SANTA CLARA, Calif.
Jan 6, 2014
/PRNewswire/ -- Palo Alto Networks® (NYSE: PANW), today announced it has acquired Morta Security, a Silicon Valley-based cybersecurity company operating in stealth mode since 2012. Financial terms of the acquisition were not disclosed.
The acquisition of Morta Security further cements Palo Alto Networks as the leading provider of next-generation enterprise security. Palo Alto Networks offerings uniquely provide enterprises the ability to safely enable applications and rapidly detect and prevent threats, especially those that use an increasingly sophisticated array of tactics to compromise networks and gain access to valuable intellectual property.
Morta Security brings to Palo Alto Networks a team experienced at protecting national infrastructure as well as technologies that enhance the proven detection and prevention capabilities of the Palo Alto Networks WildFire™ offering, which is already used by more than 2,400 customers.
Advanced Threats Demand Automated and Scalable Approach
- "The Morta team brings additional valuable threat intelligence experience and capabilities to Palo Alto Networks," said Mark McLaughlin, President and CEO of Palo Alto Networks. "The company's technology developments align well with our highly integrated, automated and scalable platform approach and their contributions will translate into additive threat detection and prevention benefits for our customers."
- "Palo Alto Networks has a successful history of disrupting the network security landscape with its unique offerings," said Raj Shah, CEO of Morta Security. "The Morta team is excited to work with the clear leaders in this space and we look forward to joining the company and contributing to future highly innovative technology leadership."
Today's sophisticated attacks increasingly rely on a combination of tactics and threat vectors to penetrate an organization and often remain undetected for extended periods of time while inflicting long-term damage. Most organizations still rely on legacy point technologies that address only specific types of attacks, or phases of the attack. Because of the singular nature of these technologies, they are ill-equipped to detect and prevent today's advanced cyber attacks. And, when they are finally discovered, they typically require significant human incident response efforts. As the volume and sophistication of these attacks continues to grow, throwing more point products and human capital at the challenge is too costly and cumbersome for most organizations.