sb-nz logo
Story image

Palo Alto Networks snaps up LightCyber for automated behaviour analytics prowess

02 Mar 2017

Palo Alto Networks has forked over $105 million for cybersecurity provider LightCyber, in an effort to fuse automated behavioural analytics into its security solutions.

LightCyber has been developing its automated behavioural analytics through machine learning, focusing on identifying attacks based on behavioural anomalies inside the network. 

Palo Alto Networks will continue offering LightCyber products and implementations while it fits the technology into its own Next-Generation Security Platform by the end of the year.

The company believes that adding behavioural analytics to its own platform will strengthen its automated threat prevention capabilities throughout the entire attack lifecycle. 

LightCyber CEO Gone Fink says Palo Alto has been on the cutting edge of the security industry thanks to its automated platform. 

“We are pleased to join the Palo Alto Networks team, combining our technology innovations and accelerating adoption of behavioural analytics to help organisations bolster their defences against the advanced and sophisticated adversaries they are facing today,” Fink says.

Palo Alto Networks says that automatic behaviour analytics enhance breach prevention, as shown in a report by the Ponemon Institute. 

Organisations take an average of five months to respond to breaches, which means attackers can infiltrate the network entirely. This results to damage and data loss.

The LightCyber technology uses machine learning to analyse user and entity activity. It then identifies and protects against anomalies that indicate an attack.

Palo Alto Networks CEO Mark McLaughlin says LightCyber’s technology is well-aligned with the platform approach.

This technology will complement the existing automated threat prevention capabilities of our platform to help organisations not only improve but also scale their security protections to prevent cyber breaches,” he concludes.

Story image
Kaspersky finds red tape biggest barrier against cybersecurity initiatives
The most common obstacles that inhibit or delay the implementation of industrial cybersecurity projects include the inability to stop production (34%), and bureaucratic steps, such as a lengthy approval process (31%) and having too many decision-makers (23%). More
Story image
Check Point acquires Odo Security to bolster remote security offering
The deal will integrate Odo’s remote access software with Check Point’s Inifinity architecture, bolstering the latter company’s remote security capabilities in a time where working and learning from home has become the norm, and looks to largely remain that way in the near future.More
Story image
NortonLifeLock introduces dark web monitoring to its security suite
Dark Web Monitoring Powered by LifeLock will be capable of monitoring the dark web, searching for over 120 personal identifiable information including email, physical address, phone number, driver licence number, credit card or bank account numbers and gamer tags.More
Story image
The guide to digital security in unstable times
An increase in vulnerability across different sectors has meant that 2020 has seen more than its fair share of cybersecurity incidents. One of the most effective ways to combat the perils of today’s cyber-threats is to gain a better knowledge of the threat vectors looming over the heads of organisations. More
Story image
Evolving threat landscape top priority for security and risk leaders
"COVID-19 has proved how rapidly and how drastically such risks can change."More
Story image
Proofpoint and CyberArk extend partnership to further safeguard high-risk users
“Our CyberArk partnership extension provides security teams with increased detection and enhanced adaptive controls to help prevent today’s most severe threats."More