Delta Risk and CrowdStrike help clients strengthen their cyber security posture to detect and prevent attacks

Delta Risk, a leading provider of SOC-as-a-Service and security services, announced that it has joined the CrowdStrike Elevate Partner Program. Delta Risk will offer CrowdStrike’s industry-leading next-generation endpoint protection platform, threat intelligence, and response services to help customers stop breaches.

Delta Risk will support customers using the CrowdStrike Falcon Platform to help businesses strengthen their cyber security posture to detect and prevent attacks.

CrowdStrike Falcon is a transformative solution powered by Artificial Intelligence (AI) that unifies next-generation antivirus (NGAV), IT hygiene, endpoint detection and response (EDR), cyber threat intelligence and proactive threat hunting.

“Our cloud-native ActiveEye platform, which powers our managed security services, combined with CrowdStrike’s robust endpoint security, enables customers to quickly see what’s happening on endpoint devices across their network,” said Joseph Acosta, Director of Security Operation Center, Delta Risk.

“This reduces the risk of false positives so security staff can focus on the most critical alerts and respond to threats faster.”

“We chose to have Delta Risk manage our endpoint security because of our past experience using their security operations center (SOC) as-a-Service solutions,” said Curtis Glenn, Director of Information Security, Sonic Automotive.

“Delta Risk’s expertise allows us to maximize our investment in CrowdStrike and maintain global, 24×7 coverage for our entire IT infrastructure.”

“Attacks are unavoidable, so organizations must respond quickly to cyber threats to match the speed of sophisticated criminal and nation-state adversaries,” said Matthew Polly, vice president of Channel and Alliances, CrowdStrike.

“By joining the CrowdStrike Elevate Partner Program, Delta Risk can offer customers comprehensive endpoint visibility, faster time to deployment, and better overall protection.”

In a recent report, CrowdStrike recommended that organizations follow the 1:10:60 rule: one minute to detect threats, 10 minutes to investigate, and 60 minutes to contain and remediate an incident.

Most organizations aren’t sufficiently prepared to address breakout time, defined as the window between when an intruder compromises the first machine and when they can move laterally to other systems on the network, according to CrowdStrike’s 2019 Global Security Attitude Survey.

On average, the process of detecting, triaging, investigating, and containing a cyber incident takes organizations globally 162 hours, with an average of 31 hours to contain a cybersecurity incident once it has been detected and investigated.

The survey results indicated that only 11 percent of respondents could detect an intruder in under one minute, only nine percent could investigate an incident in 10 minutes, only 33 percent could contain an incident in 60 minutes, and only five percent could do all three.

The CrowdStrike Elevate Partner Program provides technology partners, solution providers, system integrators and managed service providers (MSSPs) with the capability to deliver bespoke solutions to customers.

Along with the CrowdStrike Orchestration and Automation initiative and the introduction of new and updated APIs via CrowdStrike Falcon Connect, partners can seamlessly integrate their solutions with the CrowdStrike Falcon Platform, allowing them to operate their security efforts in a more efficient and effective manner responding to security threats faster and with greater accuracy.

Share this post

Share on facebook
Share on linkedin
Share on print
Share on email

Subscribe to our Monthly Cyber Security Digest

Get monthly content to keep you up to date on the latest news and tips