Cohesity, a pioneer in AI-powered data security, announced an expanded strategic partnership with CrowdStrike to strengthen threat detection and response.

This partnership combines Cohesity’s robust data protection capabilities with CrowdStrike's world-class threat intelligence feeds, setting a new standard for comprehensive cybersecurity in backup and recovery solutions.

Other advanced technologies

The partnership is levelling the playing field against sophisticated cyber threats

According to CrowdStrike’s 2024 Global Threat Report, adversaries have shifted to more effective tactics, such as credential harvesting and exploiting vulnerabilities, bypassing legacy defences while using AI and other advanced technologies to rapidly evolve their techniques.

Through the latest integration between Cohesity Data Cloud and CrowdStrike Falcon Adversary Intelligence, the partnership is levelling the playing field against sophisticated cyber threats.

Latest intelligence on emerging threats

Cohesity’s data protection solution, combined with CrowdStrike’s industry-pioneering threat intel feeds, which tracks over 250 adversaries and incorporates indicators of compromise (IOCs), enables mutual customers to identify the latest threats in their backup copies with higher fidelity and accuracy.

The powerful combination offers greater visibility into the attack by providing the latest intelligence on emerging threats while minimising the attackers’ advantages.

Cohesity backup copies

Threat hunting on Cohesity backup copies allows customers to investigate stealthily and passively

Threat hunting on Cohesity backup copies allows customers to investigate stealthily and passively so that adversaries or containment or response activities do not impact investigations.

By implementing Cohesity’s clean room design and integrated tooling, customers gain specialised forensic capabilities to analyse malware, investigate breaches, and understand attack vectors without risking contamination of their broader IT environment.

Disposal of cyber adversaries

Elevating your organisation’s threat detection and response is crucial in today’s threat environment, especially with AI at the disposal of cyber adversaries,” said Craig Martell, Chief Technology Officer, Cohesity.

Secondary data estates offer a perfect opportunity for minimising attackers’ advantages and, together with CrowdStrike, our customers can enhance their threat hunting and response and automate defences across their security stack.”

Latest joint efforts

Cohesity focused on getting jointly the best of the security drive, letting clients choose the right solutions

Cohesity is focused on bringing together the best of the security industry, allowing customers to choose the right solutions for them without sacrificing functionality or adding complexity. This flexibility allows for a more tailored security posture that can adapt to emerging threats and changes in the IT environment.

Our continued partnership with Cohesity and latest joint efforts reflect our shared commitment to cyber resilience,” said Daniel Bernard, chief business officer, CrowdStrike.

Security insights

Bernard added: “To stay ahead, enterprises benefit from streamlining threat intelligence and response efforts while also harnessing their vast secondary data to gain security insights. This integration provides the technology and intelligence they need to reduce risk.”

By partnering with industry pioneers like CrowdStrike, Cohesity solutions can better safeguard organisations' digital assets in the dynamic threat environment.

Download PDF version Download PDF version

In case you missed it

Anviz Global expands palm vein tech for security
Anviz Global expands palm vein tech for security

The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelen...

Bosch sells security unit to Triton for growth
Bosch sells security unit to Triton for growth

Bosch is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. The transaction enc...

In age of misinformation, SWEAR embeds proof of authenticity into video data
In age of misinformation, SWEAR embeds proof of authenticity into video data

The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of thi...

Quick poll
What is the most significant challenge facing smart building security today?