Welcome Redlock - Advanced security analytics for multi-cloud

On October 3, 2018, we announced the intent to acquire RedLock®, a public cloud security analytics company, which will extend our public cloud security leadership.

Multi-cloud security analytics

The acquisition of RedLock will add critical security analytics capabilities across multi-cloud environments to our extensive cloud security offering. The security analytics capability utilizes an innovative AI-driven approach that correlates disparate security data sets. RedLock provides comprehensive visibility, threat detection and rapid response across an organization’s entire public cloud environment.

Continue reading

Cymulate Named a Gartner “Cool Vendor” in Application and Data Security

RISHON LEZION, Israel--()--Cymulate, the leading provider of a SaaS-based breach & attack simulation (BAS) platform, was named a "Cool Vendor" in Gartner’s May 2018 “Cool Vendors in Application and Data Security” report.

Operating for less than two years with more than 100 customers worldwide, Cymulate’s unique breach & attack simulation (BAS) platform assesses customers’ security posture from an attacker’s perspective using actual attack methods. By exposing hidden vulnerabilities and offering actionable insights, Cymulate helps to identify and resolve security gaps before it is too late. Cymulate provides the industry’ only cloud-based BAS platform.

Continue reading

Kenna Security Named a Gartner 2018 Cool Vendor in Security Operations and Vulnerability Management

SAN FRANCISCO, June 04, 2018 (GLOBE NEWSWIRE) -- Kenna Security, a leader in predictive cyber risk, today announced it has been selected as one of Gartner’s 2018 Cool Vendors in the Cool Vendors in Security Operations and Vulnerability Management report.

You can download a complimentary copy of the Cool Vendor report here.

“We consider Kenna Security’s inclusion in the Cool Vendor report by Gartner confirmation of our innovative, risk-based approach to proactively address enterprise security,” said Karim Toubba, CEO of Kenna Security. “Being a cyber security professional in today’s environment is challenging – it’s nearly impossible to remediate every vulnerability and ensure 100 percent coverage of an enterprise’s assets. Our predictive approach combines cutting-edge prioritization models with machine learning to deliver huge improvements in effectiveness and efficiency over common vulnerability remediation strategies.”

Continue reading

Palo Alto Networks to acquire RedLock for $173M to beef up cloud security

Palo Alto Networks launched in 2005 in the age of firewalls. As we all know by now, the enterprise expanded beyond the cozy confines of a firewall long ago and vendors like Palo Alto have moved to securing data in the cloud now too. To that end, the company announced its intent to pay $173 million for RedLocktoday, an early-stage startup that helps companies make sure their cloud instances are locked down and secure.

The cloud vendors take responsibility for securing their own infrastructure, and for the most part the major vendors have done a decent job. What they can’t do is save their customers from themselves and that’s where a company like RedLock comes in.

Continue reading


Observer Solutions was founded by business leaders who saw that the fog of cyber security had become so dense that we built a research and consulting team to cut through to provide absolute clarity on the as is situation with clear plain English recommendations on steps to enhance.
Our mantra has become two-fold: Simplify and Automate.



  • +44 (0) 203 697 1364
  • +44 (0) 7767 766653
  • This email address is being protected from spambots. You need JavaScript enabled to view it.

© 2018 Observer Solutions. All Rights Reserved. Created & Designed by Gekkota     | Privacy Policy | Sitemap |  

Account Management

  • Directory Service
  • Identity Governance and Administration
  • Privileged Account Management
  • User Authentication

Malware Defence

  • Endpoint Detection and Response
  • Endpoint Protection
  • Specialized Threat Analysis and Protection
  • Unified Threat Management

Secure Network

  • IPS
  • NAC
  • Network Behaviour Monitoring
  • Network Firewall
  • Network Security Policy Management
  • Secure Remote Access
  • Threat Intelligence

Secure Configuration

  • MDM
  • Security Configuration Management

Data Security

  • Active Breach Detection
  • Database Activity Monitoring
  • DLP
  • Email Security Gateway
  • File Integrity Monitoring
  • Web Security Gateway

Incident Management

  • Cybersecurity Management
  • Incident Response
  • Security Orchestration and Automation
  • SIEM
  • Ticketing System

Security Assessment

  • Database Vulnerability Assessment
  • Policy and Risk Management
  • Vulnerability Scanner
  • Web Application Vulnerability Scanner

Physical Security

  • Physical Access Control
  • Security Cameras

Secure Applications

  • WAP
  • Web Application Security Scanner

This site uses cookies for a better user experience. By continuing on it you accept our privacy policy terms.

Learn more