Site icon Aragon Research

Palo Alto Networks Closes on Talon Cyber Security—Bringing Security to BYOD

Palo Alto Networks Acquires Talon Cyber Security

By: Craig Kennedy

Palo Alto Networks Closes on Talon Cyber Security

Earlier today, Palo Alto Networks announced it had completed the acquisition of Talon Cyber Security, an Israeli company that offers secure browsing technology for enterprise customers. The acquisition, initially announced in November and reportedly worth $625 million, will provide Palo Alto Network Prisma customers enhanced security for unmanaged devices.

Securing Unmanaged Devices—Safety from Malware, Phishing, and Data Breaches

Browsers on personal phones, tablets, and laptops are increasingly being used to access corporate assets, and these devices often lack robust security measures, making them a target for cyber threats and a conduit to corporate assets. Talon’s technology provides secure access to web applications, regardless of the device type or location, ensuring that even unmanaged devices can safely access corporate resources. This technology significantly reduces the risk of data breaches by preventing sensitive data from leaving the confines of the browser.

A Secure Alternative to VDI and DaaS

Virtual Desktop Infrastructure (VDI) and Desktop-as-a-Service (DaaS) technologies gained in popularity with the shift towards remote work that involved accessing sensitive data from various devices and locations. These solutions enhanced the privacy and security of sensitive corporate data when accessing from unmanaged devices but came with additional costs, operational complexity, and a poor user experience.

Talon’s technology solves these security concerns by providing secure, browser-based access to applications. This eliminates the need to store sensitive data on the device itself, reducing the risk of data leakage. Furthermore, it allows for consistent security policies to be applied across all devices, whether managed or unmanaged.

Helping to Achieve Zero Trust

In a Zero Trust model, every access request is fully authenticated, authorized, and encrypted before granting access, regardless of the user’s location, device, or network.

By implementing secure browser-based access to applications, Talon’s technology ensures that every access request is thoroughly vetted. This eliminates the implicit trust often associated with internal networks, thereby enhancing overall security. The integration of Talon Cyber Security enterprise browser with Palo Alto Networks’ Secure Access Service Edge (SASE) solution extends protection to personal devices and helps to achieve zero trust, even on unmanaged personal devices.

Bottom Line

The acquisition of Talon Cyber Security will strengthen and enhance Palo Alto Networks Prisma SASE product offering, providing a zero-trust solution for all devices, whether managed or unmanaged.

 


 

Get Ready for 2024 with Aragon’s 2023 Q1 Research Agenda!

Wednesday, January 17th, 2024 at 10 AM PT | 1 PM ET

 

Aragon Research’s 2024 Q1 Research Agenda

Aragon Research provides the strategic insights and advice you need to help your business navigate disruption and outperform your goals. Our research is designed to help you understand the technologies that will impact your business–using a number of trusted research methodologies that have been proven to help organizations like yours get to business outcomes faster.

On Wednesday, January 17th, 2024, join Aragon Research CEO and Lead Analyst, Jim Lundy for a complimentary webinar as they walk you through Aragon’s Q1 2024 research agenda.

This webinar will cover:

Register Here

 


 

 

Blog 1: Introducing the Digital Operations Blog Series

Blog 2: Digital Operations: Keeping Your Infrastructure Secure

Blog 3: Digital Operations: Cloud Computing

Blog 4: Cybersecurity Attacks Have Been Silently Escalating

Blog 5: Automation—The Key to Success in Today’s Digital World

Blog 6: Infrastructure—Making the Right Choices in a Digital World

Blog 7: Open-Source Software—Is Your Supply Chain at Risk?

Blog 8: IBM AIU—A System on a Chip Designed For AI

Blog 9: IBM Quantum: The Osprey Is Here

Blog 10: The Persistence of Log4j

Blog 11: AWS re:Invent 2022—Focus on Zero-ETL for AWS

Blog 12: AWS re:Invent 2022—The Customer Is Always Right

Blog 13: How Good is the New ChatGPT?

Blog 14: The U.S. Department of Defense Embraces Multi-Cloud

Blog 15: 2022 Digital Operations—The Year in Review

Blog 16: Lucky Number 13 for Intel—Intel Is Back on Top

Blog 17: Quantum Decryption—The Holy Grail for Cybercriminals

Blog 18: Microsoft and OpenAI—Intelligent Partnership

Blog 19: ChatGPT—The First One Is Free

Blog 20: Bing and ChatGPT—Your Co-Pilot When Searching the Web

Blog 21: ESXiArgs—Ransomware Attack on VMware

Blog 22: The Cost of Supply Chain Security—$250M in Sales

Blog 23: OpenAI Delivers on APIs—Accelerating the Adoption of ChatGPT

Blog 24: OpenAI Delivers on Plugins—Is ChatGPT The New Generative Content Platform?

Blog 25: Microsoft Security Copilot—Defending the Enterprise at the Speed of AI

Blog 26: Operation Cookie Monster Takes a Huge Bite Out of The Dark Web

Blog 27: AWS Bedrock—Amazon’s Generative AI Launch

Blog 28: Google Cloud Security AI Workbench – Conversational Security

Blog 29: World Password Day – Is This the Last Anniversary

Blog 30: Intel Partners to Enter the Generative AI Race—Aurora genAI

Blog 31: Charlotte AI – CrowdStrike Enters the Generative AI Cybersecurity Race

Blog 32: NICE Catches the Generative AI Wave

Blog 33: AMD Instinct MI300X—A New Challenger to Nvidia

Blog 34: Storm-0558—Chinese Cyber Attack on US Government Organizations

Blog 35: Network Resilience Coalition—Making the Network Safer

Blog 36: Frontier Model Forum—Power Players Unite to Make AI Safer

Blog 37: Intel Is Back in the Foundry Business—Entering the Angstrom Era

Blog 38: Check Point Acquires Perimeter 81—Securing Remote Access

Blog 39: PSA—Akira Ransomware Targeting Cisco VPNs

Blog 40: Volt Typhoon: A Chinese Cyberwar Threat to Critical US Infrastructure

Exit mobile version