About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

CrowdStrike Announces General Availability of Falcon Identity Threat Protection for U.S. Public Sector Organizations Requiring FedRAMP Moderate or IL-4 Authorization

Falcon Identity Threat Protection enables U.S. public sector organizations to stop supply chain attacks and other identity-based threats

CrowdStrike (Nasdaq: CRWD), a leader in cloud-delivered protection of endpoints, cloud workloads, identity and data, today announced the general availability of the Falcon Identity Threat Protection module for its GovCloud-1 environment. This makes Falcon Identity Threat Protection available to U.S. public sector organizations that require Federal Risk and Authorization Management Program (FedRAMP) Moderate or Impact Level 4 (IL-4) authorization. This includes U.S. federal agencies, U.S. state and local governments and the Defense Industrial Base (DIB).

In May 2021, the White House released Executive Order (EO) 14028 on improving the nation’s cybersecurity, which outlined security best practices including how the federal government must advance toward a Zero Trust Architecture to keep pace with today’s dynamic and increasingly sophisticated cyber threat environment. CrowdStrike believes Zero Trust principles and identity protection must be applied to hybrid and multi-cloud environments. Identity protection must be all-encompassing and contextually aware of a customer’s on-premises and cloud environments, and other identity providers. Lacking visibility in part of the architecture or part of the authentication flow can lead to breaches.

Falcon Identity Threat Protection integrates with the top Identity Providers (IdP), enabling customers to enforce multi-factor authentication (MFA). This integration empowers customers to apply the same MFA to on-premises authentication flows — and those who wish can have multiple IdPs. If Falcon Identity Threat Protection identifies a compromised identity, it can prevent it from authenticating and accessing other resources, on-premises or in the cloud.

“According to the 2022 CrowdStrike Global Threat Report, nearly 80% of cyberattacks leverage identity-based attacks to compromise legitimate credentials,” said Shawn Henry, CrowdStrike chief security officer and president of CrowdStrike Services. “We are committed to helping the U.S. public sector protect against identity-based threats. With GovCloud-1 support, Falcon Identity Threat Protection can enable U.S. public sector organizations to get visibility and control of their identity infrastructure and apply Zero Trust principles.”

"As agencies adopt Zero Trust, they need to continuously verify user identity and device posture," said Katy Mann, VP of Federal at Okta. "Through our partnership with CrowdStrike, Falcon Identity Threat Protection examines authentication requests in real-time, sharing risk scores with Okta for access policy enforcement. That way, agencies are confident that only the right people with secure devices can access mission-critical resources. And users benefit from a simpler experience and seamless single sign-on across apps. Together, Okta and CrowdStrike are accelerating the transition to Zero Trust."

“Pain points in adopting identity security and Zero Trust are complexity and process friction. Licensing multiple products, creating actionable linkages across separate products and logging into multiple consoles are speed bumps organizations encounter in merging identity security into a Zero Trust architecture. Falcon Identity Threat Protection is designed to remove these speedbumps. For example, customers can run an Active Directory domain controller, configure a policy and integrate with a MFA solution to layer in conditional access seamlessly without additional coding or stitching together,” said Michael Suby, research vice president, security & trust at IDC.

Additional Resources

  • For more information on Falcon Identity Threat Protection becoming generally available for U.S. public sector organizations, please visit our blog.
  • In the fourth round of the MITRE Engenuity ATT&CK® Enterprise Evaluation, Falcon Identity Threat Protection was so effective in stopping breaches, CrowdStrike was asked to disable the product to allow testing to continue — and still achieved 100% prevention.
  • CrowdStrike protects the United States’ critical endpoints and workloads through CISA (Cybersecurity and Infrastructure Security Agency) and other major civilian agencies.

About CrowdStrike

CrowdStrike (Nasdaq: CRWD), a global cybersecurity leader, has redefined modern security with one of the world’s most advanced cloud-native platforms for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

Learn more: https://www.crowdstrike.com/

Follow us: Blog | Twitter | LinkedIn | Facebook | Instagram

Start a free trial today: https://www.crowdstrike.com/free-trial-guide/

© 2022 CrowdStrike, Inc. All rights reserved. CrowdStrike, the falcon logo, CrowdStrike Falcon and CrowdStrike Threat Graph are marks owned by CrowdStrike, Inc. and registered with the United States Patent and Trademark Office, and in other countries. CrowdStrike owns other trademarks and service marks, and may use the brands of third parties to identify their products and services.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.