General Dynamics Fidelis Cybersecurity Solutions Teams with CrowdStrike a [Health & Beauty Close - Up]
(Health & Beauty Close - Up Via Acquire Media NewsEdge) General Dynamics Fidelis Cybersecurity Solutions said that it has partnered with CrowdStrike to provide customers with access to shared threat intelligence that will further improve the prevention, detection, attribution and remediation of cyber-attacks in real- time.
Supplementing the proprietary threat intelligence provided by General Dynamics Fidelis' threat research team, integrated YARA rules and other industry partnerships, the information from the CrowdStrike Intelligence Exchange provides Fidelis XPS customers with an even broader range of threat intelligence, the Company noted in its release.
"In the war against malicious actors, threat intelligence is a key weapon in a strong defense," said Peter George, president of General Dynamics Fidelis Cybersecurity Solutions. "Our participation in the Intelligence Exchange broadens the scope of intelligence we provide our customers and with the integration through Fidelis XPS, we enable our customers to apply that intelligence in real-time to operationalize the detection and remediation of threats."
Under the partnership, Fidelis XPS said that its customers will automatically receive detailed information from the CrowdStrike Intelligence Exchange that helps attribute malicious activity to specific threat actors. Powered by Fidelis XPS, the intelligence is applied in real-time on the network across current and historical network traffic data captured through Fidelis Collector. Additionally, through the partnership customers can request in- depth information regarding specific threat actors, including behavior patterns, type of information targeted and affiliations with other attacks.
"We are thrilled to have General Dynamics Fidelis Cybersecurity Solutions join the CrowdStrike Intelligence Exchange program," said Scott Fuselier, vice president of worldwide sales and operations at CrowdStrike. "We look forward to deep solution integration that provides end users with both context and prioritization into targeted attacks."
More Information and Complete Details:
((Comments on this story may be sent to firstname.lastname@example.org))
(c) 2014 ProQuest Information and Learning Company; All Rights Reserved.
[ Back To Technology News's Homepage ]