About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

CrowdStrike Unveils Unified Data Protection to Secure Data Across Endpoints, Cloud, GenAI and SaaS

New Falcon Data Protection innovations stop encrypted file exfiltration, GenAI data leaks and SaaS misconfigurations, closing critical gaps attackers exploit to steal sensitive data

RSA 2025 CrowdStrike (NASDAQ: CRWD) today announced new Falcon® Data Protection innovations, enabling security teams to protect sensitive data across endpoints, cloud environments and GenAI and SaaS applications to prevent exfiltration by insiders and identity-based attackers. With these innovations, the CrowdStrike Falcon® cybersecurity platform empowers teams to replace legacy DLP solutions that require separate tools for endpoint and cloud with real-time, unified protection from a single platform.

Data is Now a Primary Adversary Target

Adversaries are shifting from disruption to data theft, targeting misconfigurations and trusted identities to exfiltrate sensitive information and fuel downstream attacks. Groups like SCATTERED SPIDER compromise SSO accounts to harvest SharePoint and Outlook passwords, VPN instructions and internal documents to aid lateral movement and extortion. Others, like FAMOUS CHOLLIMA, gain insider access to company-issued endpoints and cloud environments, using remote access tools to steal intellectual property and customer data. As GenAI adoption accelerates, misconfigured applications and unsecured usage are creating new vectors for data exposure. CrowdStrike is closing the gaps adversaries exploit to steal data by protecting sensitive information across modern hybrid environments.

“In today's threat landscape, your data isn't just an asset – it's the primary target,” said Elia Zaitsev, chief technology officer, CrowdStrike. “Legacy data protection approaches fail because they're fragmented across environments, blind to encrypted exfiltration and incapable of stopping threats in real time. Today, businesses must also contend with employees inadvertently leaking sensitive data to unapproved or misused GenAI tools, adding new layers of risk. With Falcon Data Protection, we are the next chapter of data protection: unified visibility and control across your entire data ecosystem with the real-time protection needed to stop data theft before it happens.”

Transforming Data Protection Requires a Unified Platform

Falcon Data Protection eliminates the need for separate, piecemeal endpoint, cloud and SaaS security tools by providing comprehensive protection through a single platform. Key innovations include:

Runtime Cloud Data Protection

  • Falcon Data Protection for Cloud: Delivers runtime protection for cloud data at rest and in motion, leveraging eBPF to detect and block unauthorized data movements in real time, without slowing systems down. Provides a single view of data flows across on-premises and multi-cloud environments.

Industry-First Encrypted Exfiltration Prevention

  • Falcon Data Protection for Endpoint – Encryption Detection: Revolutionary capability that inspects sensitive data within encrypted archives like 7zip files as they're created – identifying and automatically blocking data theft attempts before files are locked and exfiltrated.

Complete GenAI Data Security

  • Falcon Data Protection for Endpoint – GenAI Data Leak Prevention: Uses proprietary Similarity Detection DNA technology to recognize sensitive content even when modified or repackaged for GenAI tool upload. Enforces policies by content type, source or sensitivity label – preventing inadvertent exposure of sensitive information while blocking data leakage across both managed and unmanaged GenAI applications.

Comprehensive Coverage Expansion

  • Falcon Data Protection for Endpoint – macOS Expanded Protection: Extends unified data protection to macOS environments, delivering consistent visibility and enforcement across diverse endpoint fleets.
  • SaaS Threat Services: Provides expert-led hunting, assessment and response for SaaS security threats that could compromise sensitive data.
  • Falcon Privileged Access: Dynamically eliminates standing privileges to sensitive data, granting Just-in-Time elevated access only when needed and under secure conditions.
  • Identity-Based Threat Detection: Combines Falcon® Next-Gen SIEM and Falcon® Identity Protection to rapidly detect and neutralize identity-based threats targeting sensitive data.
  • CrowdStrike Pulse Services: Delivers ongoing, customized security guidance to strengthen data protection across on-premises and cloud environments.

To learn more about CrowdStrike’s latest data protection innovations:

  • Visit booth N-6144 at RSA
  • Read our blog

About CrowdStrike

CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity and immediate time-to-value.

CrowdStrike: We stop breaches.

Learn more: https://www.crowdstrike.com/

Follow us: Blog | X | LinkedIn | Facebook | Instagram

Start a free trial today: https://www.crowdstrike.com/free-trial-guide/

© 2025 CrowdStrike, Inc. All rights reserved. CrowdStrike and CrowdStrike Falcon are marks owned by CrowdStrike, Inc. and are registered in the United States and other countries. CrowdStrike owns other trademarks and service marks and may use the brands of third parties to identify their products and services.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.