CrowdStrike: Combining Threat Intelligence and SaaS Endpoint

VENDOR PROFILE
CrowdStrike: Combining Threat Intelligence and SaaS
Endpoint Protection
Christina Richmond
Robert Westervelt
IDC OPINION
CrowdStrike, a privately held company, is one of a number of disruptive security start-ups that are
gaining attention for bringing to market innovative products t designed to replace traditional antivirus
(AV) or augment it to improve detection of targeted attacks, custom malware, and zero-day threats.
Like many endpoint security vendors, CrowdStrike uses a mixture of standard techniques to detect
malware, including file hashes to detect known malware and blacklisting and whitelisting capabilities
with machine learning and behavioral-based detection. The CrowdStrike Falcon Platform is a native
cloud solution, with a unique differentiator being the functionality used by the CrowdStrike sensor or
agent to disrupt the attack kill chain by identifying signs of suspicious activity, or "Indicators of Attacks"
(IOAs). These IOAs can be in the form of attack techniques, such as manipulating desktop
management tools, the use of the Windows command line interface, or other administrative features.
CrowdStrike has been gaining attention and adoption from large enterprises. In July 2015, the
company reported a CAGR of 550% in annual recurring revenue, 700% increase in the number of
transactions that exceed $1 million, and 225% growth in annual contract value subscriptions. Also in
2015, the company received $100 million in a financing round led by CapitalG (formerly known as
Google Capital). IDC believes that CrowdStrike has staked out a niche and value proposition that
resonates with enterprise leaders who increasingly accept the likelihood of breaches and the risks
associated with cyberattacks. CrowdStrike's technology, expertise, and go-to-market strategy, which
incorporate elements of endpoint protection, managed security services (MSS), and threat intelligence
security services (TISS), should position the company for strong success in the coming years. Further:

CrowdStrike delivers a cloud-based endpoint protection and breach prevention solution, threat
intelligence, and services such as assessment and incident response (IR).

CrowdStrike positions its "next-generation endpoint protection" as a platform designed to stop
breaches and combines its threat detection capabilities with investigative tools for rapid
incident response and exploit prevention capabilities to stop drive-by attacks and memorybased threats.

CrowdStrike also provides an optional threat hunting service to augment its endpoint agent.
IN THIS VENDOR PROFILE
This IDC Vendor Profile analyzes CrowdStrike, a five-year-old company that has built a native cloud
solution to help enterprises thwart cyberattacks. This Vendor Profile reviews key success factors
including company strategy, product strategy, offerings, partnerships, and target markets.
November 2016, IDC #US41921716
SITUATION OVERVIEW
Like many endpoint security vendors, CrowdStrike uses a mixture of standard techniques to detect
malware, including file hashes to detect known malware and blacklisting and whitelisting capabilities
with machine learning and behavioral-based detection. The CrowdStrike Falcon Platform is a native
cloud solution, with a unique differentiator being the functionality used by the CrowdStrike sensor or
agent to disrupt the attack kill chain by identifying signs of suspicious activity, or "Indicators of Attacks."
These IOAs can be in the form of attack techniques, such as manipulating desktop management tools,
the use of the Windows command line interface, or other administrative features.
In November 2016, CrowdStrike announced it had achieved antivirus certification through independent
testing with AV-Comparatives. CrowdStrike Falcon was the only tested endpoint security solution
recognized as capable of fully replacing traditional AV by registering with Windows System Center as
antivirus/antispyware. CrowdStrike received independent validation from AV-Comparatives,
underscoring its solution's ease of deployment and updatability, modern and well-organized user
interface, and extensive capabilities in tracking and reporting on malicious activities on the endpoint.
Falcon Host achieved 100% detection efficacy on all exploits used in the testing. It also scored a range
of 98–99.2% for detection efficacy, with zero false positives on three separate malware tests performed
by AV-Comparatives.
CrowdStrike Falcon Platform was recently independently evaluated by Coalfire, a leading assessor for
global PCI and other compliance standards in industries such as financial services, government, and
healthcare. Coalfire determined that the Falcon Platform is a "suitable solution for addressing system
protection and monitoring requirements for PCI DSS v3.2" and a "suitable solution for addressing a
number of key technical requirements in the HIPAA Security and Privacy Rules." Coalfire also
released an independent assessment report on the use of Falcon Host with respect to the National
Institute of Standards and Technology (NIST) SP 800-53 framework for organizations dealing with
federal information. It outlines that "Falcon Host provides capabilities in detection and responding to
threats, and associated collection of activities, making CrowdStrike Falcon Host a suitable solution for
addressing the system protection and monitoring controls identified in NIST SP 800-53 Revision 4."
Company Overview
CrowdStrike was founded in 2011 to stop breaches by going beyond malware-based
countermeasures. The company's solution is designed to stop cyberattacks by seeing and stopping
malicious activity across the entire threat life cycle. This approach provides protection against both
commodity malware attacks and sophisticated attacks perpetrated by adversaries. The company's
headquarters office is located in Irvine, California, and approximately 460 employees work in the
United States, the United Kingdom, Australia, and New Zealand. CrowdStrike's revenue is estimated
to be $50 million.
Company Strategy
CrowdStrike's strategy is based on the belief that "modern attackers can easily bypass legacy security
solutions," and the company strives to prevent as many breaches as possible by stopping both
malware-based attacks and malware-free attacks. The security vendor has a strong threat intelligence
arm that uses data collected from sensors in more than 170 countries and threat researchers to
provide guidance and protection on newly detected targeted intrusion attack campaigns. By sharing
this threat information, CrowdStrike offers what it calls "community immunity" to its customers.
©2016 IDC
#US41921716
2
The company is going above and beyond standard compliance requirements, which is a smart marketleading move. Currently, the company's platform is compliant with standards such as PCI DSS v3.2,
NSA-CIRA, and SOC 2. With respect to PCI DSS compliance, Coalfire reports that the Falcon Platform
addresses five PCI DSS requirements compared with other endpoint security vendors that address
only one requirement — antivirus. Endorsements like the ones from Coalfire will do more than validate
CrowdStrike. These endorsements will help educate the market and push regulators to consider new
architectures and new standards.
Product Strategy
The CrowdStrike Falcon Platform is designed to both prevent and detect actual threat activity on
endpoints as well as provide visibility into the threat activity. It's a kernel-level driver that examines the
processes running on endpoints (Windows desktops and servers, macOS, and Linux on or off the
network), looking for malicious activity.
The CrowdStrike Falcon Sensor is designed to identify attackers that are attempting to move laterally
within the corporate network to gain access to systems containing more sensitive files or probe for
users with higher privileges. It can capture the IP address of malware communication from an external
system running Falcon Host to its command and control server.
CrowdStrike provides ways to integrate into an organization's existing security infrastructure. APIs,
applications, and tools, which are under the Falcon Connect umbrella, extend the Falcon Platform into
customers' security environments. The Falcon management dashboard provides users with
comprehensive visibility, priorities, attributions, and reports, including executive summaries. The
CrowdStrike Elevate Partner Program provides third-party partners with the ability to resell, integrate,
recommend, and refer CrowdStrike solutions to their customers.
CrowdStrike strikes a major differentiation from next-generation endpoint security products by arming
enterprise incident responders with tools and forensics data for rapid incident response. When an
attack takes place, CrowdStrike logs events in real time, and a feature called Threat Graph presents a
"chain of custody" that provides incident responders with correlated threat indicators, such as the time
stamp when an attacker establishes a backdoor and is leveraging a privileged account or is
manipulating a Windows PowerShell command prompt. These are common attack tactics that would
otherwise go undetected by traditional antivirus or modern solutions only focused on malware
detection.
The CrowdStrike solution is offered as a subscription-based software as a service (SaaS). No
hardware or software is installed in customer environments, with the exception of a sensor that
protects endpoints and connects them to the Falcon SaaS Platform. The sensor is lightweight and
deployable across organizations of all sizes. According to CrowdStrike, a sensor can be set up for
100,000 endpoints in a few hours.
In the cloud, there is practically no limit to the amount of data that can be stored, which enables robust
current and historical threat analysis.
Product/Service Offerings
The following CrowdStrike products and services make up the current offering portfolio:

The CrowdStrike Falcon Platform consists of Falcon Host, Falcon Overwatch, and Falcon
Intelligence.
©2016 IDC
#US41921716
3

Falcon DNS identifies and blocks malicious DNS callbacks.

Services include M&A Cyber Risk Assessment and incident response services, which are
customized to each situation.
Falcon Host includes elements that CrowdStrike believes are essential in true next-generation
solutions:


Antivirus functionality that goes beyond simply identifying and addressing known malware:

Leverages behavioral analytics and machine learning to provide a comprehensive yet
digestible view of both legitimate activity and malicious activity

Looks for signs of attack (Indicators of Attack) as they are occurring along with indicators
of compromise (IOC), which indicate an attack has already happened

Looks for behaviors that reveal IOAs — these may include indications that an attacker is
evading detection or that privileges are being changed to enable access

Includes CrowdStrike Threat Graph data modeling that's designed to analyze and
correlate the data that's collected from endpoint sensors worldwide for the purpose of
identifying patterns that could indicate an attack in progress
An endpoint detection and response (EDR) system that records all activities of interest to
enable inspection either in the moment or later: The system can hunt quickly through massive
amounts of data to find patterns of malicious activity. In addition, CrowdStrike's cloud
deployment model enables the EDR system to protect off-network or off-VPN systems, and
the EDR can assist with breach mitigation. API access to this recorded information provides
customers and third-party applications the ability to mine this information for other use cases.
Falcon Overwatch is a proactive managed threat hunting service by a team of cyberintrusion/detection
analysts and investigators. The Falcon Overwatch team monitors the CrowdStrike Threat Graph, which
consists of data from all Falcon sensors deployed globally as well as data from Falcon DNS.
Leveraging big data in this way allows the Overwatch team to find cutting-edge attack techniques and
reduce attacker dwell time from months to minutes.
Falcon Intelligence is a threat intelligence subscription service that's delivered via reports, feeds, and
APIs. It's intended to answer questions such as:

Is an attacker a risk?

What are the capabilities and intentions of an attacker?

Has the attacker been active or is currently active?
CrowdStrike provides a range of proactive and reactive incident response services. The M&A Cyber
Risk Assessment service helps assess the cybersecurity landscape of the companies involved in a
potential merger or acquisition. Early detection of vulnerabilities or compromised systems can prevent
or minimize liabilities and expenses that could be unpleasant surprises post-merger or postacquisition.
CrowdStrike believes its remote "day one" incident response services are an important differentiator
because of the speed with which it can respond. IR begins with the deployment of CrowdStrike Falcon
to enable endpoint visibility, use of threat intelligence, and appropriate remediation actions.
©2016 IDC
#US41921716
4
Go to Market
CrowdStrike is headquartered in Irvine, California, and in 2016, it expanded operations to Europe, with
a headquarters in London, and APAC, with a headquarters in Sydney. In addition to channel sales,
CrowdStrike is also ramping routes to market with MSSPs and IaaS offerings like Google Cloud
Platform.
Partnerships
The CrowdStrike Elevate Partner Program is open to systems integrators and consultants, solution
providers, managed service providers, cyberinsurance carriers, and technology partners. The program
provides APIs, applications, services, and tools to partners, along with education, training, comarketing, and joint sales planning.
Technology partners like Anomali integrate their solution with CrowdStrike threat intelligence APIs to
offer the intelligence service integrated into its platform, which aggregates intelligence across multiple
feeds. Other vendors like Cyphort will use the Connect APIs to share IOCs with the Falcon Platform.
Cloud providers like AWS and Google have partnered with CrowdStrike to ensure Falcon can be
deployed and managed seamlessly on all customer assets running in their cloud environments.
Many solution providers that resell CrowdStrike solutions, like Optiv and Guidepoint, are also using the
APIs to build a managed service to offer to their customers — thus complementing their business of
simply reselling software to providing a fully managed solution to the customer. Other vendors like
Rackspace are fully integrating the Falcon Platform into their overall security offering and selling the
customer a fully secure PaaS that is powered by CrowdStrike, which can be consumed as a monthly
subscription.
Systems integrators and consultants are also leveraging the Falcon Platform to provide their own
reactive incident response services to customers. The Elevate Program offers companies like
Navigant the tools, training, and licenses they need to deploy Falcon.
Cyberinsurance carriers like Chubb are offering loss prevention services that reduce cyberinsurance
costs for clients that use CrowdStrike. In addition, these carriers also refer clients to CrowdStrike
should the clients incur a data security breach.
Target Markets
In addition to technology companies — Rackspace is an example — CrowdStrike's customers include
three of the top 10 largest global companies by revenue, two of the top 10 credit card payment
processors, five of the top 10 largest banks, and three of the top 10 oil and gas companies.
CrowdStrike initially targeted the Fortune 1000 but has recently hired a corporate sales team to
expand downmarket. The emphasis on delivering less complex "next-generation antivirus" should
enable the team to expand to a broader base of upper midmarket and large enterprises.
IDC has validated CrowdStrike's assertions that the company is displacing competitive solutions. The
company now boasts a customer base consisting of 62 of the Fortune 500. A bank replaced a FireEye
(Mandiant) endpoint solution with CrowdStrike's to protect 12,000 endpoints. CrowdStrike is playing a
key role at organizations requiring security for systems with a small footprint, such as budget hardware
supporting customer-facing systems like self-check-in kiosks at airports and other major transportation
terminals.
©2016 IDC
#US41921716
5
The company had a competitive win over Carbon Black's whitelisting and endpoint response offerings
because the deployment could be done quickly and with minimal disruption. A management firm of
large apartment complexes ripped and replaced its traditional antivirus in favor of CrowdStrike. The
ability to roll out CrowdStrike in a day versus three months with an established endpoint security
vendor, and at a lower cost, sealed the deal.
FUTURE OUTLOOK
Challenges and Opportunities
CrowdStrike faces competitors that have expanded marketing spending, and one pure "nextgeneration antivirus" competitor, Cylance, has struck a key deal with Dell to sell its solution alongside
Dell business machines. CrowdStrike needs to expand its brand and demonstrate its customer
success stories to cross the chasm from its early adopter base to the pragmatist technology product
adopters that want a solution that functions out of the box, integrates with existing security
infrastructure, and produces measurable results. This requires CrowdStrike to seek partnerships with
established vendors that have already won over the pragmatist buyers, such as established IT
management providers and vulnerability management vendors. These efforts should result in strong
returns in the future.
IDC has identified several drivers in the cloud-hosted enterprise security service market (see
Worldwide Cloud Hosted Enterprise Security Services (Security as a Service) Forecast, 2015–2019,
IDC #257959, July 2015) that offer opportunities for service providers to differentiate themselves, all of
which CrowdStrike is focused on:

A focus on the midmarket (and channel). Cloud-based security solutions are best positioned
as channel-friendly offerings to midmarket and smaller customers. CrowdStrike sells to the
midmarket directly and through strong enablement of channel partners and integration with
service providers.

Offering of cloud-managed SaaS applications. The CrowdStrike solution is native to SaaS and
is managed through a cloud platform.

Integration with resources on-premises. As larger companies look to CHESS solutions, they
don't want multiple solutions to cover their broad architectural needs. That means clouddelivered solutions can't ignore on-premises resources. CrowdStrike deploys rapidly without
the need to integrate with on-premises tools.
IDC believes that threat intelligence is also a decisive factor in the selection of security products and
services vendors. Given the double-digit growth forecast of nearly $1.8 billion for the TISS market in
2020, vendors are likely to continue to create and refine offerings. However, in this young market,
there is confusion about the types of threat intelligence, what to buy, how to apply the information, how
to identify the most important threats, and how to prioritize actions.
Regardless, the opportunity is large for vendors and enterprises of all sizes. By engaging a vendor like
CrowdStrike, enterprises can implement security with a breach prevention emphasis that leverages
native cloud architecture, endpoint protection, threat intelligence, and incident response.
©2016 IDC
#US41921716
6
Meanwhile, there are challenges:

Integrating threat intelligence into a business is a complex endeavor. Organizations have to
navigate their own technologies as well as those proposed by vendors, and they struggle with
defining roles, responsibilities, communications, and processes.

While board members and executives are increasingly aware of and accepting the reality and
risks of cyberthreats, education must continue regarding the threat landscape, security
strategies, threat intelligence options, detection and response options, integration, budgeting,
and staffing.

A shortage of security talent is a continuing problem. Enterprises are increasingly evaluating
security services providers or outsourcing some tasks because of the difficulties associated
with staffing.
ESSENTIAL GUIDANCE
Advice for CrowdStrike
IDC believes that CrowdStrike is well positioned to continue its growth with its purpose-built cloud
solution and unique combination of capabilities. By operating with cloud speed and scale, CrowdStrike
can offer fast, easy deployment with no need for on-premises equipment. Further, the company offers
a number of community tools, use cases, and buyer checklists.
To support its continuing growth, CrowdStrike should:

Leverage the Coalfire reports in marketing and educational efforts to position itself as an
industry leader that is solving a big problem with an innovative approach

Elaborate on how "community immunity" is different and better than other crowdsourced threat
intelligence

Pursue partnerships that augment sales/distribution efforts and lead to more "pragmatist"
buyer engagements

Assist CXOs, IT leaders, and chief information security officers (CISOs) with educational
efforts about the security landscape and what every employee can do to minimize
vulnerabilities

Capitalize on buyers' preference for the opex business model
LEARN MORE
Related Research

IDC's Worldwide Security Services Taxonomy, 2016 (IDC #US41053315, March 2016)

Worldwide Threat Intelligence Security Services Forecast, 2016–2020: Strength in Numbers
(IDC #US41053415, March 2016)

Worldwide Endpoint Security Forecast, 2015–2019: The Influence of Specialized Threat
Detection (IDC #259807, November 2015)

Worldwide Cloud Hosted Enterprise Security Services (Security as a Service) Forecast, 2015–
2019 (IDC #257959, July 2015)
©2016 IDC
#US41921716
7

Worldwide Specialized Threat Analysis and Protection Forecast, 2015–2019: Defending
Against the Unknown (IDC #256354, May 2015)

Worldwide and U.S. Professional Security Services 2015–2019 Forecast: The Perfect Storm
(IDC #254562, March 2015)
©2016 IDC
#US41921716
8
About IDC
International Data Corporation (IDC) is the premier global provider of market intelligence, advisory
services, and events for the information technology, telecommunications and consumer technology
markets. IDC helps IT professionals, business executives, and the investment community make factbased decisions on technology purchases and business strategy. More than 1,100 IDC analysts
provide global, regional, and local expertise on technology and industry opportunities and trends in
over 110 countries worldwide. For 50 years, IDC has provided strategic insights to help our clients
achieve their key business objectives. IDC is a subsidiary of IDG, the world's leading technology
media, research, and events company.
Global Headquarters
5 Speen Street
Framingham, MA-01701
USA
508.872.8200
Twitter: @IDC
idc-community.com
www.idc.com
Copyright Notice
This IDC research document was published as part of an IDC continuous intelligence service, providing written
research, analyst interactions, telebriefings, and conferences. Visit www.idc.com to learn more about IDC
subscription and consulting services. To view a list of IDC offices worldwide, visit www.idc.com/offices. Please
contact the IDC Hotline at 800.343.4952, ext. 7988 (or +1.508.988.7988) or [email protected] for information on
applying the price of this document toward the purchase of an IDC service or for information on additional copies
or web rights.
Copyright 2016 IDC. Reproduction is forbidden unless authorized. All rights reserved.