Cisco Boosts Cloud Security Capabilities With CloudLock BuyCisco Boosts Cloud Security Capabilities With CloudLock Buy
Network giant will purchase the Massachusetts-based provider of cloud access security broker technology for $293 million.
June 28, 2016
Cisco will acquire privately held CloudLock Inc. for $293 million in a transaction designed to bolster the network giant’s capabilities in the cloud security space.
Under terms of the deal announced Tuesday, CloudLock’s operations will be folded into Cisco’s Networking and Security Business group once the deal is approved sometime in the first quarter of fiscal year 2017, Cisco said in a statement.
The Waltham, Ma-based CloudLock is a provider of cloud access security broker (CASB) technology designed to help enterprises protect applications and data in the cloud. It’s platform acts as an access and control point for enterprise users attempting to access cloud applications such as Salesforce, Microsoft Office 365, Google Apps, Dropbox, Box and other apps.
CloudLock’s technology allows security administrators to set and enforce policies for enterprise access to data in such applications. It also allows them to discover and monitor any unsanctioned third party cloud applications that employees might be using without the knowledge or blessing of the IT organization.
Gartner defines CASBs as technology that gives security administrators an essential control point for cloud security, visibility and compliance. The analyst firm predicts that by 2020, about 85 percent of large enterprises will use CASBs to broker access to cloud services—a substantial increase from the less than five percent of large organizations that were using the technology as the end of last year.
Much of the demand for the technology is being driven by the growing use of Software-as-a-Service (Saas) applications, such as Salesforce, Google Apps and Office 365. Many of these applications offer administrators little,of the visibility and control available with on-premise applications and services. Cloud access security brokers address that shortcoming, Gartner said in a report released earlier this year.
The planned CloudLock acquisition makes sense for Cisco, says Pete Lindstrom, an analyst with IDC. CASBs are a hot technology and are quickly becoming a fundamental requirement for enterprises, Lindstrom says. “This is a great capability,” he said. “It is essentially application layer access control and monitoring.”
Importantly, CASB’s offer enterprises a way to monitor security in the cloud independently from what the hosted application provider might offer natively with the service, he says. “So you get the separation of responsibilities that auditors like.”
CASBs also give administrators the ability to monitor users and aggregate reports in one place from across all of their cloud applications.
Cisco’s acquisition is similar to moves by other vendors in recent months, Lindstrom said. As an example, he pointed to Microsoft purchase of CASB technology vendor Adallom for $250 million last year. Another example is Blue Coat, which acquired Perspecsys Inc. last July. Symantec has since purchased Blue Coat.
In a statement, Cisco’s vice president of corporate development Rob Salvagno said the purchase would help Cisco build on its Security Everywhere strategy. "CloudLock brings a unique cloud-native, platform and API-based approach to cloud security which allows them to build powerful security solutions that are easy to deploy and simple to manage,” he said.
About the Author(s)
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
How Enterprises Are Managing Application Security Risks in a Heightened Threat Environment