CrowdStrike (CRWD) Earnings Review

Exploring the Results of This Cybersecurity Disruptor.

CrowdStrike 101:

CrowdStrike is a next-gen, cloud-native endpoint cybersecurity company. Its bread-and-butter is called endpoint detection and response (EDR), which replaces legacy anti-virus (AV). Beyond EDR, it offers applications in cloud security, log management, forensics, identity, data protection etc. to round out its “Falcon Platform.” Falcon’s edge is in its ability to digest near-endless amounts of data to automate and uplift breach protection. CrowdStrike uses its large and diverse dataset to constantly improve Falcon’s efficacy and use cases… all with a single console and single agent to ensure superior interoperability. It can recycle this same data over and over again to efficiently develop new products for a single interface. More utility without adding complexity.

Important Endpoint Security Acronyms:

  • Endpoint detection and response (EDR) provides end-to-end visibility and protection with automated remediation and flagging services.

  • Managed detection and response (MDR) encompasses CrowdStrike’s team of threat hunters to augment EDR with human touch when needed.

  • Extended detection and response (XDR) is EDR with 3rd party, non-endpoint data sources infused. The incremental data sharpens breach protection and extends it beyond the endpoint.

Important Log Management Acronyms:

  • Log Scale ingests, organizes and stores data logarithmically. This allows for ingestion with more scale and faster time to value. As an important aside, Log Scale is a key ingredient for Falcon XDR. It is instrumental in XDR onboarding needed data sources in a scalable and efficient manner. This can be used to improve security and other parts of operations too.

  • Security Information and Event Management (SIEM) aggregates security logs/data to help organizations uncover and remediate threats faster. Log Scale is closely related to SIEM, as Log Scale is what actually collects data from various sources to be utilized here.

Important Cloud Security Acronyms:

  • Cloud Security & Posture Management (CSPM) tells you about your vulnerabilities and misconfigurations.

  • Cloud Infrastructure Entitlement Management (CIEM) tells you who is entering a software environment. It tells you if these entrants are allowed and exactly what they’re allowed to do.

  • Cloud Workload Protection (CWP) is a preventative measure to observe if anything bad is being done by entrants. This sounds the alarm bell while preventing and remediating cloud infrastructure attacks. It’s closely related to CSPM and CIEM.

  • Cloud Native Application Protection Platform (CNAPP) is the overall suite tying all of these cloud products together.

  • Application Security Posture Management (ASPM) locates and facilitates the safe control of cloud apps.

Now let’s dig into the detailed quarterly review:

Subscribe to Premium Membership to read the rest.

Become a paying subscriber of Premium Membership to get access to this post and other subscriber-only content.

Already a paying subscriber? Sign In

Reply

or to participate.