aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Engineering
  • Practices
  • Technology

Intel, CrowdStrike And Zscaler Unveil Compatible Solutions For Zero Trust Security

  • aster.cloud
  • May 2, 2023
  • 4 minute read

Zero trust is maturing as a mainstream security best practice to minimize uncertainty by enforcing accurate, least-privileged access to information. This has become particularly relevant over the past few years, with a growing number of remote workers accessing cloud apps outside the traditional network.

No single vendor solution exists today to attain conditional access from edge to cloud. Intel with CrowdStrike and Zscaler demonstrate how multiple vendors working together can help solve information technology (IT) challenges to implement a comprehensive zero trust strategy.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

Cybersecurity standards organizations, such as the National Institute of Standards and Technology (NIST), have published guidance on zero trust architecture and implementation guides to support adoption. According to a recent Forrester’s Business and Technology Services Survey, 2022 1, over two-thirds of European security decision-makers are developing zero trust strategies.

The challenge for IT providers is the expansive scope of zero trust and access to resources determined by a dynamic policy. This includes the observable state of device identity, device health, application and service trust, as well as hardware-defined inputs. This is where the role of hardware-assisted security can enhance and accelerate the value of zero trust.

The added value of hardware and software working together in a zero trust approach is recognized by IT professionals. Key findings from a recent Ponemon Institute study2 indicate that organizations are looking to integrate hardware-based security solutions into their zero trust strategies. Of the 36% of organizations using hardware-assisted security solutions, 32% of respondents have implemented a zero trust infrastructure strategy, and 75% of respondents expressed increased interest in zero trust models as the remote workforce grows. 

Read More  Esports Programs Help Students Transition To College And Gaming -Related Careers

Solutions Available Today

CrowdStrike and Zscaler have integrated hardware security into their solutions so customers receive hardware-assisted benefits right “out of the box.”

“The integration of our Intel® vPro threat detection optimizations for CrowdStrike, with the Intel® Xeon-based optimizations powering Zscaler’s Zero Trust Exchange, will help corporations get more out of their existing security investments and improve their security outcomes, said Rick Echevarria, vice president, sales and marketing group, general manager security at Intel. “Our work with CrowdStrike and Zscaler is a great example of the power of collaboration in addressing the biggest challenges our customers are facing in a continuously evolving threat landscape.”

Intel delivers hardware optimizations with the CrowdStrike Falcon® platform and the Zscaler Zero Trust Exchange™. Joint customers benefit from the acceleration of cross platform threat protection insights and remediation, in addition to endpoint risk scoring and adaptive network policies for conditional access to cloud apps:

Hardware-assisted zero trust model diagram. (Credit: Intel Corporation)

  1. Device Health Scoring: CrowdStrike utilizes Hardware Enhanced Exploit Detection (HEED) and Intel® Threat Detection Technology (Intel® TDT) for accelerated memory scanning, only available on Intel® Core™ and Intel® vPro® PCs, to uncover early indicators of file-less attacks. According to the CrowdStrike 2023 Global Threat Report, fileless attacks make up 71%3 of all attack entry methods. Additionally, CrowdStrike realizes up to a 7 times4 boost in memory scanning performance from Intel hardware.
  2. Cross-Platform Zero Trust Insights: The CrowdStrike Falcon platform generated risk score via its Zero Trust Assessment (ZTA) with Intel’s hardware metadata relayed to Zscaler through the Zero Trust Exchange APIs and Zscaler Client Connector for conditional network policy enforcement.
  3. Secure Access Service Edge (SASE) Connectivity Acceleration: To address the scale of remote user access to a cloud resource via a SASE point of presence, Intel and Zscaler optimized SASE components with Intel® Xeon® Scalable processors and accelerators such as Intel® QuickAssist Technology. Data plane acceleration including packet processing and cryptography acceleration, AI acceleration for network and security sanitization, delivers a transparent experience for users connected via Zscaler.  
  4. Hardware Assisted Remediation: Network Indicator of Compromise (IOC) data and CrowdStrike’s fileless attack detection with Indicator of Attack (IOA) data can be combined with Intel’s hardware-detected threat metadata to isolate impacted PCs and perform response actions.
Read More  All-New MacBook Air With M2 Available To Order Starting Friday, July 8

“CrowdStrike is pioneering AI-powered advanced threat detection and response capabilities that leverage Intel’s hardware technologies. Our partnership with Intel and Zscaler is critical for protecting our joint customers against modern attacks through a combination of hardware, cloud platform and human expertise,” said Michael Rogers, vice president of alliances at CrowdStrike.

Evolution and Industry Alignment

To help address knowledge gaps, Intel published its zero trust reference architecture in October 2022. In parallel, Intel has worked closely to hardware-optimize leading SASE, EDR, and Identity software partners that are commonly deployed together by customers to realize the benefits of zero trust. After successful customer deployments, Intel will work with CrowdStrike, Zscaler and other partners to publish updated and new reference architectures including emerging usage models.

The new reference architectures will help customers understand the enhanced use cases, configuration steps and specific Intel® vPro® and Intel® Xeon® Scalable processors capabilities and related accelerators.

1 Forrester’s Business And Technology Services Survey, 2022 and Zero Trust Comes Into

The Mainstream In Europe, by Tope Olufon with Paul McKay, Zaklina Ber, Jen Barton, March 1, 2023

2 Security Innovation: Secure Systems Start with Foundational Hardware, Ponemon Institute, 2022, sponsored study by Intel

3 See www.intel.com/performance-vpro, CrowdStrike 2023 Global Threat Report

CrowdStrike Executive Testimonial Video

4 Based on offload memory scanning to the integrated GPU via Intel TDT API, which results in a 3-7x acceleration over CPU scanning methods

Performance varies by use, configuration and other factors. Learn more on the Performance Index site. 

Performance results are based on testing as of dates shown in configurations and may not reflect all publicly available updates.  See backup for configuration details.  No product or component can be absolutely secure. 

Read More  The Open 3D Foundation Welcomes Microsoft As A Premier Member To Advance The Future Of Open Source 3D Development

Your costs and results may vary. 

Intel technologies may require enabled hardware, software or service activation.

Intel does not control or audit third-party data. You should consult other sources to evaluate accuracy.

Originally published at Intel


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

aster.cloud

Related Topics
  • Best Practice
  • Client Computing
  • CrowdStrike
  • Intel
  • Zero Trust Security
  • Zscaler
You May Also Like
View Post
  • Engineering

Just make it scale: An Aurora DSQL story

  • May 29, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Reliance on US tech providers is making IT leaders skittish

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Examine the 4 types of edge computing, with examples

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

AI and private cloud: 2 lessons from Dell Tech World 2025

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

TD Synnex named as UK distributor for Cohesity

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Weigh these 6 enterprise advantages of storage as a service

  • May 28, 2025
View Post
  • Computing
  • Multi-Cloud
  • Technology

Pulsant targets partner diversity with new IaaS solution

  • May 23, 2025

Stay Connected!
LATEST
  • 1
    Just make it scale: An Aurora DSQL story
    • May 29, 2025
  • 2
    Reliance on US tech providers is making IT leaders skittish
    • May 28, 2025
  • Examine the 4 types of edge computing, with examples
    • May 28, 2025
  • AI and private cloud: 2 lessons from Dell Tech World 2025
    • May 28, 2025
  • 5
    TD Synnex named as UK distributor for Cohesity
    • May 28, 2025
  • Weigh these 6 enterprise advantages of storage as a service
    • May 28, 2025
  • 7
    Broadcom’s ‘harsh’ VMware contracts are costing customers up to 1,500% more
    • May 28, 2025
  • 8
    Pulsant targets partner diversity with new IaaS solution
    • May 23, 2025
  • 9
    Growing AI workloads are causing hybrid cloud headaches
    • May 23, 2025
  • Gemma 3n 10
    Announcing Gemma 3n preview: powerful, efficient, mobile-first AI
    • May 22, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • Understand how Windows Server 2025 PAYG licensing works
    • May 20, 2025
  • By the numbers: How upskilling fills the IT skills gap
    • May 21, 2025
  • 3
    Cloud adoption isn’t all it’s cut out to be as enterprises report growing dissatisfaction
    • May 15, 2025
  • 4
    Hybrid cloud is complicated – Red Hat’s new AI assistant wants to solve that
    • May 20, 2025
  • 5
    Google is getting serious on cloud sovereignty
    • May 22, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.