Palo Alto Networks to Acquire RedLock

Palo Alto Networks to Acquire RedLock

In a move that will bolster its existing security offerings for multi-cloud environments, Palo Alto Networks today announced its intent to acquire RedLock. In March 2018, Palo Alto Networks acquired, a deal that augmented its inline, host-based and API-based security offerings.

As many organizations continue to migrate to the cloud, they report a lack of visibility and centralization across the multi-cloud environment, according to RedLock. Because the company captures event details and correlates resource configuration, network traffic and third-party feed, its acquisition addresses the pain points companies have in managing compliance and detecting and responding to threats quickly.

According to today’s Palo Alto Networks post, RedLock brings risk prioritization with risk scores determined for every cloud resource, rapid response whereby companies can perform auto-remediation, threat investigation that searches for all databases that were receiving traffic from suspicious IP addresses and an audit trail that provides customers with a DVR-like capability to view time-serialized activity.

“We are thrilled to add RedLock's technology to our cloud security offerings,” said Nikesh Arora, chairman and CEO of Palo Alto Networks, in today’s press release. “The addition of their technologies allows us to offer the most comprehensive security for multi-cloud environments, including Amazon Web Services, Google Cloud Platform and Microsoft Azure, and significantly strengthens our cloud strategy going forward.”

In a blog post, RedLock co-founder and CEO Varun Badhwar wrote that combining its capabilities with Palo Alto Networks and Evident will enable the company to deliver more robust security offerings that include continuous discovery and inventory of public cloud resources, compliance reporting and the ability to prioritize vulnerabilities.

“We are excited to join Palo Alto Networks to bring together the strength of our cloud analytics and their industry-leading compliance technologies to help security teams protect their organizations,” wrote Badhwar.

Source: Information Security Magazine