Cohesity Integrates CrowdStrike Threat Intelligence into Data Protection Platform

Data security provider Cohesity has added CrowdStrike threat intelligence to its flagship data protection platform.

Specifically, the company announced the general availability of Cohesity Data Cloud integration with CrowdStrike Falcon Adversary Intelligence. Cohesity likened this move to the "bring your own" — or BYO — model, such as in BYOD (bring your own device) scenarios. In this case, instead of employees bringing their own devices to work, organizations can bring their own threat intelligence functionality to Cohesity's data protection platform.

"Our latest collaboration with CrowdStrike, one of our inaugural Data Security Alliance partners, allows customers to bring their own (BYO) cyber threat intelligence," Cohesity said in a blog post. "The addition of CrowdStrike's world-class threat intelligence feeds, which tracks over 250 adversaries — exposing their activity, tools, and tradecraft — while incorporating indicators of compromise (IOCs), allows customers to detect the latest threats with higher fidelity and accuracy and enhance the effectiveness and efficiency of their response activities."

The move expands Cohesity's strategic partnership with CrowdStrike, a partnership that now has its own website which lists use cases for the new integration:

  • Threat hunting: Integrate threat intelligence feeds from Falcon Adversary Intelligence to identify threats within your Cohesity data with higher fidelity.
  • Forensic analysis and response: Use the latest threat intel feeds to hunt for threats in your backups across data centers and edge locations -- without interruptions from cyber incidents.
  • Data recovery: Use the latest threat intel feeds to identify IOCs before restoration, minimizing the risk of reattack.
  • Threat detection: Speed up threat detection by enriching CrowdStrike Falcon LogScale logs with data security insights on anomalies, sensitive data, and threats within your Cohesity data.

Cohesity said Falcon Adversary Intelligence delivers custom IOCs derived from the automated analysis of threats that reach an organization's endpoints. One bit of functionality highlighted in the announcements is the ability to run threat hunts on backup copies of data, which lets organizations stealthily investigate where the attacker has persistence. The ability to investigate out-of-band helps prevent adversaries from enacting countermeasures, the company said. Because detection occurs on secondary data rather than the host itself, Cohesity's ability to discover IOCs is not impacted by incident containment activities that might isolate hosts and networks.

High-Level Workflow
[Click on image for larger view.] High-Level Workflow (source: Cohesity).

"By implementing Cohesity's clean room design and integrated tooling, customers gain specialized forensic capabilities to analyze malware, investigate breaches, and understand attack vectors without risking contamination of their broader IT environment," the company said in a news release.

"Elevating your organization's threat detection and response is crucial in today's threat environment, especially with AI at the disposal of cyber adversaries," commented Cohesitys CTO Craig Martell, in a statement. "Secondary data estates offer a perfect opportunity for minimizing attackers' advantages and, together with CrowdStrike, our customers can enhance their threat hunting and response and while also automating defenses across their security stack."

For more information, visit the Cohesity site.

About the Author

David Ramel is an editor and writer at Converge 360.

Featured

  • A teacher and students gather around a glowing crystal ball containing a miniature school building surrounded by clear AI symbols, including holographic interfaces, neural networks, circuits, and data streams

    2025 Predictions: AI's Impact on Education

    What should schools and districts expect from the evolving landscape of artificial intelligence in the coming year? Here's what the experts told us.

  • digital illustration of Estonia with glowing neural network-like connections spreading across the map

    Estonia to Roll Out ChatGPT Edu for all Secondary Schools

    In a nationwide artificial intelligence program dubbed "AI Leap 2025," the country of Estonia plans to provide free access to leading AI applications for all secondary school students and teachers. The initiative will launch with a rollout of ChatGPT Edu to 20,000 high school students in grades 10-11 and their 3,000 teachers, beginning Sept. 1.

  • A middle school student wearing safety goggles and a lab coat uses a microscope in a science lab, surrounded by beakers and test tubes filled with colorful liquids

    2025 Young Scientist Challenge Seeks Students Using Science to Solve Everyday Problems

    The entry period is now open for the 2025 3M Young Scientist Challenge, a science competition from 3M and Discovery Education for students in grades 5-8 recognizing individuals across the United States who have "demonstrated a passion for using science to solve everyday problems and improve the world around them."

  • young child sitting at a table, using a tablet with an AI-generated interface

    Research: 1 in 3 Kids Use AI for Learning

    In a survey of parents with children aged 8 or younger, nearly a third of respondents (29%) said their child has used AI for school-related learning, according to a new report from Common Sense Media.