CrowdStrike to acquire Reposify

Reposify’s external attack surface management (EASM) capabilities expand CrowdStrike’s robust Threat Intelligence and Security and IT Operations product suites.

CrowdStrike Holdings has agreed to acquire Reposify Ltd. Reposify provides an external attack surface management (EASM) platform that scans the internet for exposed assets of an organization to detect and eliminate risk from vulnerable and unknown assets before attackers can exploit them. With Reposify, CrowdStrike will provide a fundamentally differentiated EASM experience to customers as part of its world-renowned Threat Intelligence product suite, combining deep insights on endpoints and IT environments with internet scanning capabilities that deliver an adversarial-view of organizational risk across internal and external attack surfaces. CrowdStrike will also leverage Reposify’s capabilities to bolster its rapidly growing Security and IT Operations product suite. 

Attack surface management is a critical aspect of the broader enterprise security posture. Understanding where shadow IT, legacy systems and unknown infrastructure exposes enterprises to additional risk is essential to enhance the overall security stance of organizations.                                                                                                                                                              

“Fortifying security posture and reducing enterprise risk are top priorities for organizations. Traditional risk models take an inside-out approach, which doesn’t always account for how a threat actor may view the external attack surface. Reposify’s technology delivers an outside-in perspective of an organization’s global external risk, providing deep visibility into what connected devices are vulnerable and most likely to be targeted,” said George Kurtz, co-founder and chief executive officer of CrowdStrike. “Combined with CrowdStrike’s industry-leading threat intelligence and ITSecOps offerings, this acquisition will provide customers an adversarial view of their external-facing risk and vulnerabilities so they can be more proactive in managing their security posture and more resilient to attacks.”

“We couldn’t be more excited to be joining the peerless team and industry-leading innovators at CrowdStrike,” said Uzi Krieger, chief executive officer of Reposify. 

Reposify was founded by Yaron Tal in 2017 to help organizations take control of their external attack surfaces by providing complete and continuous visibility and actionable insight at scale. Their core technology leverages one of the largest databases of internet-facing assets to empower organizations with the most complete view of their external attack surface with just a click of a button. In March 2021, Gartner named Reposify to its 2021 emerging vendors list in the external attack surface management security category. This annual list showcases rising technology vendors that are spearheading the future success of cyber innovation.

“We built Reposify to enable organizations on a global scale to have visibility into the unprotected assets from the vantage point of attackers, and look forward to integrating our groundbreaking technology into the world-class CrowdStrike Falcon platform,” said Yaron Tal, founder and chief technology officer of Reposify.

2024 saw the highest volume of annual ransomware cases since NCC Group started monitoring...
JumpCloud is continuing its identity-first momentum by acquiring Stack Identity. Stack Identity is...
Annual email threat research predicts infostealer, BEC attacks, and AI-driven phishing and social...
ASM functionality will enhance Searchlight customers’ ability to identify and respond to the...
Turning complexity into clarity for reduced network security risk with AI-powered insights,...
Increasing preferences toward social commerce have highlighted a gap between meeting consumer...
52% of IT leaders say enhancing cybersecurity measures is the top priority in 2025.
Global survey of executives reveals 80% face pressure to reduce the cost of security while...