See the full list of Top Cloud Security Solutions
Read user reviews of Palo Alto Networks Redlock
RedLock by Palo Alto Networks is a great choice for organizations look for a compliance and security assurance tool for public cloud workloads, running on Amazon Web Services (AWS), Microsoft Azure and Google Cloud Platform (GCP).
RedLock became part of Palo Alto Networks in late 2018, which will end up yielding numerous benefits for users. There is always concern whenever a company gets acquired about what will happen to technology. Yet in the RedLock case, the publicly stated plan is to integrate it with additional cloud workload protection capabilities from Palo Alto Network’s Evident product line. The end result should be a stronger, broader offering before the end of 2019.
Even before that new integrated product debuts, RedLock is a strong offering that can stand on its own merits. A key differentiator for the platform is the ability to conduct threat investigations across cloud workload deployments to help identify and remediate threats. Machine learning and artificial intelligence in the RedLock platform is also noteworthy, as it helps security professionals to correlate multiple factors to create context for cloud workload security.
RedLock is a cloud workload compliance platform that integrates multiple capabilities to help organizations identify potential risks and misconfiguration that could lead to security and regulatory policy violations.
The platform is able to analyze data on user activity and network traffic taken from the public cloud operators’ APIs and then enriches data with machine learning and threat intelligence feeds to provide organizations with an understanding of what risks are present in their cloud deployments.
The compliance assurance capabilities of the platform identifies when a given cloud workload configuration drifts from the intended policy or compliance requirement. Looking beyond just compliance, RedLock is also able to detect host vulnerabilities in the cloud environments that could also be exposing an organization to risk.
- Compliance monitoring
- User activity monitoring
- Host vulnerability detection
- Network intrusion detection
- Threat hunting capabilities for investigation
- Automatic remediation for misconfigured policies
Compliance monitoring and security enforcement for public cloud workloads.
Contact Palo Alto Networks for pricing
|Solution||Palo Alto Networks Red Lock|
|Use-Cases||Public cloud compliance|
|Key Differentiator||Threat hunting capabilities for investigation|
|Pricing||Contact Palo Alto Networks for pricing|