The rise in mobile work is dissolving the traditional security perimeter, and the best way to secure this “new normal” is by adopting a zero trust model. Zero trust is often also called perimeter-less security, as no user or device is granted inherent trust. Every device connecting to the network needs to be authenticated and must have the authorization to gain the required access. Together, CrowdStrike and Zscaler are simplifying the adoption of zero trust.
The adoption of zero trust security
Image: Zscaler
The previous integration of Zscaler Private Access (ZPA) and CrowdStrike proved to be immensely valuable to our customers, with capabilities like continuous zero trust checks, conditional access control for endpoints, and granting privileged access to private applications in the data center, or public cloud, based on user identity and endpoint security posture. This provided comprehensive security, from device to application, by only allowing authorized user access and offering device isolation if an appliance was infected with malware. This capability is now extended to internet application access.
Achieving zero trust with the Zscaler and CrowdStrike integration
Zscaler Internet Access (ZIA) helps secure your internet and SaaS connections by delivering a complete secure stack as a service from the cloud. CrowdStrike Falcon ZTA (Zero Trust Assessment) supports Falcon Zero Trust by providing continuous, real-time security and compliance checks for endpoints. When these two forces come together, they offer a powerful end-to-end security solution.
This integration provides the ability to assess the device posture and health status passed down from CrowdStrike before granting access to internet applications. The integrated solution helps joint customers with adaptive, risk-based access control, with enhanced defense by allowing only well-protected devices to connect to these SaaS apps
ZIA + CrowdStrike gives organizations the ability to create access controls and policies based on the presence of a CrowdStrike agent in the endpoint and also based on the ZTA health score computed for each device. The health score gives an amplified understanding about the device posture and allows ZIA to leverage this information to allow or block the device from accessing internet applications. The ZTA score is evaluated each time a connection request is made, making the conditional access adaptive to the evolving condition of the device overtime.
Organizations can create custom device trust groups based on CrowdStrike posture to provide conditional access like shown below.
How does this feature help customers?
Joint customers of Zscaler and CrowdStrike will be able to:
- Assess continuous, real-time security and compliance checks of the endpoints.
- Ensure only secure devices can access internet applications.
- Set policies for SaaS applications based on posture and status from the CrowdStrike API.
The ZIA and CrowdStrike integration solution allows users to enable safe and seamless access to internet applications from any location, on any device.