Skip to main content

Help us improve the Digital Marketplace - send your feedback

Bytes Software Services

Crowdstrike Application Security Posture Management

CrowdStrikes Application Security Posture Management (ASPM) Delivered by Bionic Get a code-accurate map and a real-time inventory into every microservice, database, API, and dependency running in production. No more outdated CMDB or documentation. bssgc

Features

  • Agentless deployment
  • "Complete visibility"
  • Business risk scoring
  • DevSecOps workflows
  • Measure and improve your security posture
  • See and secure sensitive data flows
  • Consolidate threats across your security tools

Benefits

  • real-time inventory into every microservice, database, API, and dependency
  • application, business, and cloud context
  • discover, see, secure every PII, PCI, and PHI data flow
  • integrates with your existing security tools like Wiz and Sonatype
  • Automate incident management workflows across security

Pricing

£1,115 a unit a year

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.

Framework

G-Cloud 14

Service ID

6 1 5 2 3 9 7 2 8 4 6 3 6 9 6

Contact

Bytes Software Services Chris Swani
Telephone: +44 (0) 7951 326815
Email: tenders@bytes.co.uk

Service scope

Software add-on or extension
No
Cloud deployment model
Public cloud
Service constraints
N/a
System requirements
None

User support

Email or online ticketing support
Email or online ticketing
Support response times
Each support issue is prioritized when a support ticket is opened via email, support portal or by phone for CrowdStrike Support's After-Hours and Emergency line for P1/P2 emergency issues. The TSE (Technical Support Engineer) will either work directly with you until the issue is resolved or escalate it to the related engineering team. CrowdStrike Standard support is 8 working hours SLA, Premium support is 4 working hours. P1 cases are 1 hour 24x7.
User can manage status and priority of support tickets
Yes
Online ticketing support accessibility
WCAG 2.1 AA or EN 301 549
Phone support
Yes
Phone support availability
24 hours, 7 days a week
Web chat support
Web chat
Web chat support availability
24 hours, 7 days a week
Web chat support accessibility standard
WCAG 2.1 AA or EN 301 549
Web chat accessibility testing
CrowdStrike offers various levels of support; from email communications, access to the support portal and standard troubleshooting or technical assistance; and a Technical Account Manager (TAM).
Onsite support
Onsite support
Support levels
"Crowdstrike provides multiple levels of support, managed services (MDR), and professional services. Our support offerings include Standard, Express, Essential, and Elite Support. Please reference this link for a detailed comparison of each support offering: https://www.crowdstrike.com/resources/data-sheets/crowdstrike-falcon-support-offerings/
Standard Support is included with all Falcon Subscriptions at no charge. This is includes our support portal with knowledge base articles and 24/6/365 Priority One Phone Support Only.
Express Support is designed for customers with no more than 2500 endpoints. It includes 24/7/365 phone support & live chat, pooled technical account manager, case prioritization, quarterly health checks & reports, and an onboarding webinar. It is 12% of your total licence cost and does not exceed $10K annually.
Essential Support, which includes everything with Express Support plus a product specialist, 30 days of guided onboarding, proactive case management, and operational reviews. Essential support is 12% of your total license cost, with a minimum cost of $10k annually.
Elite Support is designed for our largest and most complex customers and includes a product & industry specialist assigned to your account. Elite support is 25% of your total license cost. "
Support available to third parties
Yes

Onboarding and offboarding

Getting started
Training is available through the CrowdStrike University online training portal. There is robust product documentation as well as access to our support portal with a comprehensive knowledge base that includes best practices and recommendation videos. Advanced level training classes require two training credits and a valid annual access pass.
Service documentation
Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction
Customer confidential data collected by Falcon is retained in active storage for up to 90 days, and is deleted based on a rolling retention schedule. Each customer chooses their own retention period within the 90 day window. Destruction of a Customer’s Confidential Information across all CrowdStrike systems occurs upon Customer’s written request, unless otherwise expressly agreed to between the Customer and CrowdStrike.
End-of-contract process
Customer confidential data collected by Falcon is retained in active storage for up to 90 days, and is deleted based on a rolling retention schedule. Each customer chooses their own retention period within the 90 day window. Destruction of a Customer Confidential Information (CCI) across all CrowdStrike systems occurs upon customer’s written request, unless otherwise expressly agreed to between the customer and CrowdStrike.

Using the service

Web browser interface
Yes
Supported browsers
  • Internet Explorer 11
  • Microsoft Edge
  • Chrome
Application to install
Yes
Compatible operating systems
  • Android
  • IOS
  • Linux or Unix
  • MacOS
  • Windows
Designed for use on mobile devices
Yes
Differences between the mobile and desktop service
Falcon for Mobile lets you see events from your environment’s mobile devices, including iOS and Android cell phones and tablets. On iOS devices, Falcon for Mobile has access to data that could indicate a device is compromised, such as jailbreaking. It also gathers basic activity, like copy/paste events. On Android devices, it shares basic statistics, including battery usage and copy/paste events. The baseline mobile data shared with Falcon doesn’t contain private or personal information, such as text messages, emails, or browsing history.
Service interface
No
User support accessibility
WCAG 2.1 AA or EN 301 549
API
Yes
What users can and can't do using the API
CrowdStrike is an API-first company and Falcon Connect provides bi-directional APIs, resources and tools needed by customers and partners to develop, integrate and extend the use of the Falcon Platform itself, and to provide interoperability with other security platforms and tools. The CrowdStrike Orchestration and Automation initiative builds on CrowdStrike’s Elevate Partner Program for technology partners, making it easy for you to seamlessly integrate Orchestration Platforms like ServiceNow, Swimlane, Phantom, Demisto or use the APIs instead of the console. The CrowdStrike API is a set of REST-based API endpoints that allow you to perform actions programmatically instead of using Falcon console.
API documentation
Yes
API documentation formats
  • HTML
  • PDF
API sandbox or test environment
Yes
Customisation available
Yes
Description of customisation
We have the largest cloud platform on the market that offers the largest consolidation of tools, agents, and dashboards into one unified single global solution; CrowdStrike offers multiple modules, all delivered through one agent, offering unique customization.

Scaling

Independence of resources
CrowdStrike has a dedicated Customer Engagement Team made up of consultants ready to address customer satisfaction, provide support when demand increases and ensure high quality of services. We also conduct customer satisfaction surveys for all engagements and constantly monitor the feedback from our clients to ensure high customer satisfaction and improve the quality of our services.

Analytics

Service usage metrics
Yes
Metrics types
"CrowdStrike has a variety of built-in dashboards within the console to provide detailed reporting statistics and important metrics, including but not limited to sensor health; sensor statistics (online, platform, sensors requiring attention), Detections by Scenario, Detections by Severity, Top 10 Hosts (detections), Top 10 Users (detections), Top 10 Files (malicious and suspicious) and a global map of all active sensors.

In addition, a query based in Splunk format can also run on the Event Search page to query 400+ telemetry data including network connection information and OS information.
Reporting types
  • Real-time dashboards
  • Regular reports
  • Reports on request

Resellers

Supplier type
Reseller providing extra support
Organisation whose services are being resold
Crowdstrike

Staff security

Staff security clearance
Conforms to BS7858:2019
Government security clearance
None

Asset protection

Knowledge of data storage and processing locations
Yes
Data storage and processing locations
European Economic Area (EEA)
User control over data storage and processing locations
No
Datacentre security standards
Managed by a third party
Penetration testing frequency
At least once a year
Penetration testing approach
‘IT Health Check’ performed by a Tigerscheme qualified provider or a CREST-approved service provider
Protecting data at rest
  • Physical access control, complying with another standard
  • Encryption of all physical media
Data sanitisation process
Yes
Data sanitisation type
  • Explicit overwriting of storage before reallocation
  • Deleted data can’t be directly accessed
Equipment disposal approach
Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Data importing and exporting

Data export approach
The raw data can be exported as well via Falcon Data Replicator to store the data on-premise as long as the customer needs it.
Data export formats
CSV
Data import formats
CSV

Data-in-transit protection

Data protection between buyer and supplier networks
TLS (version 1.2 or above)
Data protection within supplier network
TLS (version 1.2 or above)

Availability and resilience

Guaranteed availability
CrowdStrike's business continuity program is based on establishing and maintaining high availability and automated recovery for customer facing services. The program is managed by CrowdStrike's Business Resilience group and implemented in coordination with all major lines of business, with oversight from senior management.
Approach to resilience
CrowdStrike application products and supporting infrastructure are maintained across multiple active and redundant data centers.
Outage reporting
Tech Alerts are communicated to CrowdStrike's customers through the company's online support service. Customers can also sign up for email notifications.

Identity and authentication

User authentication needed
Yes
User authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)
Access restrictions in management interfaces and support channels
CrowdStrike's corporate VPN enforces equipment identification and multi-factor authentication for granting access to the company's internal network. Access to restricted systems within the network requires additional privilges to be approved and assigned to an individual.
Access restriction testing frequency
At least once a year
Management access authentication
  • 2-factor authentication
  • Identity federation with existing provider (for example Google Apps)

Audit information for users

Access to user activity audit information
Users have access to real-time audit information
How long user audit data is stored for
User-defined
Access to supplier activity audit information
Users contact the support team to get audit information
How long supplier audit data is stored for
At least 12 months
How long system logs are stored for
At least 12 months

Standards and certifications

ISO/IEC 27001 certification
Yes
Who accredited the ISO/IEC 27001
Schellman Compliance, LLC
ISO/IEC 27001 accreditation date
11/08/2023
What the ISO/IEC 27001 doesn’t cover
N/a
ISO 28000:2007 certification
No
CSA STAR certification
Yes
CSA STAR accreditation date
19/10/2023
CSA STAR certification level
Level 2: CSA STAR Attestation
What the CSA STAR doesn’t cover
N/a
PCI certification
No
Cyber essentials
Yes
Cyber essentials plus
Yes
Other security certifications
No

Security governance

Named board-level person responsible for service security
Yes
Security governance certified
Yes
Security governance standards
ISO/IEC 27001
Information security policies and processes
CrowdStrike's information security program is based on the ISO/IEC 27001 framework, and is regularly reviewed by senior management as part of the company's Enterprise Risk Management process. The program consists of various layers of technical and administrative controls to ensure the confidentiality and integrity of customer data.

Operational security

Configuration and change management standard
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Configuration and change management approach
CrowdStrike's internal operations follow a documented change management procedure. Access control, infrastructure and application changes are documented and tracked through internal ticketing systems that capture review and authorization for the change.
Vulnerability management type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Vulnerability management approach
Vulnerability remediation is a multi-stage process where findings from scans are assessed, triaged, and assigned for remediation through internal ticketing systems. Remediation timeframes are dependent on the severity of the issue.
Protective monitoring type
Conforms to a recognised standard, for example CSA CCM v3.0 or SSAE-16 / ISAE 3402
Protective monitoring approach
Monitoring and alerting are configured by CrowdStrike Security teams to identify and notify operational and management personnel of incidents when early warning thresholds are crossed on key operational metrics.
Incident management type
Conforms to a recognised standard, for example, CSA CCM v3.0 or ISO/IEC 27035:2011 or SSAE-16 / ISAE 3402
Incident management approach
CrowdStrike has developed a formal incident response plan which is documented to provide a well-defined, organized approach for handling any potential threat to CrowdStrike systems and data.

Secure development

Approach to secure software development best practice
Conforms to a recognised standard, but self-assessed

Public sector networks

Connection to public sector networks
No

Social Value

Social Value

Social Value

Fighting climate change

Fighting climate change

We take our environmental management and the impact we have on the environment very seriously. We have environmental policies in place and hold the ISO14001 accreditation. Our environmental assessments are conducted annually by an external Lead ESOS Assessor; they are signed-off by the board and compliance reported to the regulator (the Environment Agency). Our environmental policy is published on our website at https://www.bytes.co.uk/company/sustainability/environmental.
Bytes achieved carbon net zero in March 2022 through approved carbon offsetting schemes. We are always seeking to reduce our impact on the environment. We aim to minimise waste, reduce pollutants and use renewable materials. Our offices have recycling facilities for cans, plastic and paper. We aim to reduce our office printing to zero within the next few years.
An Environmental Steering Committee has been established to coordinate environmental activities and drive change.
To drastically reduce our emissions, we have switched to renewable energy. Our Head Office has reached our first milestone of using a specialist 100% renewable electricity provider. We are also exploring options to install solar panels on our Headquarters building.
Other environmental initiatives include installing electric vehicle charging points and encouraging staff to commute to work without the car (setting up a car share network and installing secure cycle parking).
We produce a SECR (Streamlined Energy and Carbon Reporting) report that details the companies energy consumption and carbon emissions. This report is produced annually by an independent assessor.
This report provides details of our emissions in Scope 1, 2 and 3 categories. It details the activities previously taken to reduce emissions and also recommendations for further improvements.
For scope 1,2 and 3 emissions we aim to reduce these by 50% by 2025-2026 from our 2021 baseline.
We aim to be Net Zero by 2040, covering our own operational emissions.

Pricing

Price
£1,115 a unit a year
Discount for educational organisations
Yes
Free trial available
Yes
Description of free trial
"Included in the Falcon Free trial is full installation of the Falcon sensor, which provides official protection for your systems, once installed theres no need to reinstall as long as your account is active.
Link to free trial
https://www.crowdstrike.com/products/trials/try-falcon-prevent/?ft-trial

Service documents

Request an accessible format
If you use assistive technology (such as a screen reader) and need versions of these documents in a more accessible format, email the supplier at tenders@bytes.co.uk. Tell them what format you need. It will help if you say what assistive technology you use.