Register for our Dec 19th Webinar: Beyond the Perimeter: Achieving Comprehensive API Security

Blog Post

Strengthening our CrowdStrike Bond with Falcon Integration

Gilad Barzilay
Sep 19, 2023

It’s been just about a year since we first announced our partnership with CrowdStrike. We are delighted to share today that we’ve further strengthened that partnership with the new “better-together” story of Salt and the CrowdStrike Falcon® platform. The Salt Security API Protection Platform — now fully integrated with Falcon – is also available on the CrowdStrike Marketplace, making it easy and fast for companies to start gaining value from our award-winning API security platform.

This new integration provides customers with the most comprehensive view into API security risks. With Salt detection and a pre-built integration into the Falcon platform, we deliver robust API threat intelligence — with full visibility into the API attack surface and prioritization of API security threats. Together, our unique cloud-scale AI-driven API security platform and CrowdStrike’s award-winning AI-powered protection capabilities give organizations the easiest way to strengthen their security posture with two best-of-breed solutions.

Salt holds a special relationship with CrowdStrike. In addition to being a partner and — now — integrating with the Falcon platform, Salt counts CrowdStrike as an investor through its investment arm, Falcon Fund.

The companies also share a similar philosophy when it comes to security — namely, that better security derives from better context. This like-minded approach makes the Salt Security API Protection Platform a perfect fit for the Falcon platform. Good API security doesn’t exist without context.

API attacks unfold over time. Salt can capture all API calls and responses over days, weeks and even months. With our AI and ML-powered algorithms, which have been in the market over four years, we can provide real-time analysis and correlation across billions of API calls. Our platform’s deep context and adaptive intelligence help generate behavioral insights needed to spot API threats.

As Gur Talpaz, vice president of corporate development and head of Falcon Fund at CrowdStrike, explains:

“APIs represent the core of modern technology stacks, underpinning our digital-first society by enabling the seamless transfer of data and services. With APIs now a prime target for malicious actors, securing them requires a diligent and comprehensive approach. Through this joint integration, we can harness the mature AI-driven intelligence of the Salt API security platform with our widely-deployed Falcon platform, giving organizations comprehensive visibility into their application-layer attack surface and a robust understanding of their application threat landscape.”

Will you be in Vegas for Fal.Con 2023? If so, we’d love to meet and demonstrate the Salt API Protection Platform in person! Contact us to set up a meeting at the show.

Tags

Salt Security Blog

Sign up for the Salt Newsletter for the latest resources and blog posts.

November 27, 2024

Eric Schwake
Head of Product Marketing

Industry

Beyond Traditional Security: Addressing the API Security Gap

To safeguard your business from API-specific threats, you need a dedicated solution that offers comprehensive visibility, in-depth contextual analysis, automated governance, robust data protection, and AI-driven threat prevention.

Read more

November 21, 2024

Eric Schwake
Head of Product Marketing

Industry

API (In)security: The Hidden Risk of Black Friday

Learn how, for online retailers, Black Friday represents both a lucrative opportunity and a significant cybersecurity challenge.

Read more

November 5, 2024

Eric Schwake
Head of Product Marketing

Industry

API Security: The Non-Negotiable for Modern Transportation

Airlines and transportation companies heavily rely on APIs to handle sensitive data, from customer information to payment details and flight schedules. While crucial for efficient operations, these APIs are also prime cyberattack targets.

Read more

Download this guide for advice on evaluating key capabilities in API Security

Get the guide
Back