Tinker,
After re-reading this thread I’m not sure you question about branching into the said TAM is happening.
The answer for me…is yes per their last CC CRWD is selling all of its cloud modules on its platform (different TAMs) to more and more of their customers (47% of customers have 4 or more cloud modules of the 7 that exist now, this taken from the CC 4th Quarter 2019. And per Bert’s write up ‘CRWD is like Zs in that it’s invented its own category’ - that, it’s platform, sounds disruptive and is what is allowing them to address these TAMs unlike anyone else.
Jason
2 Likes
Fireeye? News to me if they provide endpoint (not saying they don’t, I haven’t looked at them in maybe 2 years. I just don’t know). Last I looked, they had some pretty neat data center security products that not only looked for malware signatures but also used AI (or whatever) to seek anomalous, suspect behavior. The Target breach was actually detected by FireEye, but the CIO had left the company and the CEO didn’t think finding a replacement was a priority. The IT guys watched the flags go up, but didn’t have anyone to get guidance from before it was too late.
In case you didn’t know a detected security breach is not always acted upon immediately. They often watch it and get law enforcement involved before they do anything. They often want to know who’s involved and where it’s coming from before shutting it down.
1 Like
Yes, I think you’ve pretty well defined the standard procedure as well as one of the primary reasons Crowdstrike is way out ahead of the pack. The lag time between detection, informing and updating is a window big enough for a Mack truck. An enormous amount of damage can be done in that period of time. Think ransomware, thousands of devices can be infected during that lag time. With Croudstrike even the original target might be cleansed before the machine is shut down, but even if not, that’s as far as the infection spreads.
3 Likes
that story of the Target breach is an indication that many companies do not take security breaches very seriously. If only customers are involved there is no direct penalty to the corporation. Maybe eventual litigation but the pay out here may take years. Even telling customers about the breach promptly is not common.People are getting desensitized to their information being spread out to crooks. Security does not add to revenue so is put into second tier when it comes to CEO attention. I think we need EU style legislation with progressively steeper fines for leaks because the consumer (ie voter) is not being protected.
Target deserves a bigger punishment than they likely will get.
2 Likes