Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Mobile & Wireless

CrowdStrike Launches EDR Solution for Mobile Devices

Endpoint security firm CrowdStrike on Monday announced CrowdStrike Falcon for Mobile, an enterprise endpoint detection and response (EDR) solution for mobile devices.

Endpoint security firm CrowdStrike on Monday announced CrowdStrike Falcon for Mobile, an enterprise endpoint detection and response (EDR) solution for mobile devices.

Leveraging telemetry types such as mobile network activity, clipboard actions, and peripherals monitoring, the new solution aims to help security teams hunt for threats on mobile devices, gain visibility into access to sensitive corporate data, and protect user privacy.

The solution provides visibility into enterprise app behavior on Android and iOS devices, as well as real-time visibility into device health and security posture, which makes it easy to identify vulnerable devices.

CrowdStrike claims that the software is lightweight and has minimal impact on performance.

Courtesy of dynamic application shielding, it can also deliver enhanced monitoring of enterprise apps on Android, which results in additional protection of sensitive corporate data, the company says.

Falcon for Mobile also focuses on customer-designated corporate apps and does not monitor personal applications on the device (such as text messaging, email, photos, or browsing history). 

To provide security teams with rapid incident investigation capabilities, telemetry from mobile devices is delivered alongside data from traditional endpoints in a single interface.

The mobile solution is fully integrated with the Falcon platform, delivering Falcon threat intelligence and Falcon OverWatch services with no extra implementations or integrations, CrowdStrike says. 

Advertisement. Scroll to continue reading.

Related: CrowdStrike Adds Malware Search Engine to ‘Hybrid Analysis’

Related: CrowdStrike Unveils New Endpoint Protection, Threat Analysis Solutions

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Mobile & Wireless

Infonetics Research has shared excerpts from its Mobile Device Security Client Software market size and forecasts report, which tracks enterprise and consumer security client...

Mobile & Wireless

Samsung smartphone users warned about CVE-2023-21492, an ASLR bypass vulnerability exploited in the wild, likely by a spyware vendor.

Malware & Threats

Apple’s cat-and-mouse struggles with zero-day exploits on its flagship iOS platform is showing no signs of slowing down.

Fraud & Identity Theft

A team of researchers has demonstrated a new attack method that affects iPhone owners who use Apple Pay and Visa payment cards. The vulnerabilities...

Mobile & Wireless

Critical security flaws expose Samsung’s Exynos modems to “Internet-to-baseband remote code execution” attacks with no user interaction. Project Zero says an attacker only needs...

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Mobile & Wireless

Asus patched nine WiFi router security defects, including a highly critical 2018 vulnerability that exposes users to code execution attacks.