Cloud Security

Palo Alto to Acquire Talon, Intensifying Competition in Cloud Data Security 

Technology powerhouse Palo Alto Networks is officially on a billion-dollar shopping spree in the cloud data security space.

Technology powerhouse Palo Alto Networks is officially on a billion-dollar shopping spree in the cloud data security space.

Technology powerhouse Palo Alto Networks is officially on a billion-dollar shopping spree in the cloud data security space.

One week after announcing plans to spend about $400 million to purchase data security posture management startup Dig Security, Palo Alto on Monday said it plans to buy enterprise browser play Talon Cyber Security in a deal pegged at $625 million.

The acquisitions signal an aggressive push by Palo Alto to match rival Cisco’s shopping spree and beef up its own product offerings in the enterprise cloud data security space.

Talon, a hot-shot Israeli startup selling a secure browser to enterprise customers, raised about $125 million in multiple funding rounds and has gained traction with software that helps businesses deal with risks from unmanaged devices.

According to Palo Alto vice president Anand Oswal, the plan is to bake Talon’s enterprise browser technology into its Secure Access Service Edge (SASE) suite to secure all devices – managed and unmanaged – with complete zero-trust principles.

Oswal said current approaches to securing unmanaged devices are ineffective and are forcing corporate defenders to either ignore security entirely in favor of flexibility and user experience, or to adopt cumbersome technologies that add operational complexities.

With the Talon purchase, he said Palo Alto gets new technology to enable unmanaged devices to securely access enterprise apps and protect them from malware, phishing and keylogger-type attacks.

Oswal said the new technology also lets Palo Alto provide data security controls natively in the browser to prevent data exfiltration and software that makes it easy for IT administrators to onboard new users and have a single sign-on (SSO) integration framework on all devices and operating systems.

Advertisement. Scroll to continue reading.

Palo Alto’s intent to buy into the enterprise browser space comes as Microsoft jostled its way into the market with a new product promising a native browsing experience tightly integrated with enterprise-grade security and manageability features.

Redmond’s strategic move came with an automatic rollout to billions of customers signing in with Entra ID (formerly Azure Active Directory) and is being viewed as disruptive to the startup ecosystem where hundreds of millions have been wagered on companies in the enterprise browser category.

Related: Palo Alto Networks to Acquire Cloud Security Start-Up Dig Security

Related: Twistlock Founders Score Whopping $51M Seed Funding for Gutsy

Related: Palo Alto to Acquire Israeli Software Supply Chain Startup

Related: Supply Chain Startup Endor Labs Scores Massive $70M Series A Round

Related: Palo Alto Networks Buys Bridgecrew in ‘Shift Left’ Cloud Security Push

Related Content

Cloud Security

Israeli startup LayerX Security banks $25 million in new financing as investors continue to pour money into secure web browsing technologies.

Cloud Security

Despite competitive pressures from industry behemoths like Microsoft and Google, investors are still betting big on startups in the specialized enterprise browser space.

Incident Response

Palo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.

ICS/OT

Palo Alto Networks firewall vulnerability CVE-2024-3400, exploited as a zero-day, impacts a Siemens industrial product.

Malware & Threats

Shadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400.

Malware & Threats

Palo Alto Networks firewall vulnerability CVE-2024-3400 increasingly exploited after PoC code has been released. 

Malware & Threats

Palo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea’s Lazarus. 

Malware & Threats

A state-sponsored threat actor has been exploiting a zero-day in Palo Alto Networks firewalls for the past two weeks.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version