Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Zscaler to Acquire MDR Specialist Red Canary

Posted on May 27, 2025May 27, 2025 By CWS

Zscaler on Tuesday signaled an enormous push into the security-operations market with the announcement of plans to purchase Denver-based managed detection and response (MDR) specialist Purple Canary.

Monetary phrases of the transaction weren’t launched.

The deal, which is anticipated to shut in August, provides expertise for round the clock human monitoring and incident response on prime of Zscaler’s zero-trust cloud.

Purple Canary raised greater than $135 million throughout a number of funding rounds, together with an $81 million Sequence C in 2021. The corporate counts Summit Companions, Noro-Moseley Companions, Entry Enterprise Companions and Kyrus Tech amongst its enterprise backers.  

For Zscaler, the Purple Canary deal follows final 12 months’s $350 million acquisition of Israeli danger administration platform play Avalor and added investments into its Risk360 risk-quantification dashboard and framework. 

Zscaler already ingests an eye-popping 500 billion transactions a day from its secure-web-gateway and zero-trust-network-access companies and the thought is so as to add Purple Canary capabilities to triage that telemetry, chase down alerts and, when crucial, put arms on keyboards to remediate dwell incidents. 

In a observe saying the acquisition plans, Zscaler chief govt Jay Chaudhry stated Purple Canary gives a “pure growth” of his firm’s foray into managed detection and response and risk intelligence.

“By integrating Purple Canary with Zscaler, we’ll ship to our clients the facility of a totally built-in Zero Belief platform and AI-powered safety operations,” he stated.Commercial. Scroll to proceed studying.

Associated: Purple Canary Raises $81 Million to Develop Safety Operations Enterprise

Associated: Safety Operations Agency Purple Canary Raises $34 Million

Associated: Zscaler to Purchase Community Segmentation Tech Startup Airgap Networks

Associated: Zscaler Acquires Avalor for $350 Million

Associated: Zscaler to Purchase Israeli Startup Canonic Safety

Security Week News Tags:Acquire, Canary, MDR, Red, Specialist, Zscaler

Post navigation

Previous Post: How to Stop Clickjacking Attacks
Next Post: How to Track or Erase a Lost or Stolen Phone

Related Posts

SAP Patches Critical Flaws That Could Allow Remote Code Execution, Full System Takeover Security Week News
Choosing a Clear Direction in the Face of Growing Cybersecurity Demands Security Week News
Exploited CrushFTP Zero-Day Provides Admin Access to Servers Security Week News
Vulnerabilities Expose Helmholz Industrial Routers to Hacking Security Week News
US Calls Reported Threats by Pro-Iran Hackers to Release Trump-Tied Material a ‘Smear Campaign’ Security Week News
SAP Patches Another Critical NetWeaver Vulnerability Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • 20 Best SNMP Monitoring Tools in 2025
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • 20 Best SNMP Monitoring Tools in 2025
  • Microsoft Probes Leak in Early Alert System as Chinese Hackers Exploit SharePoint Vulnerabilities
  • VOIP-Based Botnet Attacking Routers Configured With Default Password
  • How to Report a Stolen Identity
  • Web-to-App Funnels: Pros And Cons

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News