Updated as of 7/24

We have compiled a list of our vendors that have publicly responded to the impacts of the CrowdStrike outage. This list will continue to be updated as we continue to communicate with our vendors during this time.

Vendor Statements on the CrowdStrike Outage:

Acronis

‘Kevin Reed, Acronis Chief Information Security Officer, weighs in:
“The recent CrowdStrike outage appears to stem from a bug in their EDR agent, which was unfortunately not thoroughly tested. This resulted in widespread disruption as many installations were affected globally…”‘

Read Acronis’ Full Statement


Automox

‘A recent auto-update from CrowdStrike Falcon Agent has been identified as causing affected Windows machines worldwide to enter a Blue Screen of Death (BSOD) state. 

CrowdStrike has rolled out a new patch that fixes this issue, however; it only assists endpoints that can still boot successfully. For systems stuck in a boot loop, manual intervention is necessary. This is not a cyberattack, but at this time, seems to be caused by a faulty CrowdStrike Falcon Agent update…’

Read Automox’s Full Statement


Beyond Identity

Beyond Identity confirms that:

  • ‘No Crowdstrike integration outage or disruption has been observed.
  • No ongoing operational impact to Beyond Identity. Only a small population of our employees were impacted and the issue has been resolved.
  • We are actively monitoring the situation and any disruptions will be communicated accordingly.

Beyond Identity’s support team is ready to help you with any issues you may be experiencing. Please don’t hesitate to reach out.’


Bitdefender

‘Following recent cybersecurity events, we’ve seen a significant increase in inquiries from our customers and partners about software update reliability and our release strategy.’

Read Bitdefender’s Full Statement


DNSFilter

‘After last week’s world-wide outage, we have noticed a significant uptick in the use of “crowdstrike” (or similar) in the names of newly registered domains. Some of the following domains have threat indicators, while some have simply been registered since the outage. Out of an abundance of caution at DNSFilter, we are marking all of these newly registered domains as blocked on our network…’

See DNSFilter’s Full Statement


Flashpoint

‘On July 19, 2024, a software update from CrowdStrike caused the largest IT outage in history, affecting industries worldwide. Banking services, hospitals, and airlines experienced serious disruptions. While current reports confirm that this was not a cyberattack, Flashpoint has since observed threat actors looking to exploit this situation…’

See Flashpoint’s Full Statement


GFI

GFI Maintains Service Through CrowdStrike Global Outage

The recent global outage caused by CrowdStrike on July 18, 2024, underscores the critical importance of reliable and resilient cybersecurity solutions.

GFI Software’s product portfolio remained unaffected by this incident, with our systems and services continuing to operate fully, providing uninterrupted protection for our customers’ digital assets.

At GFI, we take pride in this resilience. Our solutions are designed with built-in redundancies and fail-safes to ensure robust protection and continuous operation, even in challenging circumstances.

As an example, GFI LanGuard offers patch management and auditing to ensure endpoints are secured against known vulnerabilities. CrowdStrike provides endpoint protection through its EDR and NGAV solutions, which focus on detecting and responding to threats at the endpoint level. Both solutions aim to protect endpoints, albeit through different methodologies.

Importantly, GFI AppManager provides valuable monitoring capabilities that can help detect and respond to potential issues. In the event of a service interruption or device failure within our ecosystem, AppManager can alert system administrators, enabling swift action and minimizing potential disruption. This monitoring capability is just one example of how GFI AppManager can provide proactive protection, valuable real-time insights, and management when you need it most.

This event is also a stark reminder of the importance of regularly reviewing IT dependencies. We encourage all organizations to carefully assess their security infrastructure and consider the benefits of a diversified approach to minimize potential risks.

As cybersecurity threats evolve, events like the recent CrowdStrike outage highlight the critical need for preparedness. GFI Software remains dedicated to providing reliable, efficient, and resilient products that empower organizations to confidently face these challenges head-on.’


Kaseya

‘In the wake of the global IT outage, we recognize the setbacks many are facing and understand this is going to be a hard day for IT professionals. If you or your customers are affected by the outage, know that we are here to help.

Our Support Team is available for assistance and the Kaseya Community has partners ready to collaborate with your teams.’

See Kaseya’s Post


Scale Computing

Scale Computing is hosting resources on their website for partners and customers affected by the CrowdStrike outage: view banner here


Sophos

‘The goal of all companies in the cybersecurity space, Sophos and competitors alike, is to keep organizations safe and protect them from attackers. While we compete with one another on the commercial stage, we are – most importantly – a community united against cybercriminals as a common enemy. We extend our peer support to CrowdStrike at this time and wish every affected organization a swift recovery and return to normalcy…’

See Sophos’ Full Statement


Trend Micro

‘This is an extremely unfortunate situation for those affected, and we hope for a speedy remediation and recovery for all those involved. 

While many eyes will be focused on the recovery of their Windows environment, it is important to remember to diligently monitor your non-Windows environments, as adversaries can take advantage of distracted teams. Our research team is constantly watching the general landscape to see if threat actors are taking advantage in any way and will share any significant developments here…’

Read Trend Micro’s Full Statement