Jump to content

Talk:CrowdStrike

Page contents not supported in other languages.
From Wikipedia, the free encyclopedia

This is an old revision of this page, as edited by 217.155.93.34 (talk) at 11:58, 8 February 2022 (Aren't their products important?). The present address (URL) is a permanent link to this revision, which may differ significantly from the current revision.


Nice advertisement for CloudStrike!

Excellent 2-pager. Should have pix of company headquarters & headshots of execs. — Preceding unsigned comment added by 75.5.64.73 (talk) 15:38, 24 July 2016 (UTC)[reply]

==Products? This article makes barely a mention of the products that, presumably, pay for all the stuff that is discussed. Is that a deliberate omission?

CrowdStrike's fake quotes and fake information about claimed Russia hack

I suggest to either adjust or balance CrowdStrike's claims in this article. Because according to the Washington D.C. based Voice of America (VOA) which is the largest U.S. international broadcaster and also according to the not-for-profit and independent Centre for Research on Globalization (CRG), CrowdStrike were recently exposed with their misattribution of quotes and fake information. In other words, CrowdStrike lied to you. CrowdStrike, the cyber-security firm that initially claimed Russia hacked the DNC and tilted the 2016 election in Donald Trump’s favor, is being accused of misattribution of quotes in a December report. CrowdStrike have since walked back key and central claims in said report, calling their credibility into serious question. (Note: it seems only VOA is reporting on this for some reason, VOA has had their own credibility issues) SwiftChancellor (talk) 17:05, 26 January 2018 (UTC)[reply]

Related articles and sources (Although three sources are posted here, the second two just reference the VOA article. Yes, the same VOA that oddly attempted to support Spicer's inauguration crowd size assertions: https://twitter.com/sarahkendzior/status/822948250550411265) SwiftChancellor (talk) 17:05, 26 January 2018 (UTC)[reply]

Related video at https://www.youtube.com/watch?v=tKJ7SRJuz-A&feature=youtu.be

Francewhoa (talk) 22:57, 29 March 2017 (UTC)[reply]

That article doesn't mention Wikileaks at all, so this is not the really the best place to discuss it. But in any case, my response is: the VOA news article is a good source for the article Fancy Bear, where it is already appropriately cited. The VOA article or something like it might also be appropriate for the CrowdStrike article, so long as we were extremely careful to follow the source and avoid undue emphasis. (We would, for instance, have to note CrowdStrike's defense, that its update to the report "does not in any way impact the core premise of the report..."). Citation in almost any other article (except maybe Russian military intervention in Ukraine (2014–present), in which the original report isn't even mentioned) would be a violation of a whole bunch of principles, including, variously, WP:SYNTH, WP:UNDUE, and WP:COATRACK. Neutralitytalk 00:00, 30 March 2017 (UTC)[reply]
Hi all :) For those interested to join or continue this discussion, I suggest we resume in that other talk page. This would centralize discussion related to that news about CrowdStrike who walked back some of their key and central claims. Thanks to contributor Neutrality for that suggestion :)
Francewhoa (talk) 01:25, 30 March 2017 (UTC)[reply]
Yes, this is a good place to discuss it because whether Wikileaks was specifically mentioned at all or not, the fact is it's a central component of what CrowdStrike was investigating so to say it's not appropriate to the article is ridiculous. As for "does not in any way impact the core premise"...) that's the typical dissembling by entities caught making false claims and conclusions. It's not a "defense." — Preceding unsigned comment added by 72.239.232.139 (talk) 21:31, 16 May 2017 (UTC)[reply]

Michael Alperovitch/ Papa Bear/ Fancy Bear

CrowdStrike

The private?? government company needs some explanation, private company? Guess we all know that this is not the case!!!! The fist section of the information needs to be rewritten.

  • what is CrowdStrike, and who is paying them, Follow the money, who is supporting them!
  • What right do private companies have, are they hackers, hacking for the government? A big question, so are they hackers or are they in for the money?

i will rewrite the first section, we now know what they do! We only need to know who is paying them! If the US is is founding them, it's just government! Only governments can do this kind of recherche, or they are just hackers?

COI edit requests

Hi! CrowdStrike is a client of mine, and I'd like to request some updates to this article.

  • First up, would love some feedback on what needs to be done to this article to get the {{ad}} template removed. Happy to propose some wording tweaks, but I'm genuinely not sure where the issue is and don't want to waste anyone's time with superfluous requests.

The rest of the requests are in the "Russian hacking investigations" section...

  1. Adding this to the end of the first paragraph as some additional context: On July 13, 2018, the U.S. Justice Department indicted 12 Russian officials who were allegedly responsible for the DNC attack.[1]
     Done
  2. Deleting the word "erroneously" from the second sentence of the second paragraph. This statement is unsourced, and as the rest of the section breaks down the nuances of how this assessment played out, I think "erroneous" is too definitive in its framing.
     Done
  3. Deleting However, they failed to show that the hacked variation of POPR-D30 was actually installed by any Ukrainian soldiers.[2][3] from the end of the second paragraph. The first source, Medium, is WP:SPS. The second source is useful for backing up the previous sentence, but does not corroborate this statement.
     Partly done I kept the second source. As you said, it backs up the sentence CrowdStrike found a hacked variation of POPR-D30 being distributed on Ukrainian military forums that utilized an X-Agent implant. and the Budapest University of Technology and Economics is a reliable source for a statement like this.
  4. In the third paragraph, replacing The International Institute for Strategic Studies, whose data on Ukrainian D30 howitzer losses was misused by CrowdStrike in their report, rejected CrowdStrike's assessment of hacking causing losses to Ukrainian artillery units. with The International Institute for Strategic Studies, whose data on Ukrainian D30 howitzer losses was referenced by CrowdStrike in their report, rejected CrowdStrike's interpretation of its data., which is less redundant and, I believe, more neutral.
     Partly done Rephrased this to The International Institute for Strategic Studies rejected CrowdStrike's assessment of hacking causing losses to Ukrainian artillery units, saying that their data on Ukrainian D30 howitzer losses was misused by CrowdStrike in their report. which I think best represents what the source says.
  5. Replacing the final, unsourced sentence – However, there is no evidence that they succeeded in hacking Sherstyuk's email. – with While Secureworks did not publish complete lists of individuals it believed were hacked, it did conclude "the majority of the activity appears to focus on Russia's military involvement in eastern Ukraine".[4] Additional Associated Press research supports CrowdStrike's conclusions about Fancy Bear;[5] Radio Free Europe's summary of the AP report notes that it "lends some credence to the original CrowdStrike report, showing that the app had, in fact, been targeted."[6] (Ref name already in use in article.)
     Done with minor modifications. I trust AP's assessment.

References

  1. ^ Arciga, Julia; Woodruff, Betsy (13 July 2018). "Mueller Indicts 12 Russian Officers for Hacking Dems in 2016". The Daily Beast. Retrieved 2 April 2019.
  2. ^ Carr, Jeffrey (January 3, 2017). "The GRU-Ukraine artillery hack that may never have happened". Medium. Retrieved February 8, 2018. {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  3. ^ Boldi (January 3, 2017). "Technical details on the Fancy Bear Android malware (poprd30.apk)". Laboratory of Cryptography and System Security, Budapest University of Technology and Economics. Retrieved February 8, 2018. {{cite web}}: Cite has empty unknown parameter: |dead-url= (help)
  4. ^ Cite error: The named reference Secureworks was invoked but never defined (see the help page).
  5. ^ Satter, Raphael (2 November 2017). "Russia hackers pursued Putin foes, not just US Democrats". Associated Press. Retrieved 2 April 2019.
  6. ^ Miller, Christopher (2 November 2017). "'Fancy Bear' Tried To Hack E-Mail Of Ukrainian Making Artillery-Guidance App". Radio Free Europe/Radio Liberty. Retrieved 2 April 2019.

Due to my COI, I won't be editing the article directly. I appreciate any help or feedback! Thank you. Mary Gaulke (talk) 19:05, 2 April 2019 (UTC)[reply]

See my responses above. feminist (talk) 04:04, 12 April 2019 (UTC)[reply]
@Feminist: Thank you so much! Any thoughts on the {{ad}} template? Trying to be thoughtful and specific in how I go about rectifying whatever needs to be fixed to address it. Mary Gaulke (talk) 01:51, 15 April 2019 (UTC)[reply]

new COI edit requests

Hi again! As disclosed above, CrowdStrike is a client of mine. I'd like to request a few more updates to this article.

1. Firstly, I'm still hoping for some guidance about what this article needs in order to get the {{ad}} template removed. I want to work with the community on this, and honestly, I'm not certain right now where the issue is in the current article.

2. Updating the history section for a) improved chronology, b) additional context, c) neutral language, d) combining a duplicate ref, and e) adding a new "Funding" subsection into which I moved existing info, plus incorporating some of the major items from the "Industry recognition" section as prose. Additions are highlighted and deletions are struck through:

CrowdStrike was co-founded by entrepreneur George Kurtz (CEO),[1][2] Dmitri Alperovitch (CTO),[3] and Gregg Marston (CFO, retired) in 2011.[4] In 2012, Shawn Henry, a former Federal Bureau of Investigation (FBI) executive who led both the FBI's criminal and cyber divisions, was hired to lead sister company CrowdStrike Services, Inc., which is focused on proactive and incident response services.[5] In June 2013 the company launched its first product, CrowdStrike Falcon.[6]
The company gained recognition for providing threat intelligence and attribution to nation state actors[7] conducting economic espionage and IP theft. This includes the outing of state-sponsored Chinese group, Putter Panda, linked to China's spying on United States defense and European satellite and aerospace industries.[8] In May 2014, supported by CrowdStrike's reports, the United States Department of Justice charged five Chinese military hackers for economic cyber espionage against United States corporations. Similarly, the firm is known for uncovering the activities of Energetic Bear, an adversary group with a nexus to the Russian Federation that conducts intelligence operations against a variety of global victims with a primary focus on the energy sector.
Following the very public Sony Pictures hack, CrowdStrike produced attribution to the government of North Korea within 48 hours and demonstrated how the attack was carried out step-by-step.[9] In 2013, the company launched the Falcon software platform, a technology that stops breaches by combining next-generation antivirus, endpoint detection and response, and proactive hunting. In 2014, CrowdStrike was instrumental played a major role in identifying members of Putter Panda, the state-sponsored Chinese group also known as PLA Unit 61486, as the perpetrators of a number of cyberattacks on U.S. infrastructure and defense as well as on European satellite and aerospace industries.[8][10]
In 2014 and 2015, CRN Magazine named the company to its Top Emerging Vendors list.[11] In May 2015, the company released Researcher Jason Geffner's discovery of VENOM, a critical flaw in open source hypervisor called Quick Emulator (QEMU),[12] which is used in a number of common virtualization products. This vulnerability could allow attackers to access sensitive personal information.[13] In October 2015, CrowdStrike announced that it had identified Chinese hackers attacking technology and pharmaceutical companies immediately before and after President Barack Obama and Chinese President Xi Jinping publicly agreed not to use cyberspies as part of economic espionage against each other. The alleged hacking would have been in violation of that agreement.[14]
In 2016, the company was ranked #40 on the Deloitte Fast 500 North America list,[15] and Inc. named CrowdStrike as one of America’s 500 fastest-growing companies.[16]
CrowdStrike released research in 2017 showing that 66 percent of the attacks to which the company responded that year were fileless or malware-free. The company also compiled data on the average time needed to detect an attack and the percentage of attacks detected by organizations themselves.[17] In 2017 and 2018, CrowdStrike was listed on LinkedIn’s Top Companies: Start Ups,[18][19] on the Forbes Cloud 100,[20][21] and as one of the CNBC Disruptor 50.[22][23]
In February 2018, CrowdStrike reported that in November and December 2017 it had observed a credential harvesting operation in the international sporting sector, with possible links to the cyber attack on the opening ceremonies of the Winter Olympics in Pyeongchang.[24] That same month, Crowdstrike released research showing that 39% of all attacks observed by the company were malware-free intrusions. The company also named which industries attackers most frequently targeted.[25]
In January 2019, CrowdStrike published research reporting that Ryuk ransomware, used by cyber actor Grim Spider to target businesses, had accumulated more than $3.7 million in cryptocurrency payments since it first appeared in August.[26] That March, the company released a version of its Falcon product for mobile devices and launched the CrowdStrike Store, which opens the Falcon platform to third-party applications.[27]
Also in 2019, CrowdStrike released its 2018 Global Threat Report, which ranked cybercriminals in order of fastest actors to operate within a network, with Russia coming in first.[28][29] The company also revealed that it tracked 81 named state-sponsored actors in 2018, and at least 28 were conducting active operations throughout the year. The research showed that of the sophisticated attacks that the company attributed to nation-states, China was responsible for the plurality: more than 25 percent.[30]
According to the company, its customers include three of the 10 largest global companies by revenue, five of the 10 largest financial institutions, three of the top 10 health care providers, and three of the top 10 energy companies.[31] 44 of the Fortune 100 and 37 of the 100 top global companies.[32]
===Funding===
In July 2015, Google invested in the company's Series C funding round, which in total raised $100 million. Series D in May 2017 brought in $100 million,[33] and Series E in June 2018 brought in $200 million.[34] In total, as of May 2019, the company has raised more than $480 million in funding.[35] In June 2018, the company said it was valued at more than $3 billion.[34] To date, CrowdStrike has achieved total funding of $256 million, with estimated annual revenue of $100 million and valuation more than $1 billion.[36] Investors include Telstra, March Capital Partners, Rackspace, Accel Partners and Warburg Pincus.[37][38]
clean text without markup for copying and pasting

CrowdStrike was co-founded by entrepreneur George Kurtz (CEO),[39][40] Dmitri Alperovitch (CTO),[41] and Gregg Marston (CFO, retired) in 2011.[42] In 2012, Shawn Henry, a former Federal Bureau of Investigation (FBI) executive who led both the FBI's criminal and cyber divisions, was hired to lead sister company CrowdStrike Services, Inc., which is focused on proactive and incident response services.[43] In June 2013 the company launched its first product, CrowdStrike Falcon.[44]

The company gained recognition for providing threat intelligence and attribution to nation state actors[45] conducting economic espionage and IP theft. In May 2014, supported by CrowdStrike's reports, the United States Department of Justice charged five Chinese military hackers for economic cyber espionage against United States corporations. Similarly, the firm is known for uncovering the activities of Energetic Bear, an adversary group with a nexus to the Russian Federation that conducts intelligence operations against a variety of global victims with a primary focus on the energy sector.

Following the very public Sony Pictures hack, CrowdStrike produced attribution to the government of North Korea within 48 hours and demonstrated how the attack was carried out step-by-step.[46] In 2014, CrowdStrike played a major role in identifying members of Putter Panda, the state-sponsored Chinese group also known as PLA Unit 61486, as the perpetrators of a number of cyberattacks on U.S. infrastructure and defense as well as on European satellite and aerospace industries.[8][47]

In 2014 and 2015, CRN Magazine named the company to its Top Emerging Vendors list.[48] In May 2015, the company released Researcher Jason Geffner's discovery of VENOM, a critical flaw in open source hypervisor called Quick Emulator (QEMU),[49] which is used in a number of common virtualization products. This vulnerability could allow attackers to access sensitive personal information.[50] In October 2015, CrowdStrike announced that it had identified Chinese hackers attacking technology and pharmaceutical companies immediately before and after President Barack Obama and Chinese President Xi Jinping publicly agreed not to use cyberspies as part of economic espionage against each other. The alleged hacking would have been in violation of that agreement.[51]

In 2016, the company was ranked #40 on the Deloitte Fast 500 North America list,[52] and Inc. named CrowdStrike as one of America’s 500 fastest-growing companies.[53]

CrowdStrike released research in 2017 showing that 66 percent of the attacks to which the company responded that year were fileless or malware-free. The company also compiled data on the average time needed to detect an attack and the percentage of attacks detected by organizations themselves.[54] In 2017 and 2018, CrowdStrike was listed on LinkedIn’s Top Companies: Start Ups,[55][56] on the Forbes Cloud 100,[57][58] and as one of the CNBC Disruptor 50.[59][60]

In February 2018, CrowdStrike reported that in November and December 2017 it had observed a credential harvesting operation in the international sporting sector, with possible links to the cyber attack on the opening ceremonies of the Winter Olympics in Pyeongchang.[61] That same month, Crowdstrike released research showing that 39% of all attacks observed by the company were malware-free intrusions. The company also named which industries attackers most frequently targeted.[62]

In January 2019, CrowdStrike published research reporting that Ryuk ransomware, used by cyber actor Grim Spider to target businesses, had accumulated more than $3.7 million in cryptocurrency payments since it first appeared in August.[63] That March, the company released a version of its Falcon product for mobile devices and launched the CrowdStrike Store, which opens the Falcon platform to third-party applications.[64]

Also in 2019, CrowdStrike released its 2018 Global Threat Report, which ranked cybercriminals in order of fastest actors to operate within a network, with Russia coming in first.[65][66] The company also revealed that it tracked 81 named state-sponsored actors in 2018, and at least 28 were conducting active operations throughout the year. The research showed that of the sophisticated attacks that the company attributed to nation-states, China was responsible for the plurality: more than 25 percent.[67]

According to the company, its customers include 44 of the Fortune 100 and 37 of the 100 top global companies.[68]

Funding

In July 2015, Google invested in the company's Series C funding round, which in total raised $100 million. Series D in May 2017 brought in $100 million,[69] and Series E in June 2018 brought in $200 million.[34] In total, as of May 2019, the company has raised more than $480 million in funding.[70] In June 2018, the company said it was valued at more than $3 billion.[34] Investors include Telstra, March Capital Partners, Rackspace, Accel Partners and Warburg Pincus.[71][72]

3. "Russian hacking investigations" may make more sense as a subsection of "History".

4. Deleting the "Industry recognition" section, since the major items were incorporated into "History".

5. Adding a new "Corporate affairs" section:

==Corporate affairs==
Fortune has given CrowdStrike three of its "Great Place to Work" awards,[73] and Inc. has praised the company's remote work program.[74]

6. Updating the products parameter of the infobox: Endpoint security, security and IT operations, and threat intelligence

References

References

  1. ^ George Kurtz, President/CEO & co-founder of CrowdStrike
  2. ^ "Standing up at the gates of hell: CrowdStrike CEO George Kurtz". Fortune. 29 July 2015.
  3. ^ Dmitri Alperovitch, Co-Founder and CTO of CrowdStrike
  4. ^ Albert-Deitch, Cameron (15 May 2019). "CrowdStrike, the $3.4 Billion Startup That Fought Russian Spies in 2016, Just Filed for an IPO". Inc. Retrieved 16 May 2019.
  5. ^ Messmer, Ellen. "Top FBI cyber cop joins startup CrowdStrike to fight enterprise intrusions". Network World.
  6. ^ Messmer, Ellen (18 June 2013). "Start-up tackles advanced persistent threats on Microsoft, Apple computers". Network World. Retrieved 16 May 2019.
  7. ^ "U.S. firm CrowdStrike claims success in deterring Chinese hackers". Reuters. 2015-04-13. Retrieved 2016-06-14.
  8. ^ a b c Perlroth, Nicole (2014-06-09). "2nd China Army Unit Implicated in Online Spying". The New York Times. ISSN 0362-4331. Retrieved 2016-06-14.
  9. ^ "What's in a typo? More evidence tying North Korea to the Sony hack". PCWorld. Retrieved 2016-06-14.
  10. ^ "Second China unit accused of cyber crime". Financial Times. 10 June 2014. Retrieved 10 June 2014.
  11. ^ "CRN Magazine 2014 and 2015 Top Emerging Vendors". 2015. Retrieved 2016-06-08.
  12. ^ "'Venom' vulnerability: Serious computer bug shatters cloud security". Fortune. 2015-05-13. Retrieved 2016-06-14.
  13. ^ Goodin, Dan (13 May 2015). "Extremely serious virtual machine bug threatens cloud providers everywhere". Ars Technica. Retrieved 17 May 2019.
  14. ^ Yadron, Danny (19 October 2015). "Report Warns of Chinese Hacking". The Wall Street Journal. Retrieved 17 May 2019.
  15. ^ "2016 Winners by rank" (PDF). Deloitte. Retrieved 31 October 2017.
  16. ^ "INC. 500". 2016. Retrieved 2016-08-24.
  17. ^ Gallagher, Sean (6 December 2017). ""Malware-free" attacks mount in big breaches, CrowdStrike finds". Ars Technica. Retrieved 29 May 2019.
  18. ^ Roth, Daniel (1 November 2017). "LinkedIn Top Companies – Startups: The 50 industry disruptors you need to know now". LinkedIn. Retrieved 29 May 2019.
  19. ^ Roth, Daniel (6 September 2018). "LinkedIn Top Startups 2018: The 50 most sought-after startups in the U.S. (26-50)". LinkedIn. Retrieved 29 May 2019.
  20. ^ Forbes Corporate Communications (11 July 2017). "Forbes Releases 2017 Cloud 100 List of the Best Private Cloud Companies in the World". Forbes. Retrieved 29 May 2019.
  21. ^ Forbes Corporate Communications (13 September 2018). "Forbes Releases 2018 Cloud 100 List of the Best Private Cloud Companies in the World". Forbes. Retrieved 29 May 2019.
  22. ^ "Meet the 2017 CNBC Disruptor 50 companies". CNBC. 16 May 2017. Retrieved 29 May 2019.
  23. ^ "Meet the 2018 CNBC Disruptor 50 companies". CNBC. 22 May 2018. Retrieved 29 May 2019.
  24. ^ Olenick, Doug (12 February 2018). "Russian actors mentioned as possibly launching cyberattack on 2018 Winter Olympic Games". SC Magazine. Retrieved 29 May 2019.
  25. ^ Ashford, Warwick (26 February 2018). "Cyber criminals catching up with nation state attacks". Computer Weekly. Retrieved 29 May 2019.
  26. ^ Wright, Rob (15 January 2019). "Ryuk ransomware poses growing threat to enterprises". TechTarget. Retrieved 31 May 2019.
  27. ^ "CrowdStrike announces endpoint detection for mobile devices". Channel Life. 6 March 2019. Retrieved 31 May 2019.
  28. ^ Dilanian, Ken (19 February 2019). "Russian hackers 8 times faster than Chinese, Iranians, North Koreans, says report". NBC News. Retrieved 3 June 2019.
  29. ^ Greenberg, Andy (19 February 2019). "Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes". Wired. Retrieved 3 June 2019.
  30. ^ Lemos, Robert (27 February 2019). "Persistent Attackers Rarely Use Bespoke Malware". Dark Reading. Retrieved 3 June 2019.
  31. ^ "Why Use CrowdStrike for Your Endpoint Protection". www.crowdstrike.com. Retrieved 2016-06-14.
  32. ^ "About CrowdStrike". CrowdStrike. Retrieved 30 May 2019.
  33. ^ Kuranda, Sarah (17 May 2017). "Crowdstrike Lands $100M Funding Round, Looks To Expand Globally And Invest In Partners". CRN. Retrieved 30 May 2019.
  34. ^ a b c d Sawers, Paul (19 June 2018). "Cybersecurity startup CrowdStrike raises $200 million at $3 billion valuation". Venture Beat. Retrieved 30 May 2019.
  35. ^ "CrowdStrike". Crunchbase. Retrieved 30 May 2019.
  36. ^ Hackett, Robert. (May 17, 2017). "Hack Investigator CrowdStrike Reaches $1 Billion Valuation". Fortune website Retrieved 9 June 2017.
  37. ^ Miller, Ron. "Security Company CrowdStrike Scores $100M Led By Google Capital". TechCrunch.
  38. ^ "CrowdStrike - Warburg Pincus".
  39. ^ George Kurtz, President/CEO & co-founder of CrowdStrike
  40. ^ "Standing up at the gates of hell: CrowdStrike CEO George Kurtz". Fortune. 29 July 2015.
  41. ^ Dmitri Alperovitch, Co-Founder and CTO of CrowdStrike
  42. ^ Albert-Deitch, Cameron (15 May 2019). "CrowdStrike, the $3.4 Billion Startup That Fought Russian Spies in 2016, Just Filed for an IPO". Inc. Retrieved 16 May 2019.
  43. ^ Messmer, Ellen. "Top FBI cyber cop joins startup CrowdStrike to fight enterprise intrusions". Network World.
  44. ^ Messmer, Ellen (18 June 2013). "Start-up tackles advanced persistent threats on Microsoft, Apple computers". Network World. Retrieved 16 May 2019.
  45. ^ "U.S. firm CrowdStrike claims success in deterring Chinese hackers". Reuters. 2015-04-13. Retrieved 2016-06-14.
  46. ^ "What's in a typo? More evidence tying North Korea to the Sony hack". PCWorld. Retrieved 2016-06-14.
  47. ^ "Second China unit accused of cyber crime". Financial Times. 10 June 2014. Retrieved 10 June 2014.
  48. ^ "CRN Magazine 2014 and 2015 Top Emerging Vendors". 2015. Retrieved 2016-06-08.
  49. ^ "'Venom' vulnerability: Serious computer bug shatters cloud security". Fortune. 2015-05-13. Retrieved 2016-06-14.
  50. ^ Goodin, Dan (13 May 2015). "Extremely serious virtual machine bug threatens cloud providers everywhere". Ars Technica. Retrieved 17 May 2019.
  51. ^ Yadron, Danny (19 October 2015). "Report Warns of Chinese Hacking". The Wall Street Journal. Retrieved 17 May 2019.
  52. ^ "2016 Winners by rank" (PDF). Deloitte. Retrieved 31 October 2017.
  53. ^ "INC. 500". 2016. Retrieved 2016-08-24.
  54. ^ Gallagher, Sean (6 December 2017). ""Malware-free" attacks mount in big breaches, CrowdStrike finds". Ars Technica. Retrieved 29 May 2019.
  55. ^ Roth, Daniel (1 November 2017). "LinkedIn Top Companies – Startups: The 50 industry disruptors you need to know now". LinkedIn. Retrieved 29 May 2019.
  56. ^ Roth, Daniel (6 September 2018). "LinkedIn Top Startups 2018: The 50 most sought-after startups in the U.S. (26-50)". LinkedIn. Retrieved 29 May 2019.
  57. ^ Forbes Corporate Communications (11 July 2017). "Forbes Releases 2017 Cloud 100 List of the Best Private Cloud Companies in the World". Forbes. Retrieved 29 May 2019.
  58. ^ Forbes Corporate Communications (13 September 2018). "Forbes Releases 2018 Cloud 100 List of the Best Private Cloud Companies in the World". Forbes. Retrieved 29 May 2019.
  59. ^ "Meet the 2017 CNBC Disruptor 50 companies". CNBC. 16 May 2017. Retrieved 29 May 2019.
  60. ^ "Meet the 2018 CNBC Disruptor 50 companies". CNBC. 22 May 2018. Retrieved 29 May 2019.
  61. ^ Olenick, Doug (12 February 2018). "Russian actors mentioned as possibly launching cyberattack on 2018 Winter Olympic Games". SC Magazine. Retrieved 29 May 2019.
  62. ^ Ashford, Warwick (26 February 2018). "Cyber criminals catching up with nation state attacks". Computer Weekly. Retrieved 29 May 2019.
  63. ^ Wright, Rob (15 January 2019). "Ryuk ransomware poses growing threat to enterprises". TechTarget. Retrieved 31 May 2019.
  64. ^ "CrowdStrike announces endpoint detection for mobile devices". Channel Life. 6 March 2019. Retrieved 31 May 2019.
  65. ^ Dilanian, Ken (19 February 2019). "Russian hackers 8 times faster than Chinese, Iranians, North Koreans, says report". NBC News. Retrieved 3 June 2019.
  66. ^ Greenberg, Andy (19 February 2019). "Russian Hackers Go From Foothold to Full-On Breach in 19 Minutes". Wired. Retrieved 3 June 2019.
  67. ^ Lemos, Robert (27 February 2019). "Persistent Attackers Rarely Use Bespoke Malware". Dark Reading. Retrieved 3 June 2019.
  68. ^ "About CrowdStrike". CrowdStrike. Retrieved 30 May 2019.
  69. ^ Kuranda, Sarah (17 May 2017). "Crowdstrike Lands $100M Funding Round, Looks To Expand Globally And Invest In Partners". CRN. Retrieved 30 May 2019.
  70. ^ "CrowdStrike". Crunchbase. Retrieved 30 May 2019.
  71. ^ Miller, Ron. "Security Company CrowdStrike Scores $100M Led By Google Capital". TechCrunch.
  72. ^ "CrowdStrike - Warburg Pincus".
  73. ^ "CrowdStrike, Inc". Great Place to Work. Fortune. Retrieved 30 May 2019.
  74. ^ Daum, Kevin (15 December 2017). "Unlike IBM, This Company Figured Out How to Make Working from Home Happy and Productive for Everyone". Inc. Retrieved 30 May 2019.

Happy to mock up what all the edits would look like in effect if it's helpful – I've received varying feedback on doing so in the past. Due to my COI, I won't be editing the article directly. Thank you for your help or feedback! Mary Gaulke (talk) 15:00, 3 June 2019 (UTC)[reply]

Hi @MaryGaulke: Thank you for thoroughly stating your request (although it is a lot to take in). First, in order to remove the advertisement tag, the article will need a thorough scrub of WP:PUFF, WP:PEACOCK, and WP:PROMO. Please review the information in those links, as it will help explain better than I what it is we see in the article that seems promotional. Then, please review your edit request with that guidance in mind. Once your updated revision request is ready, please add this code -> {{ping|Orville1974}} <- (paste as plain text) to your reply, and I'll get a notification that you're ready for me to look over the updated request. Thank you! Orville1974 (talk) 02:59, 20 June 2019 (UTC)[reply]
@Orville1974: Thanks for the reply! I know it's a lot; happy to receive any feedback about how to make it more digestible/easier to review and reformat accordingly. Also, to clarify, not all of this request is related to the {{ad}} tag, but since it's the item you mentioned, I'll dig in a little more:
I've reviewed WP:PUFF, WP:PEACOCK, and WP:PROMO in detail and taken an intensive look at the article, and I can't find any examples of any specific issues identified in those policies:
  • Positive or exaggerated adjectives that aren't tied to any kind of source. Closest I can see is:
    • "high-profile" to describe the attacks mentioned in the lead, which is objectively true – each of those attacks has its own detailed Wikipedia article backed up by extensive media coverage
    • "was instrumental" in "History" – our request specifically removes this wording
  • Absence of criticism or industry context
    • "Russian hacking investigations" goes into detail regarding criticisms, including citations from industry pubications
  • Claims of objective superiority
  • Excessive or comprehensive detail
    • In fact we're requesting this be addressed by revising the "Awards and recognition" listing and integrating only the most major items into the "History" narrative
    • No comprehensive listing of products or company announcements
  • No use of non-reliable sources except for very basic information
  • None of the "words to watch" listed at WP:PEACOCK are used, and per above, I believe the article also follows the spirit of this rule
  • And as someone who has been working on Wikipedia for five years, I have a lot of familiarity with WP:PROMO especially and do not see anything in this article that qualifies as advocacy or advertising
I hope that's helpful. Thank you again for your time! Mary Gaulke (talk) 19:33, 24 June 2019 (UTC)[reply]

NSS Controversy?

I'm not sure why this article doesn't at all bring up the legal action between CrowdStrike and NSS labs. It seems like pertinent information and I would edit it in myself but this article is so closely monitored by CrowdStrike that any edits I make would likely be immediately reverted as as conspiracy theories or baseless propaganda. I'd like to make a request for a section about the NSS Labs controversy and the conclusions of that, or lack-of. — Preceding unsigned comment added by 207.228.78.118 (talk) 22:18, 11 June 2019 (UTC)[reply]

I want to be 100% clear, as a representative of CrowdStrike: I never directly edit this article, and since the company has engaged me, to my knowledge no one at CrowdStrike has directly edited the article either. If I saw any direct COI interference occurring, I would take steps to revert it myself and address it with my client. Best wishes! Mary Gaulke (talk) 02:20, 12 June 2019 (UTC)[reply]

CrowdStrike and U.S. Impeachment Hearings

I have not followed this story or CrowdStrike in detail, but have noted how frequently Mr. Trump is mentioning CrowdStrike recently. Trump made the claim on Fox and Friends via telephone today, that "...the owner of CrowdStrike is Ukranian." One assumes he refers to one of multiple owners, who is a U.S. citizen born in Moscow and raised in the U.S.

I don't know if someone has the bandwidth and expertise to address some of this without politicizing it, but it could be helpful, if facts are better known by anyone. Conspiracy theories seem to appear here on the Talk page, so this is concerning, plays into messy narratives that make the truth hard to decipher.

I support the World Wide Web Foundation's international movement to apply principles of integrity to Internet use. https://contractfortheweb.org/

2021 COI edit requests

Hi, COI editor for CrowdStrike here again, with a few new requests.

In the infobox:

  • Adding Gregg Marston as a company founder, per the article body.  Done
  • Under "Products", replace "Threat intelligence" with "Security cloud". Here are a few sources on that term: SDX Central, CRN, Security Brief. Done
  • Updating revenue: Increase $481.4 million (2020)[1] Done
  • Updating the number of employees to a 2020 figure: 3,163[2]  Done

In second sentence of lead, update endpoint security to cloud workload[3] and endpoint security.

In "History:

  • Updating "sister company" to "subsidiary" as a descriptor for CrowdStrike Services.[4]  Done
  • Updating which provided threat intelligence and attribution to which provided endpoint protection, threat intelligence and attribution per the source. In that same sentence, I think it may make sense to delete "to nation state actors" and "that are conducting economic espionage and IP theft" so the {{Better source}} flag can be removed.  Done
  • At end of first paragraph, adding: Since then, the company has launched multiple additional modules for the platform.[5]  Not done I feel this is common practice in most businesses, particularly in tech, and it’s understood. This takes the article which already has quite a bit of advertising language a step too close to being marked for improvement.
  • Add to "Accolades": An IDC report in July 2020 named CrowdStrike as the fastest-growing endpoint security software vendor.[6]  Not done This is clearly advertising for the company, and likely to do more harm to the quality of the article than good. I would suggest to skip it.

Thank you for your help or feedback! Mary Gaulke (talk) 20:51, 26 March 2021 (UTC)[reply]

References

  1. ^ "Form 10-K". CrowdStrike. 31 January 2020. Retrieved 13 December 2020.
  2. ^ "Form 10-Q". CrowdStrike. 31 October 2020. Retrieved 13 December 2020.
  3. ^ Duggan, Wayne (17 March 2021). "Why CrowdStrike Is A Top Growth Stock Pick". Benzinga. Yahoo! Finance. Retrieved 21 March 2021.
  4. ^ Ragan, Steve (23 April 2012). "Former FBI Exec to Head CrowdStrike Services". SecurityWeek. Retrieved 13 December 2020.
  5. ^ Kerner, Sean Michael (14 February 2017). "CrowdStrike Revamps Falcon Security Platform to Replace Legacy AV". eWeek. Retrieved 5 March 2021.
  6. ^ Knowles, Catherine (6 July 2020). "CrowdStrike recognised as leading endpoint security vendor on global scale". SecurityBrief EU. Retrieved 5 March 2021.
Most of requests fulfilled. If you don’t agree with my edit, please feel free to ask for a new edit. Ferkjl (talk) 17:59, 4 April 2021 (UTC)[reply]
@Ferkjl: Thank you! One question – did you deliberately omit this item from my original request?
In second sentence of lead, update endpoint security to cloud workload[1] and endpoint security.
Thanks again! Mary Gaulke (talk) 15:44, 6 April 2021 (UTC)[reply]
@MaryGaulke: No, my bad, I completely missed it. Had to read a bit about the definition, the citation, and the Crowdstrike portfolio to verify it, but I just added it. Sorry for the delay. Ferkjl (talk) 16:39, 6 April 2021 (UTC)[reply]

Change of Headquarters to Austin, TX

Hi, in December 2021 CrowdStrike moved its headquarters to Austin, Texas: https://www.crowdstrike.com/blog/crowdstrike-changes-principal-executive-office-to-austin-texas/

Can an editor:

  • Change the headquarters location to Austin, Texas in the first sentence of this article
  • Change the headquarters location to Austin, Texas in the infobox
  • Delete the categories at the bottom of the article "companies based in Sunnyvale, California" and "Technology Companies based in the San Francisco Bay Area" and add Category:Companies based in Austin, Texas

I am asking because I have a financial conflict of interest so even though this is a small and uncontroversial edit request, I prefer to refrain from editing directly. Thanks, -JeffreyArthurVA (talk) 21:33, 26 January 2022 (UTC)[reply]

  1. ^ Duggan, Wayne (17 March 2021). "Why CrowdStrike Is A Top Growth Stock Pick". Benzinga. Yahoo! Finance. Retrieved 21 March 2021.