“In its current CWS offering, the vendor has great CSPM capabilities for Azure, including detecting overprivileged admins and enforcing storage least privilege and encryption, virtual machine, and network policy controls.” – The Forrester Wave™: Cloud Workload Security, Q1 2022
Forrester researched, analyzed and scored the 12 most significant cloud workload security (CWS) vendors. CrowdStrike is among these companies that are characterized by “a thought-leading, productized portfolio of products and services,” the Forrester Wave states. They are frequently mentioned in Forrester end-user client inquiries, vendor selection RFPs, shortlists, consulting projects and case studies, and by other vendors during Forrester briefings as “viable and formidable competitors.” The Forrester Wave evaluated CWS providers on 33 criteria, which were grouped into the three high-level categories of:
- Current offering: setup, configuration, data integration, high availability/data sovereignty, identity and access management, cloud workload protection (CWP), cloud security posture management (CSPM), container protection, integration, reporting and scalability
- Strategy: execution roadmap, CWS integration, market approach, planned enhancements, supporting products and services, partner ecosystem and commercial model
- Market presence: CWS revenue and number of live installations
CrowdStrike received the highest possible score in the scalability criterion and also scored among the highest in the execution roadmap criterion, and among the second highest in the partner ecosystems criterion. As a strong player in the cloud security space, we believe this demonstrates our potential for continued growth and innovation in defending against cloud-focused threats.
Planning and Building a Future in the Cloud
As adversaries have shifted to target enterprise cloud environments, CrowdStrike has emerged as a powerful player with cloud security innovation in both CWP and CSPM. The rise of cloud threats demands a stronger, more comprehensive approach to enterprise cloud defense.
CrowdStrike believes the most effective cloud security is only possible through a combination of runtime security, provided through an agent-based approach, and control plane and build-time security provided through an agentless approach.
“CrowdStrike continues to invest heavily in developing our cloud security offerings, which are holistically integrated across agent-based and agentless approaches to provide end-to-end security from build-time to runtime,” said Amol Kulkarni, Chief Product and Engineering Officer at CrowdStrike. “This recognition from Forrester is a testament to the rapid strides we have made in this area and the significant customer adoption that has resulted.”
Our technology enables broad support for securing cloud environments: Falcon Cloud Security detects and prevents risk across AWS and Azure resources, and has assessment coverage for server, Kubernetes and serverless services to detect indicators of misconfiguration. Falcon Cloud Security also provides comprehensive breach protection for workloads, containers and Kubernetes, enabling organizations to build, run and secure cloud-native applications with speed and confidence. The solution secures cloud workloads and containers wherever they run and integrates directly into the continuous integration/continuous delivery (CI/CD) pipeline for image and registry scanning. Teams can create verified image policies to ensure only approved images can progress through their pipeline and run in their hosts or Kubernetes clusters.
Additional Resources
- Read about the capabilities built into Falcon Cloud Security by visiting its product page.
- Learn more about protecting cloud workloads using CrowdStrike and Amazon Web Services.
- Check out the Falcon Cloud Security product page to read the full details of its capabilities.