IronNet Collective Defense Platform Logo

IronNet Collective Defense Platform

By IronNet

Advanced cybersecurity through Collective Defense

Start Product Trial

IronNet and CrowdStrike®: Reducing the impact of cyber attacks with integrated Endpoint and Network Detection and Response

IronNet’s network detection and response (NDR) platform, IronDefense, integrates with CrowdStrike Falcon® Endpoint Protection capabilities and enables customers to:
  • Easily view network and endpoint telemetry data on a single pane of glass: IronDefense works natively with CrowdStrike to provide relevant host details through IronDefense’s IronVue User Interface, delivering the necessary contextual information that speeds up time to detection by reducing investigative workflow complexity.
  • Instantly contain threats: Analysts using IronDefense can contain endpoints with one click through IronNet’s IronVue interface. This enables security teams to instantly stop threats during an investigation.
  • Pivot seamlessly from network to endpoint during an investigation: IronDefense users with CrowdStrike permissions can pivot to the CrowdStrike Falcon interface for deeper investigation, allowing security teams to seamlessly trace suspicious behaviors on the network to the source endpoint.
    Simplify investigative workflows
    IronDefense, IronNet’s network detection and response solution, works natively with CrowdStrike to provide relevant host details through IronDefense’s IronVue user interface. This delivers the contextual information that speeds up time to detection by reducing the complexity of investigative workflows.
    Instantly contain threats
    Analysts using IronDefense can contain endpoints with one click through IronVue. This enables security teams to instantly stop threats during an investigation from a single pane of glass.
    Pivot seamlessly from network to endpoint during an investigation
    IronDefense users with CrowdStrike permissions can also pivot to the CrowdStrike Falcon interface for deeper investigation, allowing security teams to seamlessly trace suspicious behaviors on the network to the source endpoint.