Palo Alto Networks Acquires CirroSecure

Newest technology offers a unique approach to securing sanctioned SaaS applications
 

The explosion of SaaS-based application services continues to redefine a network perimeter long held sacred amongst security practitioners. Typically labeled “shadow IT”, most of these services are adopted directly by individual users, business teams, or even entire departments. Palo Alto Networks has established a rich history of helping IT organizations secure these higher risk, unsanctioned services by providing superior visibility and control across the network.

 
 

The newest technology addition to the Palo Alto Networks portfolio – acquired from CirroSecure – offers a unique approach to securing these sanctioned SaaS applications.

 
 

But what about extending security into sanctioned, SaaS-based applications from the likes of Box, Dropbox, GitHub, Google, Yammer, or Salesforce? Until now, the tools simply haven’t existed to effectively manage and secure these SaaS applications that by their nature are highly collaborative yet often store some of your most sensitive information. This causes a struggle to manage access privileges, data sharing, and security from both corporate and personal devices. And it leads to inadequate visibility into day-to-day activities and inferior controls to ensure appropriate policy is maintained to reduce or eliminate data security risks.

The newest technology addition to the Palo Alto Networks portfolio – acquired from CirroSecure – offers a unique approach to securing these sanctioned SaaS applications. This functionality includes:

  • Complete visibility across all user, folder and file activity; providing detailed analysis that helps you transition from a position of speculation to one of knowing exactly what’s happening at any given point in time.
  • Deep analytics into day-to-day usage that allows you to quickly determine if there are any DLP or compliance-related policy violations.
  • Granular, context-aware policy control that provides you with the ability to drive real-time enforcement and quarantine of users and data as soon as a violation occurs.
 
 

This exciting technology will be delivered via a new subscription-based service in the second half of 2015, and become an integral part of our overall enterprise security platform to safely enable the use of applications and maintain complete visibility and control so organizations can confidently pursue new technology initiatives.

If you’d like to be updated periodically as we bring this new service to market please complete the following form.