Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

CrowdStrike to Buy Zero Trust Data Encryption Firm SecureCircle

Zero trust is a conceptual destination, not an application. As with all destinations, there are different routes to it, and even different descriptions of it. CrowdStrike (NASDAQ: CRWD) believes it will complete its own zero trust destination on the endpoint by acquiring and integrating SecureCircle’s data encryption into its existing identity and access capabilities.

Zero trust is a conceptual destination, not an application. As with all destinations, there are different routes to it, and even different descriptions of it. CrowdStrike (NASDAQ: CRWD) believes it will complete its own zero trust destination on the endpoint by acquiring and integrating SecureCircle’s data encryption into its existing identity and access capabilities.

CrowdStrike announced, November 1, 2021, that “it has agreed to acquire SecureCircle, a SaaS-based cybersecurity service that extends zero trust security to data on the endpoint.”

CrowdStrike logoFinancial details have not been disclosed, but the all-cash transaction is expected to complete during CrowdStrike’s fiscal fourth quarter and will enable customers to enforce zero trust at the device level, the identity level, and the data level. 

The growth in remote working over the last two years has not merely increased the attack surface, it has simultaneously increased the potential for data loss through the remote workstations. Just as CrowdStrike defined itself as a revolutionary technology designed to replace legacy endpoint protections, it now claims that CrowdStrike plus SecureCircle will remedy DLP’s long-term failure to evolve with the modern enterprise.

“This is why I’m pleased to announce that CrowdStrike has agreed to acquire SecureCircle to modernize data protection and secure data on, from and to the endpoint,” says CTO Mike Sentonas in an associated blog

“Despite the critical need for data protection to be part of any security strategy today,” he continues, “legacy data loss prevention (DLP) tools have failed to rise to the challenge. As a result, security and risk teams struggle with rampant insider threats (both inadvertent and malicious), resource-intensive policy and control management, and a lagging workforce experience hampered by these burdensome and opaque rule sets.”

Once SecureCircle’s data encryption capabilities are combined with CrowdStrike’s zero trust assessments and Falcon zero trust, customers will have fine-grained visibility and control over their data through user-based data access management and policy enforcement from CrowdStrike’s zero trust scoring system. The intention is for customers to gain continuous risk monitoring that allows detection and response to threats at the device, identity or data layer.

CrowdStrike is bringing data protection and not just data access into its description of the zero-trust destination. 

“Data loss prevention has suffered from a lack of innovation, and legacy tools have completely failed to live up to the promise of preventing breaches,” said George Kurtz, co-founder and CEO of CrowdStrike. “At the same time, the endpoint has become the focal point for how data is accessed, used, shared and stored. CrowdStrike will be setting a new standard for endpoint-based data protection by connecting zero trust enforcement to the device, the user identity and, with this acquisition, the data users are accessing and using.”

Advertisement. Scroll to continue reading.

This purchase strengthens CrowdStrike’s drive into zero trust following the September 2020 acquisition of Preempt Security, a provider of Zero trust and access control technology, in a deal valued at roughly $96 million.

SecureCircle, based in Santa Clara, California, was founded by Jeff Capone in September 2016.

Related: Working Securely From Anywhere With Zero Trust

Related: Google Cloud Introduces New Zero Trust Offerings for Government

Related: The New Paradigm for Work from Anywhere: Zero Trust Network Access (ZTNA)

Related: A Deeper Dive Into Zero-Trust and Biden’s Cybersecurity Executive Order

Written By

Kevin Townsend is a Senior Contributor at SecurityWeek. He has been writing about high tech issues since before the birth of Microsoft. For the last 15 years he has specialized in information security; and has had many thousands of articles published in dozens of different magazines – from The Times and the Financial Times to current and long-gone computer magazines.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Compliance

The three primary drivers for cyber regulations are voter privacy, the economy, and national security – with the complication that the first is often...

Data Protection

While quantum-based attacks are still in the future, organizations must think about how to defend data in transit when encryption no longer works.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Fortinet on Monday issued an emergency patch to cover a severe vulnerability in its FortiOS SSL-VPN product, warning that hackers have already exploited the...