Palo Alto Networks to buy security startup RedLock for $173m

RedLock's cloud security analytics and threat detection will be added to Palo Alto's portfolio next year

Palo Alto has bought cloud threat defence company RedLock in a deal said to be worth $173 million.

The purchase will allow Palo Alto Networks to add to its cyber security portfolio, including cloud security analytics, advanced threat detection, continuous security, and compliance monitoring. Palo Alto said new products integrating the new technology will launch on the market next year, helping security teams respond to threats in real time.

The deal will allow Palo Alto customers to automate their responses to cyber risks instead of manually having to assess the potential impact of a hack. At the moment, the company provides API-based security services such as its VM-Series firewall, Aperture, Evident, and GlobalProtect cloud service, in use by more than 6,000 customers worldwide.

"We are thrilled to add RedLock's technology to our cloud security offerings," Nikesh Arora, chairman and CEO of Palo Alto Networks said. "The addition of their technologies allows us to offer the most comprehensive security for multi-cloud environments, including Amazon Web Services, Google Cloud Platform and Microsoft Azure, and significantly strengthens our cloud strategy going forward."

"We are excited to join Palo Alto Networks to bring together the strength of our cloud analytics and their industry-leading compliance technologies to help security teams protect their organizations," Varun Badhwar, co-founder and CEO of RedLock added.

The deal will close during Palo Alto Networks fiscal first quarter, as long as the proposed deal meets the company's expectations. RedLock co-founders, Varun Badhwar and Gaurav Kumar, will join Palo Alto Networks, although neither company has revealed whether any of its other staff will move over to the Networking business.

In February this year, RedLock security specialists highlighted flaws in Tesla's cloud network by breaching its systems and stealing resources needed to mine for cryptocurrencies.

Featured Resources

Digital document processes in 2020: A spotlight on Western Europe

The shift from best practice to business necessity

Download now

Four security considerations for cloud migration

The good, the bad, and the ugly of cloud computing

Download now

VR leads the way in manufacturing

How VR is digitally transforming our world

Download now

Deeper than digital

Top-performing modern enterprises show why more perfect software is fundamental to success

Download now

Recommended

Microsoft spearheads industry-wide charter against AI cyber attacks
Security

Microsoft spearheads industry-wide charter against AI cyber attacks

23 Oct 2020
Weekly threat roundup: Chrome, Citrix and WordPress
Security

Weekly threat roundup: Chrome, Citrix and WordPress

23 Oct 2020
IT services giant Sopra Steria falls victim to Ryuk ransomware
Security

IT services giant Sopra Steria falls victim to Ryuk ransomware

23 Oct 2020
CMS platforms succumb to KashmirBlack botnet as businesses rush online
Security

CMS platforms succumb to KashmirBlack botnet as businesses rush online

22 Oct 2020

Most Popular

The top 12 password-cracking techniques used by hackers
Security

The top 12 password-cracking techniques used by hackers

5 Oct 2020
The enemy of security is complexity
Sponsored

The enemy of security is complexity

9 Oct 2020
What is a 502 bad gateway and how do you fix it?
web hosting

What is a 502 bad gateway and how do you fix it?

5 Oct 2020