CrowdStrike Named to Top 50 LinkedIn Startups of 2018

CrowdStrike, a prominent endpoint security solution provider, was named as one of the 50 Most Sought-After Startups of 2018 by LinkedIn. CrowdStrike was the only explicitly cybersecurity vendor to be named to the list.
According to LinkedIn’s methodology, eligible startups are at least 7 years old, have at least 50 employees, privately held, and headquartered in the U.S. LinkedIn also looked at employment growth, engagement, job interest, and attraction of top talent as part of their inclusion criteria.
In the LinkedIn 50 Most Sought-After Startups of 2018 list, available here, CrowdStrike was singled out for their recent success Series E fundraising round. CrowdStrike obtained $200 million in said fundraising, which they plan to invest in expanding their operations and technology.
In a statement after the successful fundraising, CrowdStrike CEO George Kurtz said: “Every industry today in 2018 is concerned about security. It has moved from a discussion about stopping people stealing intellectual property to a business resilience discussion at the board level.” LinkedIn notes the endpoint security market is valued at $35 billion as vendors seek to provide security in the cloud.
CrowdStrike came to greater prominence due to their involvement in the investigations of the Sony Pictures hack and the DNC data breach. CEO George Kurtz was named one of the 10 Coolest Endpoint Security CEO Leaders by Solutions Review. CrowdStrike was also named one of the 25 Best Endpoint Security Platforms and Tools of 2018.
You can read more about the LinkedIn 50 Most Sought-After Startups of 2018 here.
Other Resources:
You Need to Hire More Female Cybersecurity Professionals
In Focus: The Desperate Shortage of Women in Cyber Security
Gartner’s 2018 Magic Quadrant for Endpoint Protection Platforms (EPP): What’s Changed?
4 Tips For Endpoint Security Solutions (That Everyone Forgets)
Comparing the Top Endpoint Security Vendors — Solutions Review
Answering the Top 4 Enterprise Endpoint Security Questions
What Can We Expect for the Future of Endpoint Security?