“There really hasn’t been a foundational cloud company born from the ground up in the cloud,” says CrowdStrike CEO George Kurtz. “There’s been no Salesforce of security. We think we’ve taken the right approach and created the right architecture to be that fourth pillar of cloud computing. That’s one of the areas that I think gets our customers most excited. It’s made their lives a lot easier. As I like to say, it just works for them and that’s what customers are looking for.”
We Built The First Cloud Platform For Security
We’ll let the market dictate the (stock) pricing. What we’re focused on is really building long-term value for shareholders and obviously making sure that our customers are protected. That’s the way we built the business, focusing on preventing breaches for our customers. What is fundamentally different is that we really built the first cloud platform for security.
When you think about Workday and ServiceNow and Salesforce, there really hasn’t been a foundational cloud platform for security. What is fundamentally different is that we really built the first cloud platform for security. That was one of our goals when Demetri Alperovitch and I started the company in 2011. This cloud platform has allowed us to stop breaches and to scale different modules that really hit a specific customer need. It’s been well received by our customers.
A Big Part Of Our Platform Is Collecting Data At Scale
CrowdStrike really runs on your endpoint or computer or your server or workload in the cloud. What we found with traditional antivirus, as an example, we do way more than that, is that signature-based technologies were just not capable of stopping breaches. So a big part of our platform is actually collecting data at scale. We collect a trillion events per week. We use that data to train our machine learning algorithms and we can identify attacks and breaches that have never been seen before at the speed of the network.
This crowdsourcing aspect, which is the crowd in CrowdStrike, really has enabled us to identify these attacks that are causing the most damage to large and small organizations around the globe. They just haven’t been able to do that with traditional, I call fossilized, vendors that are in the market. This architecture has really changed the game for us.
Obviously, security is an evolving area. Adversaries continue to change their tactics. The good part about AI is that you can evolve it to identify these sorts of threats no matter if it’s stealing intellectual property or credit card information or breaking in and destroying data on someone’s computer. What’s important to realize is that at cloud-scale, and the way we operate, we have the ability to take all this data, synthesize it, and provide the best protection and prevention methodologies for our customers.
AI Is Great But It Is Not a Panacea
It’s really all about the data. You hear a lot about AI and AI is great but it has to be used in the right ways. It’s not a panacea. So it’s easy to come up with an algorithm but it’s really hard to collect this data at scale and be able to train these AI algorithms. This is really one of the things that we spent a lot of time on, building a very scalable architecture to get this data in (into our Threat Graph), which is one of the most advanced security databases around.
It really allows us to get better efficacy and lower false positive rates in detecting these breaches. In my view, it’s all about the data. We will continue to get more and more data. It’s that network effect. Our threat graph gets smarter the more data we actually consume.
We See The Tip of The Breach Being The Endpoint
When we look at the threats, whether it’s a nation-state or whether it’s an e-crime group obviously, the threats are evolving and they’re rapid. There are hundreds of thousands of new pieces of malware that come out every day. It’s incumbent on companies to be able to protect themselves. It’s just been an area that’s been underserved because most of the existing technologies have focused on stopping malware instead of stopping breaches, which is again part of our core mission.
If you look in the past, there’s been a lot of point product companies that have come out and try to solve a specific problem. But if you just step back, the problem that most companies are trying to solve is not being breached. Whether that’s network technology or endpoint technology, at the end of the day we see the tip of the breach being the endpoint. That’s where the data resides, the servers, the endpoints, the desktops, and that’s what we’re protecting.
There’s Been No Salesforce of Security
From that standpoint, if you look back in history there really hasn’t been a foundational cloud company born from the ground up in the cloud. There’s been no Salesforce of security. We think we’ve taken the right approach and created the right architecture to be that fourth pillar of cloud computing. That’s one of the areas that I think gets our customers most excited. It’s the ability to rapidly install our technology, just have it work, and be able to scale with us and use different modules with that single agent architecture. It’s made their lives a lot easier. As I like to say, it just works for them and that’s what customers are looking for.