-

CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads to Provide Greater Control and Visibility from Build to Runtime

New capabilities bring increased protection for cloud applications, reducing the attack surface and identifying vulnerabilities before deployment

SUNNYVALE, Calif.--(BUSINESS WIRE)--CrowdStrike, a leader in cloud-delivered endpoint and workload protection, today announced expanded Cloud Security Posture Management (CSPM) and Cloud Workload Protection (CWP) capabilities for the CrowdStrike Falcon® platform to deliver greater control, visibility and security for cloud workloads and cloud-native applications from build to runtime.

The expanded CSPM and CWP capabilities for the CrowdStrike Falcon platform identify and remediate vulnerabilities from development to production for a wide variety of cloud environments, including containers. Gartner has predicted that, “Growing adoption of cloud-native applications and infrastructure will increase use of container management to over 75% of large enterprises in mature economies by 2024 (up from less than 35% in 2020).”

With the incorporation of frictionless security and automated protection early in the continuous integration/continuous delivery (CI/CD) pipeline, DevSecOps teams are empowered to deliver production-ready applications with minimal impact to build cycles. Additionally, the new features will help organizations prevent compliance violations with intelligent monitoring that detects misconfigurations, vulnerabilities and threats, and delivers guided remediation that equips developers with guardrails to avoid costly mistakes.

“We continue to deliver the broadest range of cloud security capabilities in a single cloud-native platform for on-prem, private, public, hybrid and multi-cloud environments that scales,” said Amol Kulkarni, chief product officer for CrowdStrike. “CrowdStrike’s Security Cloud is one of the largest deployments in the world, providing us a unique vantage point in supporting organizations’ shift to cloud-native architectures and their adoption of development and IT operations (DevOps). The capabilities we are announcing today secure development and deployment of applications in the cloud with greater speed, efficiency and confidence.”

New Falcon Horizon CSPM Capabilities:

  • Provide cloud-native security posture management for multi-cloud environments: Prevents, protects and remediates security risks in AWS and Azure resources. Expands assessment coverage for server, Kubernetes and serverless services to detect Indicators of Misconfiguration (IOM) in the public cloud control plane.
  • Monitor cloud identities for least privileges: Provides end-to-end visibility to Azure Active Directory (AD) to quickly identify privileged permissions and abnormal service-to-service integration settings. Detects misconfigurations linked to prevalent tactics, techniques and procedures (TTPs) with Azure AD deployments.
  • Ensure continuous compliance: Provides in-depth assessment against the Center for Internet Security (CIS) benchmarks with prebuilt dashboards, easy to navigate drill-down by account, region, cloud service and severity.

New Falcon Cloud Workload Protection Capabilities

  • Delivers broad support for container runtime security: Secures applications with the new Falcon Container sensor that is uniquely designed to run as an unprivileged container in a pod. Supports Kubernetes environments, such as Amazon Elastic Kubernetes Service (EKS), and offers container-as-a-service support, including Amazon Web Services (AWS) Fargate. Technology previews available for Azure Kubernetes Service (AKS), Google Kubernetes Engine (GKE), Rancher and IBM Red Hat OpenShift.
  • Identify security threats prior to running containers in production: Using Container Image Assessment, uncovers hidden malware, vulnerabilities, embedded secrets and configuration issues in your images at build time to reduce the runtime attack surface.
  • Stop threats when containers are most vulnerable, during runtime: Detects malicious runtime behavior and blocks activities that violate policy with zero impact to container workloads through behavioral detection, cloud machine learning and Indicators of Attack (IoAs).
  • Uncover hidden threats: Correlates events from containers with host and cloud data, such as Falcon Horizon, for more effective hunting and remediation.

To learn more about CrowdStrike container security, visit this landing page.

To read more about this announcement, visit the blog here.

Other related blogs are:

A video on the enhanced cloud protection capabilities for Falcon can be found here.

¹“Forecast Analysis: Container Management (Software and Services), Worldwide,” Gartner, May [CM1] 2020

About CrowdStrike

CrowdStrike, a global cybersecurity leader, is redefining security for the cloud era with an endpoint and workload protection platform built from the ground up to stop breaches. The CrowdStrike Falcon® platform’s single lightweight-agent architecture leverages cloud-scale artificial intelligence (AI) and offers real-time protection and visibility across the enterprise, preventing attacks on endpoints and workloads on or off the network. Powered by the proprietary CrowdStrike Threat Graph®, CrowdStrike Falcon correlates 5 trillion endpoint-related events per week in real time from across the globe, fueling one of the world’s most advanced data platforms for security.

With CrowdStrike, customers benefit from better protection, better performance and immediate time-to-value delivered by the cloud-native Falcon platform.

There’s only one thing to remember about CrowdStrike: We stop breaches.

Qualifying organizations can gain full access to Falcon Prevent™ by starting a free trial.

Learn more: https://www.crowdstrike.com/

Follow us: Blog | Twitter

© 2021 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat Graph are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to identify their products and services.

Contacts

CrowdStrike
Ilina Cashiola, 202-340-0517
Ilina.cashiola@crowdstrike.com

CrowdStrike

NASDAQ:CRWD

Release Summary
CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads to Provide Greater Control and Visibility from Build to Runtime
Release Versions

Contacts

CrowdStrike
Ilina Cashiola, 202-340-0517
Ilina.cashiola@crowdstrike.com

More News From CrowdStrike

CrowdStrike and Schwarz Digits Partner to Deliver AI-Native and Sovereign Cybersecurity Platform on STACKIT

AUSTIN, Texas & NECKARSULM, Germany--(BUSINESS WIRE)--CrowdStrike (NASDAQ: CRWD) and Schwarz Digits today announced a long-term strategic partnership to bring the CrowdStrike Falcon® cybersecurity platform to STACKIT, Schwarz Digits’ sovereign cloud infrastructure. This collaboration will deliver the AI-native Falcon platform with full attack path visibility on a platform fully operated within the EU on STACKIT, enabling enterprises and public institutions to meet Europe’s data sovereignty requ...

Day Zero 2026 Threat Research Summit: Call for Technical Research Now Open

AUSTIN, Texas--(BUSINESS WIRE)--CrowdStrike (NASDAQ: CRWD) is accepting submissions for its inaugural Day Zero Threat Research Summit, an invitation-only event bringing together the brightest minds across the global threat intelligence community to uncover the latest in adversary tradecraft and advance modern cyber defense. The summit will take place August 30 – September 1, 2026 at the Mandalay Bay Hotel and Resort in Las Vegas as part of Fal.Con 2026, the premier cybersecurity event of the ye...

CrowdStrike Fal.Con Gov Accelerates National Cyber Defense in the AI Threat Era

AUSTIN, Texas--(BUSINESS WIRE)--CrowdStrike (NASDAQ: CRWD) today announced Fal.Con Gov 2026 is taking place March 18 in Washington, D.C. Fal.Con Gov gathers government security leaders to advance strategy, operational execution, and AI-driven defense to protect the nation’s most critical systems. Now in its third year, this must-attend event brings together senior policymakers, national security, defense, and public sector cybersecurity leaders, including White House National Cyber Director Sea...
Back to Newsroom