to the cloud, providing businesses with prioritized threat analysis and response.

Read Next: 3 Cybersecurity Companies That Don’t Trust “Trust but Verify”

In a statement, CounterFlow AI co-founder and CEO Randy Caldejon said the firm is bringing new network forensic tools to organizations to help increase the signal-to-noise ratio of their network data.

“That requires best-in-class threat intelligence, and there is no better firm who possesses the quality and scale of capabilities than CrowdStrike,” he said. “Together, we’re helping security teams start investigations sooner and from a more confident jumping off point.”

CrowdStrike’s Chief Product Officer Amol Kulkarni said CounterFlow AI’s approach is a more intuitive way to eliminate time-consuming activities associated with capturing data flowing through an enterprise’s network.

“By integrating the benefits of CrowdStrike Falcon with CounterFlow AI ThreatEye, we are offering customers contextualized threat intelligence to help enable security teams to move from a reactive state to a proactive one,” he said. “This powerful combination delivers a more efficient way to help organizations conduct investigations, including the critical intelligence necessary to get ahead of known and unknown threats.”

Tagged With: CounterFlow AI, CrowdStrike, Cybersecurity

Related Content:

  • Avocor W Series 8 All-in-One Videoconferencing Displays That Make Meetings Easier
  • DTEN ONboard DTEN Launches ONboard for Zoom Whiteboard
  • GoTo Connect, GoTo Resolve GoTo Brings IT Helpdesk Support to GoTo Connect
  • Zoom macOS Update Zoom on macOS Devices Now

Free downloadable guide you may like:

  • Shadow ITBlueprint Series: How to Reduce Shadow IT

    The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Research finds that this distributed work environment is leading to IT management blind spots and shadow IT.

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Get the FREE Tech Decisions eNewsletter

Sign up Today!

Latest Downloads

Shadow IT
Blueprint Series: How to Reduce Shadow IT

The distributed work model gives employees the flexibility they demand, but it can lead to shadow IT and introduce unnecessary security risk. Resea...

Hybrid Work webinar
Featured Webcast: Collaboration 2.0 — Where Are We Now?

In this webinar, subject matter experts discuss the transformation of the workplace, the rise of hybrid workers, the importance of open connectivit...

guide to end user training cover
Pro Tips for Conducting End User Training

Effective trainings are the glue that can make the difference following a new technology implementation that your team has spent so much time, effo...

View All Downloads

Would you like your latest project featured on TechDecisions as Project of the Week?

Apply Today!
Sharp Microsoft Collaboration HQ Logo

Learn More About the
Windows Collaboration Display

More from Our Sister Publications

Get the latest news about AV integrators and Security installers from our sister publications:

Commercial IntegratorSecurity Sales

AV-iQ

Footer

TechDecisions

  • Home
  • Welcome to TechDecisions
  • Subscribe to the Newsletter
  • Contact Us
  • Media Solutions & Advertising
  • Comment Guidelines
  • RSS Feeds
  • Twitter
  • Facebook
  • Linkedin

Free Technology Guides

FREE Downloadable resources from TechDecisions provide timely insight into the issues that IT, A/V, and Security end-users, managers, and decision makers are facing in commercial, corporate, education, institutional, and other vertical markets

View all Guides
TD Project of the Week

Get your latest project featured on TechDecisions Project of the Week. Submit your work once and it will be eligible for all upcoming weeks.

Enter Today!
Emerald Logo
ABOUTCAREERSAUTHORIZED SERVICE PROVIDERSTERMS OF USEPRIVACY POLICY

© 2022 Emerald X, LLC. All rights reserved.