New Tech Q&A: Adaptiva – CrowdStrike alliance highlights trend of blending IT and security systems
2024-7-1 15:30:14 Author: securityboulevard.com(查看原文) 阅读量:8 收藏

By Byron V. Acohido

The coalescing of the next-gen security platforms that will carry us forward continues.

Adaptiva, a leader in autonomous endpoint management, recently announced the launch of OneSite Patch for CrowdStrike. This new solution integrates with CrowdStrike’s Falcon XDR platform to improve the efficiency and speed of patching critical vulnerabilities in enterprise systems.

This strategic alliance between Adaptiva and CrowdStrike makes a lot of sense. OneSite Patch leverages CrowdStrike’s rich threat intelligence and vulnerability data to prioritize and automate patch deployments.

Thus it provides a smooth path for companies to patch vulnerabilities and install updates much more efficiently. This pain point is intensifying at large and mid-sized enterprises as operations become more globally distributed and interconnected at the cloud edge.

The State of Patch Management in the Digital Workplace Report, for instance, underscores how legacy vulnerability management practices are by and large bereft of any meaningful strategic intent; for instance, some 79% of respondents said patch deployments are scheduled ad hoc or use a one-size fits all approach.

Last Watchdog engaged Davinder Singh, Chief Technology Officer at Adaptiva, to drill down on the current state of securing networks. Here’s that exchange, edited for clarity and length.

LW: What’s the core value proposition of this alliance with CrowdStrike?

Singh: The core value is in the rapid and autonomous patching of critical vulnerabilities — by leveraging CrowdStrike’s rich vulnerability data. The integration of Adaptiva’s OneSite Patch with CrowdStrike Exposure Management allows for automated, risk-based prioritization of patches, significantly reducing the time required to address vulnerabilities. This collaboration bridges the gap between security and IT teams, ultimately improving organizations’ cybersecurity posture and compliance.

LW: What’s an example that illustrates the benefit of teaming?

Singh

Singh: It’s now possible to automatically patch critical vulnerabilities across Windows and over 1,500 third-party applications as soon as patches are available. By utilizing CrowdStrike’s rich vulnerability insights, Adaptiva’s OneSite Patch can determine patch priorities and schedule deployments to ensure that critical vulnerabilities are patched immediately. This automated, data-driven approach eliminates delays caused by manual processes and improves coordination between security and IT teams, ultimately reducing the risk of cyberattacks and improving compliance with security regulations.

LW: Can you provide an anecdote from the field that shows an enterprise benefiting from combining CrowdStrike’s rich intel with Adaptiva’s streamlined approach to patch management?

Singh: One example is a large tire manufacturer that operates multiple production plants globally, each with its own production schedule. Patches can only be applied outside of production times. But the IT team lacked control over production schedules, requiring approval from plant management for any patching activities.

Adaptiva’s OneSite Patch integrates plant managers into the approval process, automatically notifying them when a patch update is available. Plant managers then review and approve patches, with the ability to identify which patches are critical. This ensures that patches are applied efficiently without disrupting production schedules.

All stakeholders have complete visibility. Security teams can monitor compliance, while IT teams can ensure that patches are deployed in a timely manner without interfering with production. Combining CrowdStrike’s threat intelligence and Adaptiva’s patch management streamlined the manufacturer’s vulnerability management process, enhancing their overall cybersecurity posture while maintaining production efficiency.

LW: Can you correlate vulnerability management (VM) best practices to the rising threat of GenAI-enhanced attacks? How does robust VM help meet this new exposure?

Singh: GenAI can be used by attackers to continuously scan for weaknesses and launch real-time attacks. This constant threat environment requires organizations to be equally vigilant. Continuous monitoring of systems and real-time integration of threat intelligence can help detect anomalies and new threats as they emerge.

Coupled with an efficient patch management process, organizations can significantly reduce the window of exposure. Given that nearly 60% of companies take two weeks or more to initiate patch deployment, improving this process is critical to staying ahead of potential breaches.

Automated remediation tools can drastically reduce the time from detection to mitigation, applying patches, isolating affected systems, and initiating other defensive measures without human intervention.

LW: What does this partnership signal about emergent security frameworks and platforms?

Singh: By combining Adaptiva’s autonomous patching capabilities with CrowdStrike’s AI-driven vulnerability data it becomes possible to support a wide range of applications and systems in a diverse and complex environment.

In the years to come, security frameworks and platforms will increasingly rely on automation, AI, and integrated approaches to enhance protection, streamline operations, and adapt to the evolving threat landscape.

The alliance between Adaptiva and CrowdStrike signals how IT and security platforms must seamlessly collaborate. Unifying workflows improves efficiency and reduces silos within organizations.

Acohido

Pulitzer Prize-winning business journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be.


(LW provides consulting services to the vendors we cover.)

July 1st, 2024 | Uncategorized


文章来源: https://securityboulevard.com/2024/07/new-tech-qa-adaptiva-crowdstrike-alliance-highlights-trend-of-blending-it-and-security-systems/
如有侵权请联系:admin#unsafe.sh