Story image

Palo Alto Networks to expand cloud security capabilities with RedLock acquisition

04 Oct 2018

Cybersecurity Palo Alto Networks announced that it has entered into a definitive agreement to acquire cloud threat defence company RedLock.

Under the terms of the agreement, Palo Alto Networks will pay approximately $173 million in cash to acquire RedLock.

The acquisition is expected to close during Palo Alto Networks fiscal first quarter, subject to the satisfaction of customary closing conditions.

RedLock co-founders Varun Badhwar and Gaurav Kumar will join Palo Alto Networks.

Palo Alto Networks chairman and CEO Nikesh Arora says, “We are thrilled to add RedLock's technology to our cloud security offerings.

“The addition of their technologies allows us to offer comprehensive security for multi-cloud environments, including Amazon Web Services, Google Cloud Platform and Microsoft Azure, and strengthens our cloud strategy going forward.

”Palo Alto Networks provides a security offering for multi-cloud environments with inline, host-based, and API-based security, which was bolstered by the acquisition of Evident.io in March 2018.

The company currently serves more than 6,000 cloud customers globally with its cloud security portfolio that includes VM-Series next-generation firewall, Aperture, Evident, and GlobalProtect cloud service.

Palo Alto Networks will combine the Evident and RedLock technologies to provide customers with cloud security analytics, advanced threat detection, continuous security, and compliance monitoring in a single offering anticipated early next year.

The company expects that the new offering will help security teams respond faster to the most critical threats by replacing manual investigations with automated, real-time remediation and reports that highlight an organisation's cloud risks.

RedLock co-founder and CEO Varun Badhwar says, “We are excited to join Palo Alto Networks to bring together the strength of our cloud analytics and their industry-leading compliance technologies to help security teams protect their organisations.”

RedLock provides effective threat defence across public cloud environments to help organisations ensure compliance, govern security, and enable security operations.

The RedLock Cloud 360 platform takes an AI-driven approach that correlates disparate security data sets to provide comprehensive visibility, detect threats, and enable rapid response across an organisation's entire public cloud environment.

Industrial control component vulnerabilities up 30%
Positive Technologies says exploitation of these vulnerabilities could disturb operations by disrupting command transfer between components.
McAfee announces Google Cloud Platform support
McAfee MVISION Cloud now integrates with GCP Cloud SCC to help security professionals gain visibility and control over their cloud resources.
Why AI and behaviour analytics should be essential to enterprises
Cyber threats continue to increase in number and severity, prompting cybersecurity experts to seek new ways to stop malicious actors.
Scammers targeting more countries in sextortion scam - ESET
The attacker in the email claims they have hacked the intended victim's device, and have recorded the person while watching pornographic content.
Cryptojacking and failure to patch still major threats - Ixia
Compromised enterprise networks from unpatched vulnerabilities and bad security hygiene continued to be fertile ground for hackers in 2018.
Princeton study wants to know if you have a smart home - or a spy home
The IoT research team at Princeton University wants to know how your IoT devices send and receive data not only to each other, but also to any other third parties that may be involved.
Organisations not testing incident response plans – IBM Security
Failure to test can leave organisations less prepared to effectively manage the complex processes and coordination that must take place in the wake of an attack.
65% of manufacturers run outdated operating systems – Trend Micro
The report highlights the unique triple threat facing manufacturing, including the risks associated with IT, OT and IP.