Unicorns 199/229 – CrowdStrike

Unicorns 199/229 – CrowdStrike


CrowdStrike

Founder / s: Gregg Marston, George Kurtz, Dmitri Alperovitch
Key people: Dmitri Alperovitch (Co-Founder & Chief Technology Officer), Colin Black (Chief Information Officer), Burt Podbere (Chief Financial Officer), Johanna Flower (Chief Marketing Officer) , Steven Chabinsky (General Counsel & Chief Risk Officer), and George Kurtz (Co-Founder, President & Chief Executive Officer)

History

CrowdStrike was co-founded by entrepreneur George Kurtz (CEO), Dmitri Alperovitch (CTO), Andy Gregg Marston (CFO, retired). In 2012, Shawn Henry, a former FBI executive who lead both the FBI’s criminal and cyber divisions, was hired to lead sister company CrowdStrike Services, Inc., which is focused on proactive and incident response services The

The company gain recognition for providing threat intelligence and attribution to national states actors Conduct economic espionage and IP theft. This contains es the outing of state-sponsored Chinese group, Putter Panda, linked to China’s spying on US defense and European satellite and aerospace industries. In the United States, supported by CrowdStrike’s reports, the US Department of Justice charged five Chinese military hackers for economic cyber espionage against. Similarly, the firm is known for uncovering the activities of Energetic Bear, an adversary group with a nexus to the Russian Federation That conducts intelligence operations against a variety of global victims with a primary focus on the energy sector

Following the very public Sony Pictures hack, CrowdStrike produced attribution to the government of North Korea within 48 hours and fare how the attack was carried out step-by-step. On May 2015, the company release Researcher Jason Geffner’s discovery of VENOM, a critical flaw in open source hypervisor called Quick Emulator (QEMU) Which is used in a number of common virtualization products.

In 2014, the company launched the Falcon platform, a technology that stops breaches by combining next-generation antivirus, endpoint detection and response, and proactive hunting. Also in 2014, CrowdStrike was instrumental in identifying members of PLA Unit 61486 as the perpetrators of a number of cyberattacks on U.S. infrastructure.

In July 2015, Google invested in the company’s Series C funding round, which in total raised $100 million. To date, CrowdStrike has achieved total funding of $256 million with estimated annual revenue of 100 million and valuation more than one billion. Investors includ e Telstra, March Capital Partners, Rackspace, Accel Partners and Warburg Pincus. According to the company, its customers includ e three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.

Crowdstrike has figured prominently in the Democratic National Committee cyber attacks and the attribution of those attacks to Russian intelligence services. On March 20, 2017 during testimony before congress, James Comey stated “Crowdstrike, Mandiant, and ThreatConnect review[ed] the evidence of the hack and conclude[d] with high certainty that it was the work of APT 28 and APT 29 who are known to be Russian intelligence services.” Comey previously testified in January that a request for FBI forensics investigators to access the DNC servers was denied. Prior to this, Crowdstrike had published a report Claiming that malware used in the Ukraine and against the DNC upcoming to be unique and identical, further evidence for a Russian origin of the DNC attack. By March 23, CrowdStrike would scale back some of the claims about the extent of the damage caused by the malware, but stood by its core claims about Russian sources of the hacking.