Security Experts:

Connect with us

Hi, what are you looking for?


Endpoint Security

CrowdStrike Pushes Zero Trust With $96 Million Acquisition of Preempt Security

CrowdStrike (Nasdaq: CRWD) on Wednesday announced that it has agreed to acquire Preempt Security, a provider of Zero Trust and access control technology, in a deal valued at roughly $96 million.

CrowdStrike (Nasdaq: CRWD) on Wednesday announced that it has agreed to acquire Preempt Security, a provider of Zero Trust and access control technology, in a deal valued at roughly $96 million.

Founded in 2014 by Ajit Sancheti and Roman Blachman, Preempt is yet another cybersecurity firm with roots into the Israeli Defense Forces, where Blachman spent almost ten years.

CrowdStrike to buy Preempt SecurityPreempt focuses on providing security by preventing malicious transactions. It does this by identity, behavior, risk and context at the point of the transaction rather than just the point of log-in. It allows for control over who can access what resources and in what context without network segmentation or application development.

CrowdStrike plans integrate Preempt’s technology into the CrowdStrike Falcon platform to help customers achieve end-to-end visibility and enforcement on identity data.

“Hybrid work environments will become the norm for many organizations which means that Zero Trust security with an identity-centric approach and detecting threats in real-time are critical for business continuity. With the addition of Preempt Security’s capabilities, the CrowdStrike Falcon platform will provide enhanced protection against identity-based attacks and insider threats,” said George Kurtz, co-founder and chief executive officer of CrowdStrike. 

Under the terms of the agreement, CrowdStrike plans to pay roughly $86 million in cash and $10 million in stock and options subject to vesting conditions.

The acquisition is expected to close in CrowdStrike’s fiscal third quarter 2021.

Preempt had raised a total of $27.5 million in funding, including $17.5 million in a 2018 Series B funding round supported by ClearSky, Blackstone, Intel Capital and General Catalyst. The company also raised $8 million in a Series A round in 2016 and $2 million as seed funding in 2014.

*Additional reporting by Kevin Townsend

RelatedThe Emergence of Identity as an Enterprise Attack Surface

Written By

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

CISO Strategy

Varied viewpoints as related security concepts take on similar traits create substantial confusion among security teams trying to evaluate and purchase security technologies.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Application Security

Password management firm LastPass says the hackers behind an August data breach stole a massive stash of customer data, including password vault data that...

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Electric car maker Tesla is using the annual Pwn2Own hacker contest to incentivize security researchers to showcase complex exploit chains that can lead to...

Endpoint Security

The Zero Day Dilemma

Application Security

After skipping last month, Adobe returned to its scheduled Patch Tuesday cadence with the release of fixes for at least 38 vulnerabilities in multiple...