CrowdStrike

CrowdStrike

Vulnerability Management (Falcon Spotlight)

CrowdStrike Falcon Spotlightは、端末やサーバに存在する脆弱性(CVE)やパッチの適用状況の情報を自動的に収集し、ほぼリアルタイムに可視化する脆弱性管理ソリューションです。�

We provide comprehensive support for vulnerability countermeasures by providing functions that solve customers' operational issues in each phase of the vulnerability countermeasure cycle: "visualization of vulnerabilities", "prioritization of countermeasures" and "patch application". .

Vulnerability Management (Falcon Spotlight)

In order to protect the system from threats, it is necessary not only to quickly detect an attack that has occurred and take appropriate countermeasures and restore the "response (cyber resilience)" process, The process of “prevention (IT hygiene)” to identify and prevent cyberattacks is also important.

In realizing security, many customers aim to realize "countermeasures" rather than "prevention" and introduce antivirus and EDR products. However, even if the process of "handling" is achieved at a high level, if "prevention" is not achieved, many threats slip through defenses, resulting in an enormous number of alerts to be dealt with. As a result, it is conceivable that sufficient protection cannot be achieved or that the number of man-hours required for implementation increases. If you're "preventive," you'll be able to forestall many of the threats and focus on the alerts that really need to be addressed.

In order to achieve IT hygiene, which is a "prevention" process, it is necessary to identify the vulnerabilities that exist in the environment and apply patches to especially high-risk vulnerabilities quickly and reliably.

Vulnerability Management (Falcon Spotlight)

(1) Visualization of assets and vulnerability status in the environment

Falcon Spotlight visualizes vulnerabilities existing in the environment from log information collected by sensors. You can also search for vulnerabilities by host name, product name, CVE number, etc. With this, for example, it is possible to search for vulnerabilities that exist in the device in order to investigate the device detected by EDR, or to use the CVE number when information on a high-risk vulnerability is disclosed. It is possible to search for the presence or absence of impacts in the environment by using

(1) Visualization of assets and vulnerability status in the environment

(2) Prioritization of vulnerabilities

Vulnerability can be narrowed down using information such as "vulnerability risk", "property of assets", and "number of assets", which are the criteria for prioritizing visualized vulnerabilities.

As a vulnerability risk index, you can use not only the standard vulnerability assessment score CVSS, but also the score from CrowdStrike's own ExPRT Rating. The ExPRT Rating dynamically determines whether a vulnerability is currently a threat based on its frequency of use in recent attacks and the activity of nation-state attackers.

(2) Prioritization of vulnerabilities
(2) Prioritization of vulnerabilities

③Remote patch application via Falcon console

Falcon Spotlight also has features for dealing with discovered vulnerabilities. Microsoft patches to fix vulnerabilities can be applied to the host from the console. You can also visualize the patch application status. This makes it possible for administrators to fix vulnerabilities without relying on host users.

③Remote patch application via Falcon console

Inquiry/Document request

In charge of Macnica CrowdStrike Co., Ltd.

Mon-Fri 8:45-17:30