Security News NordVPN Selects CrowdStrike to Deliver Industry-Leading Threat Intelligence to Millions of Consumers

Shadowra

Level 41
Thread author
Verified
Top Poster
Content Creator
Malware Tester
Well-known
High Reputation
Forum Veteran
Sep 2, 2021
3,006
38,504
3,980
29
France
CrowdStrike Threat Intelligence powers NordVPN’s Threat Protection Pro™, bringing enterprise-grade adversary intelligence to consumer security

AUSTIN, Texas – February 12, 2026 – NordVPN has selected CrowdStrike (NASDAQ: CRWD) to power its Threat Protection Pro™ feature, bringing industry-leading threat intelligence trusted by enterprises and governments to millions of consumers worldwide. Through this collaboration, CrowdStrike Threat Intelligence enhances NordVPN’s ability to protect users against modern cyber threats with real-time, adversary-driven intelligence delivered in a simple, privacy-first experience.

Powered by CrowdStrike Counter Adversary Operations, which tracks more than 265 of the world’s most sophisticated nation-state, eCrime, and hacktivist groups, CrowdStrike Threat Intelligence provides deep visibility into adversary behavior and emerging threats. By integrating this intelligence into NordVPN’s Threat Protection Pro™, users gain stronger protection against malicious websites, phishing attempts, malware, and trackers – threats increasingly driven by the same adversaries that target enterprises and consumers.

“Cybersecurity isn’t a malware problem – it’s an adversary problem,” said Daniel Bernard, chief business officer at CrowdStrike. “CrowdStrike pioneered the adversarial approach to security and continues to deliver the gold standard in threat intelligence. When a category-defining brand like NordVPN selects CrowdStrike, it reinforces a simple truth: the best trust the best. We’re bringing the same adversary insights that protect enterprises and governments to millions of consumers and raising the bar for what consumer security should deliver.”

“Our mission is to provide the strongest possible protection for our customers, and that starts with intelligence we can trust,” said Marijus Briedis, CTO at NordVPN. “CrowdStrike leads the industry in understanding adversaries and emerging threats. Bringing that intelligence into Threat Protection Pro™ gives our users an immediate and powerful layer of defense, helping them stay ahead of threats without compromising speed or privacy.”

Benefits for NordVPN users include:

  • Enterprise-Grade Threat Intelligence: Threat indicators sourced directly from CrowdStrike’s global sensor network, research teams, and threat hunters are used to scan and match threats detected in user network data.
  • Context-Rich Protection: Insight into threat indicators and related metadata for threats identified in user environments, enabling faster identification and blocking of related threats.
  • Continuous Real-Time Updates: Regularly refreshed intelligence helps protect users from emerging threats as they appear.

Together, CrowdStrike and NordVPN are redefining what’s possible in consumer cybersecurity – bringing enterprise-grade threat intelligence and protection to consumers everywhere.

About CrowdStrike
CrowdStrike (NASDAQ: CRWD), a global cybersecurity leader, has redefined modern security with the world’s most advanced cloud-native platform for protecting critical areas of enterprise risk – endpoints and cloud workloads, identity and data.

Powered by the CrowdStrike Security Cloud and world-class AI, the CrowdStrike Falcon® platform leverages real-time indicators of attack, threat intelligence, evolving adversary tradecraft, and enriched telemetry from across the enterprise to deliver hyper-accurate detections, automated protection and remediation, elite threat hunting, and prioritized observability of vulnerabilities.

Purpose-built in the cloud with a single lightweight-agent architecture, the Falcon platform delivers rapid and scalable deployment, superior protection and performance, reduced complexity, and immediate time-to-value.
 
What you quoted reads like a joint PR stating that NordVPN’s “Threat Protection Pro™” is now using CrowdStrike Threat Intelligence (including intel produced by CrowdStrike Counter Adversary Operations) to improve blocking of things like malicious URLs, phishing, malware, and trackers.

What this likely means (in practical terms)
“Threat intelligence” in this context usually means some combination of:
  • Reputation data / blocklists for malicious domains, URLs, IPs, and file indicators (IOCs)
  • Faster updates based on newly observed campaigns (phishing waves, exploit sites, malware hosting, etc.)
  • Better tagging/context around indicators (so related infrastructure can be blocked more quickly)

It does not automatically mean consumers are “running CrowdStrike Falcon” on their PCs, or that NordVPN has suddenly turned into a full endpoint security suite. It’s more accurate to view this as an upgrade to Nord’s filtering/reputation layer if you enable that feature.

Potential benefits
  • Better coverage against fast-moving phishing/malicious infrastructure, especially if the intel is refreshed frequently
  • Earlier blocking of newly spun-up malicious domains/URLs (where “static” blocklists often lag)
  • More consistent categorization (phishing vs malware vs scam infrastructure), which can improve blocking decisions

Important limitations to keep in mind
  • A URL/reputation layer can’t replace a real endpoint security stack. It won’t stop everything (especially brand-new payloads, encrypted archives, living-off-the-land activity, malicious docs that don’t fetch obvious IOCs, etc.).
  • False positives are possible with any intel-fed blocking system (good sites can get temporarily misclassified).
  • “VPN + blocking” does not equal “secure system.” Patch management, browser hardening, and endpoint protection still matter more.

Privacy angle (worth reading carefully)
Your quote includes wording like “scan and match threats detected in user network data.” That’s not automatically bad, but it’s a signal to review exactly:
  • What is inspected (DNS lookups only vs full URLs vs downloaded files)
  • Whether analysis happens locally/on-device vs in the cloud
  • What telemetry/metadata (if any) is sent out, retained, or shared with partners

I can’t verify implementation details from the PR text alone, so the safest approach is to rely on NordVPN’s official documentation for Threat Protection/Threat Protection Pro and their privacy policy to understand data handling, opt-outs, and logging/retention.

Bottom line
If accurate, this is a reasonable “quality uplift” to NordVPN’s Threat Protection Pro filtering via stronger threat intel, but it should be treated as a supplementary layer—not a substitute for a reputable AV/EDR-equivalent on the endpoint. The next step is to validate the exact inspection/telemetry model in Nord’s official docs and privacy disclosures before enabling it on sensitive systems.
 
Nice ! Its already enabled, CrowdStrike.

1771531268117.png
 
Nice ! Its already enabled, CrowdStrike.
chatgpt says MT Bot is correct to be cautious:
The MalwareTips bot is right to say:
the PR alone doesn’t prove where analysis happens
And in privacy work, uncertainty = assume some outbound reputation queries exist until documentation proves otherwise. @TuxTalk where or how is the crowdstrike protection being applied, locally or in a cloud...
 
I couldn't resist checked security setting to see if Defender gave way to crowdstrike but apparently,only works when VPN is on??
And then I believe NordVPN is not embedding the whole Crowdstrike, Crowdstrike is an EDR remember? If the entire Crowdstrike is embedded into NordVPN forr a low price, nobody will buy CrowdStrike. I think Bot said Crowdstrike is only providing DNS blocks and IOCs (indication of compromise) . An EDR's real strength is in its web console.
 
Last edited:
And then I believe NordVPN is not embedding the whole Crowdstrike, Crowdstrike is an EDR remember? If the entire Crowdstrike is embedded into NordVPN forr a low price, nobody will buy CrowdStrike. I think Bot said Crowdstrike is only providing DNS blocks and IOCs (indication of compromise)
I asked chatGPT to see if it can find more info about this:

First important​


From Nord’s own Threat Protection Pro documentation:


“Threat Protection Pro™ adds a new certificate to Firefox.”

That is huge.


Because that’s exactly how:


  • Bitdefender
  • Kaspersky
  • ESET web protection
  • Avast HTTPS scanning
  • corporate endpoint security stacks

inspect encrypted HTTPS traffic.


It’s called:


👉 TLS interception via local root CA


Meaning:


Your system trusts a locally-installed Nord certificate
Nord’s filtering module becomes a local man-in-the-middle (MITM)
HTTPS session is decrypted locally → scanned → re-encrypted → sent onward


That’s how it can:


✔ block phishing pages
✔ scan downloads in transit
✔ analyze redirect chains
✔ filter ads inside HTTPS


None of that is possible at DNS-only level.


So this already moves Threat Protection Pro out of:


“simple destination blocklist”

into:


endpoint traffic inspection layer
 
Last edited by a moderator:
I'm running McAfee on my computers. Would using NordVPN with Threat Protection Pro™ in addition cause any conflicts? It would mean two installed VPNs and two web add-ons performing the same tasks. Wouldn't that be overkill in terms of security software? I definitely don't want to do without McAfee.
No conficts, its not a real AV. I use it together with ESET
 
I'm running McAfee on my computers. Would using NordVPN with Threat Protection Pro™ in addition cause any conflicts? It would mean two installed VPNs and two web add-ons performing the same tasks. Wouldn't that be overkill in terms of security software? I definitely don't want to do without McAfee.
Offcourse you can only have one VPN connection active, i would choose Nord ALWAYS over the VPN from McAfee.
 
I have surfshark which has Av, but to use you have to uninstall (Bitdefender for example)crowdstrike protection on ,has no scan options is this normal for crowdstrike?, I may not understand any insite ? For now I am stopping trial
Normal behavior I'd argue. Sometimes AV/AM won't let you run two AV's at once because of conflicts etc. Depends on which you value more resident AV or CrowdStrike?