CrowdStrike, a provider of security solutions for identifying advanced threats and targeted attacks, announced the availability of Endpoint Activity Monitoring (EAM), an application on the CrowdStrike Falcon Platform that helps customers gain real-time insight into attacks and explore the rich “Stateful Execution Inspection” (SEI) data collected by sensors.
The CrowdStrike Falcon Platform is the company’s answer for helping enterprises identify unknown malware, detect zero-day threats, and block targeted attacks in real time. Combined with the EAM application, the platform offers real-time host forensics by tracking execution events on all systems to shorten the window between infection and remediation, the company said.
The CrowdStrike EAM application is powered by technology from Splunk, a provider of software that helps organizations gather and make use of machine data from a diverse set of sources.
Previously recorded adversary activity is available for on-demand recall and continuous in-the-cloud analysis and empowers key investigative tasks, such as breach discovery, the company said.
“CrowdStrike brings the ability to identify attacks and prevent damage in real-time through our CrowdStrike Falcon Platform, which embeds Splunk software as a machine data platform for the search, alerting, reporting and analytics capabilities of our EAM application,” CrowdStrike’s CEO, President Co-Founder, George Kurtz, said in a statement.
The Endpoint Activity Monitoring application is available immediately on the CrowdStrike Falcon Platform.
Managing Editor, SecurityWeek.Previous Columns by Mike Lennon:CrowdStrike Adds Real-Time Forensics Through Endpoint Monitoring AppUniversity of Maryland Hacked: Attackers Steal 309,000 Records of Faculty, Staff, StudentsSynopsys to Acquire Coverity for $375 MillionIOActive Issues Statement on Belkin Vulnerability DebateNew Zeus Variant Found Targeting Salesforce.com Accounts
Tags: Desktop Security