Story image

Palo Alto Networks to expand cloud security capabilities with RedLock acquisition

04 Oct 2018

Cybersecurity Palo Alto Networks announced that it has entered into a definitive agreement to acquire cloud threat defence company RedLock.

Under the terms of the agreement, Palo Alto Networks will pay approximately $173 million in cash to acquire RedLock.

The acquisition is expected to close during Palo Alto Networks fiscal first quarter, subject to the satisfaction of customary closing conditions.

RedLock co-founders Varun Badhwar and Gaurav Kumar will join Palo Alto Networks.

Palo Alto Networks chairman and CEO Nikesh Arora says, “We are thrilled to add RedLock's technology to our cloud security offerings.

“The addition of their technologies allows us to offer comprehensive security for multi-cloud environments, including Amazon Web Services, Google Cloud Platform and Microsoft Azure, and strengthens our cloud strategy going forward.

”Palo Alto Networks provides a security offering for multi-cloud environments with inline, host-based, and API-based security, which was bolstered by the acquisition of Evident.io in March 2018.

The company currently serves more than 6,000 cloud customers globally with its cloud security portfolio that includes VM-Series next-generation firewall, Aperture, Evident, and GlobalProtect cloud service.

Palo Alto Networks will combine the Evident and RedLock technologies to provide customers with cloud security analytics, advanced threat detection, continuous security, and compliance monitoring in a single offering anticipated early next year.

The company expects that the new offering will help security teams respond faster to the most critical threats by replacing manual investigations with automated, real-time remediation and reports that highlight an organisation's cloud risks.

RedLock co-founder and CEO Varun Badhwar says, “We are excited to join Palo Alto Networks to bring together the strength of our cloud analytics and their industry-leading compliance technologies to help security teams protect their organisations.”

RedLock provides effective threat defence across public cloud environments to help organisations ensure compliance, govern security, and enable security operations.

The RedLock Cloud 360 platform takes an AI-driven approach that correlates disparate security data sets to provide comprehensive visibility, detect threats, and enable rapid response across an organisation's entire public cloud environment.

Chillisoft rounds out portfolio with file integrity vendor
Tripwire is the fourth vendor for Chillisoft in six months, adding critical security controls, vulnerability management and file integrity monitoring.
ESET researchers break down latest arsenal of the infamous Sednit group
At the end of August 2018, the Sednit group launched a spear-phishing email campaign, in which it distributed shortened URLs that delivered first-stage Zebrocy components.
Google 'will do better' after G Suite passwords exposed since 2005
Fourteen years is a long time for sensitive information like usernames and passwords to be sitting ducks, unencrypted and at risk of theft and corruption.
Who's watching you? 
With privacy an increasing concern amongst the public, users should be more aware than ever of what personal data companies hold.
Fake apps on Google Play scamming users out of cryptocurrency
Fake cryptocurrency apps on Google Play have been discovered to be phishing and scamming users out of cryptocurrency, according to a new report from ESET.
Optic Security Group celebrates Axis accolade
Auckland-based business security systems provider Fortlock has picked up an award at Axis Communications’ annual Oceania Axis Partner Summit 2019.
Managing data to comply with privacy regulations - Micro Focus
It’s crucial for organisations to be able to access, understand, and accurately classify the data they have so they know how to treat it.
Hackbusters! Reviewing 90 days of cybersecurity incident response cases
While there are occasionally very advanced new threats, these are massively outnumbered by common-or-garden email fraud, ransomware attacks and well-worn old exploits.