Platform HYPR + CrowdStrike Integration

HYPR + CrowdStrike Integration

Unite Endpoint Risk and Posture Assessment With Your Identity Workflows

The best of both worlds: Give trusted users fast, secure passwordless access. Leverage CrowdStrike Falcon risk intelligence to stop identity threats in real time.

HYPR CrowdStrike integration

Eliminate Gaps Between Intelligence and Action

HYPR and CrowdStrike together ensure you can confidently verify every user and device accessing your resources, mitigating the risk of unauthorized access and insider threats.


Security-1378x895-01-1

Combine User and Endpoint Intelligence

Unify real-time endpoint device data and identity threat intelligence from the CrowdStrike Falcon® platform, including Zero Trust Assessment (ZTA) risk scores, with HYPR’s advanced access controls and your Identity Provider’s workflows to prevent unauthorized access. Enforce access policies based on the current security posture of users and devices for real-time adaptive protection.

Extend and Enhance Identity Threat Detection and Response (ITDR) Capabilities

Dynamically assess identity and device risk and automatically control access to critical systems, applications and data to boost security responsiveness and accuracy.

HYPR enforces adaptive identity access policies based on changing device and identity posture from the Falcon platform, along with identity provider data, endpoint and browser risk signals from HYPR Adapt. Control measures include requiring additional authentication steps, verifying identity, or restricting access to certain applications until the risk is mitigated.

Compliance-1378x895-03
IntegrateQuickly-1378x895-01

Tailor Security Controls

Use our pre-defined, out-of-the-box CrowdStrike policies, or easily customize and adjust these policies through the HYPR Control Center admin console. Modify score thresholds on a per use case or global basis, based on your organization’s unique requirements and evolving conditions in your environment, ensuring flexible and relevant security management.

Enforce Phishing-Resistant Authentication While Improving Authentication Experience

Remove passwords and other shared secrets from your authentication processes with frictionless, FIDO Certified MFA from HYPR. Protect your systems and resources from credential-based attacks while making login faster and easier for your users.

Falcon Identity Protection can also intercept and enforce HYPR’s phishing-resistant MFA into legacy on-prem systems, Active Directory, and other environments that adversaries typically exploit to launch attacks.

UserExperience-1378x895-01
IdentitySecurity-1378x895-04

Integrate Identity Verification

Integrate identity verification as a core component of your security posture. HYPR's proactive, adaptive identity verification prompts reverification of users at risk from new threat vectors or people displaying suspect behavior.

See the CrowdStrike | HYPR Integration in Action


Watch this demonstration of the CrowdStrike | HYPR integration, in a LinkedIn Live session filmed live from the show floor at Identiverse 2024. 

How the HYPR | Falcon Zero Trust Assessment Integration Works 


HYPR collects a variety of endpoint device data, including your CrowdStrike Falcon ZTA score, to drive real-time, individual access decisions according to defined policies. Users are permitted access, required to authenticate using phishing-resistant MFA, asked to re-verify identity, denied access, or logged out of the endpoint device until the device is remediated.

CrowdStrike-ZTA-integration-diagram
  1. Capture CrowdStrike Falcon Agent ID: User logs into their workstation with HYPR Workforce Access phishing-resistant MFA, which captures the CrowdStrike Falcon Agent ID and sends it to HYPR Adapt.
  2. IdP Workflow: The user initiates the login process to their Identity Provider (IdP).
  3. HYPR Adapt: The IdP checks with HYPR Adapt to determine the user authentication or identity verification requirements based on the policy decision.
  4. Zero Trust Assessment: HYPR Adapt queries the Zero Trust Assessment from CrowdStrike Falcon for the endpoint where the user is currently logged in.
  5. Policy Decision: HYPR Adapt analyzes the Zero Trust Assessment Score and makes a policy decision, which can include allowing HYPR’s seamless desktop single sign-on (SSO), enforcing HYPR's phishing-resistant authentication, requiring re-verification of user identity via HYPR Affirm, or denying access.
  6. Access Granted: If the policy permits and the user fulfills the required steps during authentication, they gain access to their enterprise applications.

How the HYPR | Falcon Identity Protection Integration Works 


Drive risk-based decisions at the point of access. HYPR Adapt compares an individual’s Identity Protection Risk Score against access policies for business-critical applications. Based on the defined policies, the user is granted access, prompted to use phishing-resistant authentication, required to undergo identity verification, or denied access.

HYPR-CrowdStrike-Falcon-Identity-Protection-integration
  1. IdP Workflow: The user initiates the login process to their Identity Provider (IdP).
  2. HYPR Adapt: The IdP checks with HYPR Adapt to determine the user authentication requirements based on the policy decision.
  3. Identity Protection Risk Score: HYPR Adapt retrieves the Identity Protection Risk Score from CrowdStrike Falcon, analyzing the risk posture associated with the user's account.
  4. Policy Decision: Based on the Identity Protection Risk Score and other contextual factors, HYPR Adapt determines the appropriate policy decision, which may include enabling the default single sign-on (SSO) workflow, enforcingHYPR's phishing-resistant authentication,  requiring re-verification of user identity via HYPR Affirm, or denying access altogether.
  5. Access Granted: If the policy allows and the user fulfills any enforced requirements, access to enterprise applications is granted, ensuring a secure and seamless user experience.

Integration Guides

Explore our documentation on integrating HYPR with CrowdStrike.

Request a Demo


Experience passwordless MFA that secures and empowers your business. See what identity verification built for the workforce looks like. Learn how comprehensive Identity Assurance protects the entire identity lifecycle.

Fill out the form to get a demo from an identity security expert, customized around your organization’s environment and needs.