Proofpoint and CrowdStrike Enter Joint Partnership

Cyber Security Investing

Proofpoint (NASDAQ:PFPT), cybersecurity company has entered a joint venture with endpoint security company CrowdStrike (NASDAQ:CRWD) to focus on email protection for organizations. Together, the companies are combining Proofpoint’s Targeted Attack Intelligence with CrowdStrike’s Falcon endpoint protection for multi-layered threat detection services. As quoted in the press release: The integration between Proofpoint and CrowdStrike will be quick …

Proofpoint (NASDAQ:PFPT), cybersecurity company has entered a joint venture with endpoint security company CrowdStrike (NASDAQ:CRWD) to focus on email protection for organizations. Together, the companies are combining Proofpoint’s Targeted Attack Intelligence with CrowdStrike’s Falcon endpoint protection for multi-layered threat detection services.

As quoted in the press release:

The integration between Proofpoint and CrowdStrike will be quick and simple to enable, via cloud-to-cloud APIs, and ensure that joint customers can leverage their detection engines working in concert to stop attacks. In the first technology integration, Proofpoint will check potentially malicious attachments with CrowdStrike Falcon Intel and will add unique new hashes to the customer’s custom intelligence. An alert will then be created if new related malicious content tries to execute on the device.

“Proofpoint and CrowdStrike customers will immediately benefit from our strategic partnership and threat intelligence integration as security teams work tirelessly to protect their people from increasingly targeted malware attacks,” said Ryan Kalember, executive vice president of Cybersecurity Strategy for Proofpoint. “More than 90 percent of attacks are initiated by email, and nearly all require a user to click on a URL or malicious attachment to activate them, rather than exploiting a technical vulnerability. Our integration with CrowdStrike will provide our joint customers with automated context and visibility to further ensure all endpoints are protected from malicious attachments.”

Click here to read the full press release.

The Conversation (0)
×