
Zscaler to acquire Red Canary to boost AI-powered security ops
Zscaler stated that Red Canary's decade-long expertise in security operations enables customers to investigate threats up to ten times faster with 99.6% accuracy, aided by streamlined workflows and automated remediation. This acquisition will bring Red Canary's threat detection and response across endpoints, identity, network, and cloud workloads together with Zscaler's Zero Trust Exchange Platform and Data Fabric.
The companies said the combination will form a unified Security Operations Center with agentic AI that fuses AI-driven workflows and human expertise. According to Zscaler, the move is intended to help security teams improve the speed and efficiency in detecting, triaging, investigating, and responding to threats, while aiming to reduce missed signals and incomplete threat analysis that can leave organisations vulnerable.
Jay Chaudhry, CEO, Chairman, and Founder of Zscaler, said: "With our innovative AI-powered risk management services like Risk360 and the acquired data fabric technology from Avalor, we are disrupting legacy security operations just like we did with our Zero Trust ExchangeTM platform. The proposed acquisition of Red Canary is a natural expansion of our capabilities into managed detection and response and threat intelligence to accelerate our vision of AI-powered SOC of the future. By integrating Red Canary with Zscaler, we will deliver to our customers the power of a fully integrated Zero Trust platform and AI-powered security operations."
Zscaler reported that it provides protection to nearly 45% of the Fortune 500, running a cloud security platform that processes more than 500 billion daily transactions. Over its 15-year history, the company has developed AI-driven solutions leveraging a comprehensive dataset, such as Zscaler Digital Experience (ZDX) and Zscaler Exposure Management.
Red Canary has been recognised for its contributions to managed detection and response, being named a Leader in the Forrester Wave: Managed Detection and Response for the third year running and featured in the Gartner Market Guide for MDR for the past seven years. Within security operations centres, Red Canary's technology helps automate remediation workflows, improving efficiency in response processes.
Zscaler described the transaction as uniquely positioned to address operational pain points linked to missed signals and increased vulnerability from undetected threats. The companies expect that their combined platforms and expertise will provide organisations with the tools to address current cyber security challenges more confidently and with precise response capabilities.
Brian Beyer, CEO of Red Canary, commented: "For over 10 years, we've protected our customers by combining high-fidelity signals with agentic AI, behavioral analytics, and global threat intelligence—delivering fast, accurate, and high-quality threat detection and response. As part of Zscaler, we will elevate how IT and security teams address the rapidly shifting threat landscape with the strength of our combined technology and expertise. Zscaler's global scale and reach provide the resources and granular data needed to fuel advanced AI, threat intelligence, and detection engineering, giving us a broader view of adversary behavior while enabling faster innovation across the board. Both companies share a relentless commitment to quality, execution, and delivering exceptional outcomes for our customers."
The completion of the acquisition remains subject to customary closing conditions and regulatory approvals. The companies anticipate closing the transaction in August 2025.
Hashtags

Try Our AI Features
Explore what Daily8 AI can do for you:
Comments
No comments yet...
Related Articles


Techday NZ
12-06-2025
- Techday NZ
Red Canary deploys AI agents to slash security investigation times
Red Canary has announced the introduction of a suite of AI agents designed to perform tier 2 security investigations at the pace and calibre of experienced analysts. These AI agents have already conducted over 2.5 million investigations, reportedly reducing the average investigation time by 90%. The agents are trained on a decade's worth of operational data and provide contextual gathering, alert enrichment, and recommended actions for identified threats, with a stated aim to lessen alert noise and assist security teams in managing evolving threats without increased complexity or risk. Reducing manual security tasks The AI agents are described as specialists across every phase of detection, investigation, and response. They cover roles including security operations centre (SOC) analyst, detection engineering, threat intelligence, and user analysis, automating many procedures traditionally undertaken by security experts. For organisations, this means the agents automate both Tier 1 and Tier 2 analyst tasks in various environments such as cloud, identity, Security Information and Event Management (SIEM), and endpoint systems. According to Red Canary, this leads to faster root cause analysis and remediation of security incidents. In addition, a threat intelligence agent compares threats against known profiles, identifying new trends and aiding intelligence operations. Impact and efficiency Red Canary states that, by automating analyst-level workflows, customers have reduced investigation times from over 20 minutes to under three minutes on average, with the company citing a 99.6% customer-validated true positive rate. The system is built to be enterprise-grade, with training on 10 years of real-world data and with continuous oversight by security operators to ensure consistency and reliability. "Several years ago, we introduced automation to replace repetitive Tier 1 work," said Brian Beyer, CEO and Co-founder of Red Canary. "Now, by combining the best of agentic AI with AI agents that are equipped with years of frontline experience, we're taking the next leap—accelerating Tier 2 investigations with the speed of automation and the judgment of experienced security analysts. This shift allows every Red Canary detection engineer to focus on Tier 3-level analysis, delivering deeper insights and stronger outcomes for our customers." Practical use cases Red Canary offered specific examples to illustrate the value of the AI agents. In one scenario, a user behaviour analysis agent flagged an anomalous Salesforce login, missed by other tools. A reputation analysis agent added context by identifying the login as originating from a high-risk IP address. Red Canary's team validated the threat and quickly alerted the customer, allowing for immediate password reset and containment within minutes. Another example involved a compromised account detected through alert enrichment and user behaviour analysis. These agents identified a suspicious application and proxy activity from an unfamiliar ISP and geography. A Red Canary detection engineer confirmed that a user's access token had been compromised and notified the customer's security operations team for swift response. Scope of agent capabilities The suite currently includes agents specialised for specific systems, including Microsoft Defender for Endpoint, Crowdstrike Falcon Identity Protection, AWS Guardduty, and Microsoft Sentinel. These agents are designed to deliver consistent procedures for their respective environments. The response and remediation agent offers concrete steps for both addressing current incidents and hardening systems to reduce future risk, while the user baselining and analysis agent highlights deviations in user activity by comparing real-time behaviour to historical patterns. Red Canary underscores that its agents are not fully autonomous decision-makers; instead, their outputs are subject to the oversight of experienced detection engineers, aiming to balance automation, reliability, and human judgement. This development represents an ongoing trend in the security sector towards applying artificial intelligence to reduce manual workloads, lower incident response times, and support strained security teams. According to Red Canary, its focus remains on reducing noise, accelerating triage, and providing expert analysis for each threat faced by its clients.


Techday NZ
29-05-2025
- Techday NZ
Zscaler to acquire Red Canary to boost AI-powered security ops
Zscaler has agreed to acquire Managed Detection and Response provider Red Canary as part of an expansion of its AI-powered security operations capabilities. Zscaler stated that Red Canary's decade-long expertise in security operations enables customers to investigate threats up to ten times faster with 99.6% accuracy, aided by streamlined workflows and automated remediation. This acquisition will bring Red Canary's threat detection and response across endpoints, identity, network, and cloud workloads together with Zscaler's Zero Trust Exchange Platform and Data Fabric. The companies said the combination will form a unified Security Operations Center with agentic AI that fuses AI-driven workflows and human expertise. According to Zscaler, the move is intended to help security teams improve the speed and efficiency in detecting, triaging, investigating, and responding to threats, while aiming to reduce missed signals and incomplete threat analysis that can leave organisations vulnerable. Jay Chaudhry, CEO, Chairman, and Founder of Zscaler, said: "With our innovative AI-powered risk management services like Risk360 and the acquired data fabric technology from Avalor, we are disrupting legacy security operations just like we did with our Zero Trust ExchangeTM platform. The proposed acquisition of Red Canary is a natural expansion of our capabilities into managed detection and response and threat intelligence to accelerate our vision of AI-powered SOC of the future. By integrating Red Canary with Zscaler, we will deliver to our customers the power of a fully integrated Zero Trust platform and AI-powered security operations." Zscaler reported that it provides protection to nearly 45% of the Fortune 500, running a cloud security platform that processes more than 500 billion daily transactions. Over its 15-year history, the company has developed AI-driven solutions leveraging a comprehensive dataset, such as Zscaler Digital Experience (ZDX) and Zscaler Exposure Management. Red Canary has been recognised for its contributions to managed detection and response, being named a Leader in the Forrester Wave: Managed Detection and Response for the third year running and featured in the Gartner Market Guide for MDR for the past seven years. Within security operations centres, Red Canary's technology helps automate remediation workflows, improving efficiency in response processes. Zscaler described the transaction as uniquely positioned to address operational pain points linked to missed signals and increased vulnerability from undetected threats. The companies expect that their combined platforms and expertise will provide organisations with the tools to address current cyber security challenges more confidently and with precise response capabilities. Brian Beyer, CEO of Red Canary, commented: "For over 10 years, we've protected our customers by combining high-fidelity signals with agentic AI, behavioral analytics, and global threat intelligence—delivering fast, accurate, and high-quality threat detection and response. As part of Zscaler, we will elevate how IT and security teams address the rapidly shifting threat landscape with the strength of our combined technology and expertise. Zscaler's global scale and reach provide the resources and granular data needed to fuel advanced AI, threat intelligence, and detection engineering, giving us a broader view of adversary behavior while enabling faster innovation across the board. Both companies share a relentless commitment to quality, execution, and delivering exceptional outcomes for our customers." The completion of the acquisition remains subject to customary closing conditions and regulatory approvals. The companies anticipate closing the transaction in August 2025.


Techday NZ
30-04-2025
- Techday NZ
Sonatype updates Repository Firewall to target open-source malware
Sonatype has announced significant updates to its Repository Firewall, designed to enhance proactive malware protection throughout the software development lifecycle for enterprises. The enhancements are designed to help development, security, and data science teams block known and suspected malicious components at an early stage. The approach reduces the need for rework, prevents potential security incidents, and ensures consistent enforcement of policies across traditional, containerised, and artificial intelligence (AI)/machine learning (ML) environments. Malicious open-source packages represent a particular risk within the industry, as they often bypass traditional security solutions. These packages, which Sonatype refers to as open source malware, tend to evade detection by standard perimeter tools and can enter development environments before software composition analysis tools are activated. Sonatype's Repository Firewall identifies and blocks these malicious packages before they are downloaded, minimising exposure and protecting every entry point for open source and third-party components. As part of the new features, Sonatype Repository Firewall now integrates with Zscaler Internet Access (ZIA). This expansion delivers open source software intelligence and protection to the network perimeter. The combination of Repository Firewall and Zscaler is designed to prevent high-risk open source components from entering the development pipeline, giving developers increased confidence as risky elements are filtered out early. The integration aims to address the challenge of shadow downloads, which Sonatype defines as open-source components downloaded directly from public repositories onto developer machines, thereby circumventing internal controls. According to Sonatype's data, there has been a 32.8% rise in shadow downloads throughout 2024, illustrating the expanding risk facing organisations. By enforcing security measures both at the perimeter and within developer processes, the integration with Zscaler delivers what is described as end-to-end protection against open-source malware in DevSecOps environments. Tyler Warden, Senior Vice President of Product at Sonatype, stated, "Enterprises are doubling down on zero trust strategies, and that must include open source software and AI governance. By combining ZIA with Sonatype's intelligence-driven policy-based blocking, teams can proactively quarantine risky components at the point of ingestion, reducing attack surface, manual effort, and remediation costs — while increasing coverage and strengthening governance." The Repository Firewall now also includes support for Docker registries, allowing organisations to extend malware and vulnerability protection to container images alongside traditional package formats. This ensures consistent security and compliance across various deployment methods, including virtual machines, Kubernetes clusters, and cloud-native architectures. Developers can receive feedback and protections, regardless of whether containers are used for testing or production deployment, all without altering their workflow. Another addition is support for Hugging Face AI models. This feature brings the capabilities of the Repository Firewall to AI and ML components, giving teams the ability to detect and block potentially malicious or non-compliant Hugging Face models before incorporation into development workflows. Earlier this year, Sonatype researchers identified and addressed vulnerabilities in 'picklescan', a security tool on Hugging Face, which had allowed malicious AI models to evade detection. By applying stringent checks to AI models similar to those used for traditional open-source packages, organisations can guard against emerging threats, such as malicious PyTorch pickle files and other risky model payloads that might otherwise appear harmless. With developers and data scientists increasingly adopting advanced AI tools and model libraries, the Firewall is positioned to help maintain security and compliance standards. The firewall has also been enhanced with an automated malware detection system that works at scale. A new suite of application programming interfaces provides real-time malware insights, enabling detection and blocking of malicious components during any stage of the software development lifecycle. Organisations can automate detection and enforcement tasks across continuous integration and continuous delivery pipelines, security tools, and threat prevention platforms. This flexibility allows teams to specify how and where to restrict risky components based on their environments and risk definitions. Sonatype reports that its Security Research Team is actively monitoring the evolving threat landscape. The company's Open Source Malware Index for the first quarter of 2025 indicates substantial growth in data exfiltration packages over the past year. Repository Firewall is intended to address these challenges without disrupting developers.