Security Experts:

Connect with us

Hi, what are you looking for?


Network Security

CrowdStrike Launches Threat Intelligence Exchange Program for Vendors

CrowdStrike, a security firm focused detection and mitigation of targeted attacks, today announced the launch of a new threat intelligence exchange platform that facilitates the access and exchange of threat intelligence between vendor partners.

CrowdStrike, a security firm focused detection and mitigation of targeted attacks, today announced the launch of a new threat intelligence exchange platform that facilitates the access and exchange of threat intelligence between vendor partners.

According to the company, the CrowdStrike Intelligence Exchange (CSIX) continuously improves vendor partners’ ability to detect and attribute attacks, allows for attack prioritization, and provides the end customer with rich context about the attacks in their environment.

CrowdStrike Intelligence Exchange “We are thrilled to launch the CrowdStrike Intelligence Exchange program and look forward to adding additional partners to a growing list of industry-leading solutions,” says Scott Fuselier, VP of WW Sales & Operations. “With today’s ever-changing threat landscape, it’s more important than ever to be able to gain context and prioritization into targeted attacks.”

CSIX launched with seven industry partners, including Agiliance, Centripetal Networks, Check Point Software Technologies, Ltd., General Dynamics Fidelis Cybersecurity Solutions, LogRhythm, ThreatQuotient, and ThreatStream.

Available immediately, security solution vendors can add rich context and attack prioritization through three go-to-market program options, CrowdStrike said, including:

CrowdID – OEM Partner can deliver basic attribution to help their customer understand if an attack is targeted or commodity, free of charge. The OEM Partner queries the CrowdStrike APO with supported indicators and/or submits a malware sample receiving attribution information.

Falcon Intelligence – Adversary Profile – Attribution data is made available to the OEM Partner’s solution to provide rich context and prioritization of targeted attacks. Content delivered to the customer includes both adversary name and full profile details, including targeted sectors, exploits used, and other trend data, under a license and revenue sharing model.

Falcon Intelligence Connect – CrowdStrike and the OEM Partner certify the integration of CrowdStrike Intelligence to the OEM Partner’s solution for use with joint customers.

“In the fight against malicious actors, threat intelligence can be the difference between a massive breach and attempted attack,” said Peter George, president of General Dynamics Fidelis Cybersecurity Solutions. “Customers will be better able to protect their systems with the increased scope of intelligence we can provide as a result of our participation in the Intelligence Exchange. The integration through Fidelis XPS enables threat detection and remediation to be operationalized, with the new intelligence applied in real time.”

Additional information on the platform is available online

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Expert Insights

Related Content


Websites of German airports, administration bodies and banks were hit by DDoS attacks attributed to Russian hacker group Killnet

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Threat Intelligence

How threat intelligence is critical when justifying budget for GRC personnel, and for threat intelligence, incident response, security operations and CISO buyers.

Identity & Access

Hackers rarely hack in anymore. They log in using stolen, weak, default, or otherwise compromised credentials. That’s why it’s so critical to break the...

Cybersecurity Funding

Forward Networks, a company that provides network security and reliability solutions, has raised $50 million from several investors.


The degree of danger that may be introduced when adversaries start to use AI as an effective weapon of attack rather than a tool...


Out of the 335 public recommendations on a comprehensive cybersecurity strategy made since 2010, 190 were not implemented by federal agencies as of December...


The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.