Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Palo Alto to Acquire Israeli Software Supply Chain Startup

Cybersecurity powerhouse Palo Alto Networks on Thursday announced plans to spend $195 million in cash to acquire Israeli startup Cider Security, a deal that adds software supply chain security capabilities to its Prisma Cloud platform.

Cybersecurity powerhouse Palo Alto Networks on Thursday announced plans to spend $195 million in cash to acquire Israeli startup Cider Security, a deal that adds software supply chain security capabilities to its Prisma Cloud platform.

Palo Alto Networks said the transaction will boost its ambitions to have Prisma Cloud provide the industry’s most comprehensive supply chain security solution as part of its code-to-cloud security platform.

For Cider Security, an early-stage startup with roots in Tel Aviv, the deal comes less than a year after its public launch with $38 million in venture capital financing. 

Cider Security was backed by Tiger Global Management, Glilot Capital Partners and Glilot’s early growth fund, Glilot+.

The company’s technology promised tools for security teams to orchestrate and implement end-to-end CI/CD security. 

[ READ: Endor Labs Joins Race to Secure Software Supply Chain ]

“We designed an AppSec platform that allows engineering to continue to move fast, without making compromises on security,” said Cider Security chief executive Guy Flechter. 

“There couldn’t be a better fit for Cider. By scanning and securing the CI/CD pipeline, we can help identify where there may be vulnerabilities in your code. Prisma Cloud will now be the ultimate solution for code to cloud security,” he added.

Advertisement. Scroll to continue reading.

In a note accompanying the disclosure of the acquisition, Palo Alto Networks said it is investing in tools to secure the software supply chain. 

“The stakes are high when it comes to software supply chain security. A single insecure step or misconfigured tool can expose the entire organization,” the company said, positioning its Prisma Cloud platform as “the industry’s most comprehensive supply chain security solution, delivered as part of its code-to-cloud security platform.”

Palo Alto Networks said the proposed acquisition is expected to close during the second quarter of fiscal 2023

Related: AppSec Firm Cider Security Raises $38 Million in VC Funding 

Related: ‘Secrets Sprawl’ Haunts Software Supply Chain Security

Related: Investors Bet on Ox Security to Guard Software Supply Chains

Related: Endor Labs Joins Race to Secure Software Supply Chain

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...