Palo Alto will spent nearly $670 million buying Talon and Dig to broaden its cloud security portfolio and protect unmanaged devices without affecting usability. Purchasing Tel Aviv, Israel-based Talon Cyber Security for $435 million will help safeguard the 36% of the workforce that's independent.
Palo Alto Networks announced its second acquisition in a week, scooping up the 2022 winner of RSA Conference's prestigious Innovation Sandbox contest. The proposed buy of Talon Cyber Security will enable users to securely access business applications from any device, including noncorporate devices.
Fortinet plans to shift its R&D and go-to-market investments to the faster-growing SASE and security operations segments as growth slows in the network security market. The company expects "more modest growth" in the near term given that 70% of Fortinet's billings today come from network hardware.
A fireside chat between Jaye Tillson, Field CTO HPE Aruba Networking SSE & co-founder of the SSE Forum, Board Member of the Cloud Security Alliance and the facilitator Bevan Boote, in which you will hear about the key learnings and advice from an early adopter of SSE, SASE, & Zero Trust. Jaye will share his input on...
A late-stage SASE startup led by a serial entrepreneur hauled in a massive equity investment to address the feature and capability needs of large enterprises. The $238 million in funding will allow Cato Networks to more tightly align CASB and DLP with SASE to safeguard cloud apps and sensitive data.
Cisco's proposed $28 billion buy of Splunk allows businesses to move from threat detection and response to threat prediction and prevention by combining XDR and SIEM. The deal brings together Cisco's newly released XDR platform with Splunk's long-standing SIEM technology.
Netskope purchased a French digital experience management startup to monitor and proactively remediate performance issues across both SD-WAN and SSE. The deal will bring network and application performance visibility to user devices as well as hybrid, SaaS and cloud applications.
Secure access service edge has evolved significantly over the past four years, transforming from a relatively new idea into a well-defined and widely discussed framework for network and security architecture. NetWitness focuses on integration rather than offering a SASE product.
A SASE architecture is the future of security, combining networking and security functions in the cloud to connect users to the applications and data they need, wherever it is, from wherever they are.
Palo Alto Networks edged out Versa Networks, Cato Networks and firewall rival Fortinet for the top spot in Forrester's first-ever secure access service edge rankings. Leading providers have over the past 18 months built or bought both the networking and security pieces of SASE, Forrester found.
Perimeter 81 will be sold to Check Point for $490 million, but it had to slash its valuation by more than half to seal the deal. Check Point said its proposed buy of New York-based Perimeter 81 will fuel the adoption of secure access across remote users, sites, cloud, data centers and the internet.
A delay in finalizing enterprise deals and a shorter average contract duration have forced Fortinet to lower its sales forecast going forward. The Silicon Valley-based platform security vendor said average contract length shortened from 29.5 months to 28 months in the fiscal quarter ended June 30.
New CEO Scott Harrell wants Infoblox to evolve from classic networking DNS management to bringing networking and security together in ways that optimize protection and efficiency. DNS serves as a building block for security since it is universal across large client devices and small mobile phones.
SMB cybersecurity platform Coro purchased an early-stage Israeli startup to bring network connectivity to its SASE offering for midmarket organizations. Coro said its buy of Jerusalem-based Privatise will give Coro clients a secure way to connect, manage and filter out malicious content.
Today’s organizations must ensure their employees are consistently protected and have secure access to the resources they require to do their jobs, regardless of where they work.
Unfortunately, traditional security models reliant on siloed on-premises web proxy appliances create inconsistent security, poor user...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing careersinfosecurity.co.uk, you agree to our use of cookies.