Monday, February 17, 2025
HomeCiscoCisco to Acquire Cloud Networking and Security Startup Isovalent

Cisco to Acquire Cloud Networking and Security Startup Isovalent

Published on

SIEM as a Service

Follow Us on Google News

In a strategic move destined to fortify its dominance in the ever-evolving realm of cloud security, Cisco has officially declared its intent to acquire Isovalent, a trailblazer in open-source cloud-native networking and security. 

This bold acquisition underscores Cisco’s steadfast commitment to empowering organizations of varying sizes to navigate the intricacies of multi-cloud environments with unparalleled security and efficiency.

The union of Cisco’s industry-leading security prowess with Isovalent’s groundbreaking open-source technologies, including eBPF and Cilium, promises to reshape how organizations approach and manage cyber risks across diverse cloud infrastructures. 

This formidable synergy is set to propel the Cisco Security Cloud vision—an AI-driven, integrated platform designed to provide advanced protection against emerging threats at every layer of the cloud ecosystem.

Envisioning a Secure Multi-Cloud Future

Imagine a future where security seamlessly envelops applications, virtual machines, containers, and cloud assets across distributed environments. 

Jeetu Patel, Executive Vice President and General Manager of Security and Collaboration at Cisco, anticipates this reality through the combined might of Cisco and Isovalent. 

Incorporating Cilium’s power will birth a unique multi-cloud security and networking capability, simplifying and accelerating digital transformation journeys.

Isovalent’s proficiency in eBPF, a revolutionary technology offering unprecedented visibility into operating system internals, has led to the development of Cilium—a preferred solution for cloud-native networking and security. 

Recent innovations, such as Cilium Mesh and Tetragon, enhance the acquisition’s comprehensiveness, providing simplified hybrid cloud connectivity and eBPF-based runtime security enforcement.

A Commitment to Open Source

Cisco’s unwavering commitment to open source is showcased through its promise to nurture, invest in, and contribute to the eBPF and Cilium communities. 

Stephen Augustus, Head of Open Source at Cisco, highlights the collaboration’s potential to accelerate innovation, positioning the Cisco Security Cloud platform as the definitive answer to evolving customer needs.

This acquisition reinforces Cisco’s position within the Cloud Native Computing Foundation and eBPF Foundation, establishing its role as a cornerstone of the open-source ecosystem. 

The collaboration between these industry giants promises to unleash the full potential of eBPF technology, ensuring the safeguarding of workloads irrespective of their cloud residency.

The anticipated closing of the acquisition in the third quarter of fiscal year 2024 will witness the Isovalent team seamlessly integrating into Cisco’s Security Business Group.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...

Beware! Fake Outlook Support Calls Leading to Ransomware Attacks

Telekom Security has recently uncovered a significant vishing (voice phishing) campaign targeting individuals and...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Stealthy Malware in WordPress Sites Enables Remote Code Execution by Hackers

Security researchers have uncovered sophisticated malware targeting WordPress websites, leveraging hidden backdoors to enable...

Xerox Printer Vulnerability Exposes Authentication Data Via LDAP and SMB

A critical security vulnerability in Xerox’s Versalink C7025 Multifunction Printer (MFP) has been uncovered,...

New XCSSET Malware Targets macOS Users Through Infected Xcode Projects

Microsoft Threat Intelligence has identified a new variant of the XCSSET macOS malware, marking...