dcsimg

RedLock by Palo Alto Networks: Service Overview and Insight

SHARE
Share it on Twitter  
Share it on Facebook  
Share it on Linked in  
Email  

See the full list of Top Cloud Security Solutions

Read user reviews of Palo Alto Networks Redlock

Bottom Line:

RedLock by Palo Alto Networks is a great choice for organizations look for a compliance and security assurance tool for public cloud workloads, running on Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP).

RedLock became part of Palo Alto Networks in late 2018, which will end up yielding numerous benefits for users. There is always concern whenever a company gets acquired about what will happen to technology. Yet in the RedLock case, the publicly stated plan is to integrate it with additional cloud workload protection capabilities from Palo Alto Network's Evident product line. The end result should be a stronger, broader offering before the end of 2019.

Even before that new integrated product debuts, RedLock is a strong offering that can stand on its own merits. A key differentiator for the platform is the ability to conduct threat investigations across cloud workload deployments to help identify and remediate threats. Machine learning and artificial intelligence in the RedLock platform is also noteworthy, as it helps security professionals to correlate multiple factors to create context for cloud workload security.

Service Description:

RedLock is a cloud workload compliance platform that integrates multiple capabilities to help organizations identify potential risks and misconfiguration that could lead to security and regulatory policy violations.

The platform is able to analyze data on user activity and network traffic taken from the public cloud operators' APIs and then enriches data with machine learning and threat intelligence feeds to provide organizations with an understanding of what risks are present in their cloud deployments.

The compliance assurance capabilities of the platform identifies when a given cloud workload configuration drifts from the intended policy or compliance requirement. Looking beyond just compliance, RedLock is also able to detect host vulnerabilities in the cloud environments that could also be exposing an organization to risk.

Features:

  • Compliance monitoring
  • User activity monitoring
  • Host vulnerability detection
  • Network intrusion detection
  • Threat hunting capabilities for investigation
  • Automatic remediation for misconfigured policies

Delivery:

Software-as-a-Service

Use Cases:

Compliance monitoring and security enforcement for public cloud workloads.

Pricing:

Contact Palo Alto Networks for pricing

Solution

Palo Alto Networks Red Lock

Use-Cases

Public cloud compliance

Features

Cloud security 

Compliance monitoring

Key Differentiator

Threat hunting capabilities for investigation

Pricing

Contact Palo Alto Networks for pricing



NewsletterDATAMATION DAILY NEWSLETTER

SUBSCRIBE TO OUR IT MANAGEMENT NEWSLETTER