Platform HYPR + CrowdStrike Integration

HYPR + CrowdStrike Integration

Unite Endpoint Risk and Posture Assessment With Your Identity Workflows

The best of both worlds: Give trusted users fast, secure passwordless access. Leverage CrowdStrike Falcon risk intelligence to enforce access policies based on your organization’s unique requirements and facts on the ground.

HYPR CrowdStrike integration

Empower Instant, Intelligent Access Decisions

HYPR and CrowdStrike together ensure you can confidently verify every user and device accessing your resources, mitigating the risk of unauthorized access and insider threats.


HYPR | Falcon Identity Protection Integration

Harness Falcon Identity Protection intelligence to drive risk-based decisions at the point of access.

HYPR Adapt compares an individual’s Identity Protection Risk Score against access policies for business-critical applications. Based on the defined policies, the user is granted access, prompted to use phishing-resistant authentication, required to undergo identity verification, or denied access.

UserExperience-1378x895-02
Compliance-1378x895-03

HYPR | Falcon Zero Trust Assessment Integration

Leverage Falcon ZTA device risk signals to direct access policies and strengthen device trust.

HYPR collects a variety of endpoint device data to drive real-time, risk-based access decisions, including your CrowdStrike Falcon ZTA score. The system uses the ZTA risk signals to make individual access decisions according to the defined policies. Users are then permitted access, required to authenticate using phishing-resistant MFA, asked to re-verify identity, denied access, or logged out of the endpoint device until the device is remediated.

Effortlessly Customize Access Policies

Use our pre-defined out-of-the-box CrowdStrike policies or easily tailor and rapidly adjust these policies through the HYPR Control Center’s intuitive admin console. Modify score thresholds on a per use case or global basis, based on your organization’s evolving requirements and changing conditions in your environment.

Security-1378x895-01-1
UserExperience-1378x895-01

Eliminate Passwords While Improving Authentication Experience

Remove passwords and other shared secrets from your authentication processes with  our industry-leading FIDO Certified MFA. HYPR’s frictionless, phishing-resistant authentication protects your systems and resources from credential-based attacks while making login faster and easier for your users. HYPR works across devices, platforms and IdPs, providing a unified login experience across workstation and web.

Enforce Phishing-Resistant Authentication Everywhere

Falcon Identity Protection can intercept and enforce HYPR’s phishing-resistant MFA into legacy on-prem systems, Active Directory, and other environments that adversaries typically exploit to launch attacks.

Enterprise-1378x895-03

How the HYPR | Falcon Zero Trust Assessment Integration Works 


CrowdStrike-ZTA-integration-diagram
  1. Capture CrowdStrike Falcon Agent ID: User logs into their workstation with HYPR Workforce Access phishing-resistant MFA, which captures the CrowdStrike Falcon Agent ID and sends it to HYPR Adapt.
  2. IdP Workflow: The user initiates the login process to their Identity Provider (IdP).
  3. HYPR Adapt: The IdP checks with HYPR Adapt to determine the user authentication or identity verification requirements based on the policy decision.
  4. Zero Trust Assessment: HYPR Adapt queries the Zero Trust Assessment from CrowdStrike Falcon for the endpoint where the user is currently logged in.
  5. Policy Decision: HYPR Adapt analyzes the Zero Trust Assessment Score and makes a policy decision, which can include allowing HYPR’s seamless desktop single sign-on (SSO), enforcing HYPR's phishing-resistant authentication, requiring re-verification of user identity via HYPR Affirm, or denying access.
  6. Access Granted: If the policy permits and the user fulfills the required steps during authentication, they gain access to their enterprise applications.

How the HYPR | Falcon Identity Protection Integration Works 


HYPR-CrowdStrike-Falcon-Identity-Protection-integration
  1. IdP Workflow: The user initiates the login process to their Identity Provider (IdP).
  2. HYPR Adapt: The IdP checks with HYPR Adapt to determine the user authentication requirements based on the policy decision.
  3. Identity Protection Risk Score: HYPR Adapt retrieves the Identity Protection Risk Score from CrowdStrike Falcon, analyzing the risk posture associated with the user's account.
  4. Policy Decision: Based on the Identity Protection Risk Score and other contextual factors, HYPR Adapt determines the appropriate policy decision, which may include enabling the default single sign-on (SSO) workflow, enforcingHYPR's phishing-resistant authentication,  requiring re-verification of user identity via HYPR Affirm, or denying access altogether.
  5. Access Granted: If the policy allows and the user fulfills any enforced requirements, access to enterprise applications is granted, ensuring a secure and seamless user experience.

Request a Demo


Experience passwordless MFA that secures and empowers your business. See what identity verification built for the workforce looks like. Learn how comprehensive Identity Assurance protects the entire identity lifecycle.

Fill out the form to get a demo from an identity security expert, customized around your organization’s environment and needs.