SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Intrusion detection
  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

Arctic Wolf acquires Revelstoke to offer enhanced threat detection and response capabilities

13 Oct 2023

Arctic Wolf acquires Revelstoke to offer enhanced threat detection and response capabilities
Contact company
Contact Arctic Wolf Networks
icon Add as a preferred source Download PDF version
Related Links
  • Cohesity forms industry's largest alliance of DSPM vendors to reduce customer risks of cloud transformation and data democratisation

Arctic Wolf®, a global pioneer in security operations announced its intent to acquire Revelstoke, creators of the first Security Orchestration, Automation and Response (SOAR) platform built on a Unified Data Layer (UDL).

Revelstoke has disrupted legacy SOAR solutions by creating a Rosetta Stone for security and IT solutions, seamlessly integrating disparate data and systems, allowing for faster, smarter, and more efficient security operations outcomes. 

Real-time and automated response

Arctic Wolf® believes Revelstoke’s technology will enhance the connective fiber between threat detection and response within the Arctic Wolf Security Operations Cloud, enabling not only faster detections across an organisation’s entire attack surface but also accelerating the execution of real-time and automated response actions at scale.

Key to delivering these outcomes will be the combination of Arctic Wolf’s proprietary artificial intelligence (AI) and machine learning models with Revelstoke’s integrations of pioneering AI technologies and Large Language Models (LLMs).

Next-generation SOAR capabilities with AI

Arctic Wolf will be able to not only advance its threat detections and response actions but also drive consistent coverage

This unification will allow Arctic Wolf to deliver next-generation SOAR capabilities, with AI deeply embedded into the platform, that will slash response times and eliminate manual efforts, while also accelerating the company’s common data model, which is built on the Open Cybersecurity Schema Framework (OCSF).

As a result, Arctic Wolf will be able to not only advance its threat detections and response actions but also drive consistent coverage and experience across integrations across various attack surfaces. 

Lack of simplicity, interoperability, and scalability

“Revelstoke is a pioneer in the SOAR industry, and their platform, built upon a unified data layer, is a fundamentally different approach that re-architects security automation from the ground up,” said Nick Schneider, president and chief executive officer, of Arctic Wolf.

“SOAR is fast becoming a core requirement for an effective security operations program, however, many existing solutions lack the simplicity, interoperability, and scalability to leverage SOAR technologies as a seamless extension of threat detection and response."

Effective threat protection solution

Arctic Wolf Security Operations Cloud ingests, parses, enriches, and analyses more than 4.5 trillion security events

"By combining Arctic Wolf’s comprehensive Security Operations portfolio with Revelstoke's unique approach to security automation, we believe we will be able to accelerate our innovation cycle and will deliver the most effective threat protection on the market in an efficient and scalable manner.”   

Through hundreds of security and technology integrations available to customers, the Arctic Wolf Security Operations Cloud ingests, parses, enriches, and analyses more than 4.5 trillion security events per week from a global base of over 4,600 customers. It expects that the addition of Revelstoke’s comprehensive and differentiated catalogue of integrations that spans dozens of technology types will unlock hundreds of additional detection, automation, and response actions to further drive down cyber risk for organisations of almost any size.  

Cybersecurity platform

“Security Operations is the next market-changing category with Arctic Wolf pioneering the charge in delivering an industry-defining cybersecurity platform for businesses of every size,” said Bob Kruse, co-founder and chief executive officer, of Revelstoke.

“The cutting-edge SOAR technology we’ve built at Revelstoke is the ideal complement to the Arctic Wolf portfolio and we are excited to join the Arctic Wolf team in its mission to end cyber risk and see how our platform makes a difference for thousands of customers worldwide.” 

Operational efficiencies

Realising the full potential of security automation can often be a significant challenge due to the technical complexity"

“As the threat actors become more advanced, budgets get tighter, and internal security teams remain burdened by a sea of alerts, security, and IT pioneers are increasingly looking to have their organisation benefit from the operational efficiencies enabled by security orchestration, automation, and response," says Craig Robinson, IDC Research VP of Security Services. 

"Realising the full potential of security automation can often be a significant challenge due to the technical complexity and specialised staff needed to operationalise SOAR platforms.” 

Noise reduction and efficiency gains 

“This is why integrating SOAR into a broader Security Operations platform is a win-win for both customers and vendors. It allows the customer organisation to achieve the noise reduction and efficiency gains they desire, while their vendor can leverage integrations and automation to deliver the tailored outcomes that organisations increasingly expect from their security providers.” 

By incorporating Revelstoke’s SOAR platform into the Arctic Wolf Security Operations Cloud and Concierge Delivery Model, Arctic Wolf believes that it will be able to provide the security operations outcomes that most SOAR platforms have failed to deliver. 

Unique customer benefits

  • Delivering the industry’s most advanced cross-attack surface correlation and response engine to ensure comprehensive and speedy threat detection and response.
  • Empowering customers to realise greater value from their existing cybersecurity and IT investments by correlating data across tools and organisational silos for normalisation and analysis.
  • Providing game-changing noise reduction that turns thousands of daily alerts into an average of a single actionable ticket each day.

Achieving accuracy

"The Arctic Wolf Security Operations Cloud is already one of the most powerful security platforms in the industry, and the addition of Revelstoke’s groundbreaking SOAR technology will only enhance and accelerate our ability to defend at the speed of data,” said Dan Schiappa, chief product officer, Arctic Wolf.

“As threat actors get more innovative and continue to leverage AI tools in their attacks, Revelstoke’s SOAR technology will play a key role in helping both our customers and our Security Services team detect and respond with the accuracy, efficiency, and scale needed to stay one step ahead of the latest attack techniques.”

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Office security
  • Intrusion detection
  • Security service
  • Integration software
  • Cyber security
  • Crime prevention
  • Data Security
  • Home automation
  • Cloud security
  • Artificial intelligence (AI)
  • Mergers & Acquisitions
  • Machine Learning
  • Related links
  • Access Control Software Access control software
  • Biometric Access control software
  • Card Access control software
  • Control Software CCTV software
  • Detection Software CCTV software
  • Contact Access control software
  • Drawing Software CCTV software
  • IP Surveillance Software CCTV software
  • Proximity Access control software
  • Central Monitoring Option Access control software
  • Management Software CCTV software
  • Recording Software CCTV software
  • Monitoring Software CCTV software
  • Surveillance Software CCTV software
  • Transmission Software CCTV software
  • User tool for control panel Access control software
  • Version Upgrade Access control software
  • Visitor Management tool Access control software
  • Related categories
  • CCTV software
  • Access control software
Related white papers
Precision and intelligence: LiDAR's role in modern security ecosystems

Precision and intelligence: LiDAR's role in modern security ecosystems

Download
The top 4 reasons to upgrade physical security with the Cloud

The top 4 reasons to upgrade physical security with the Cloud

Download
11 advantages of a combined system for access control and intrusion

11 advantages of a combined system for access control and intrusion

Download
Related articles
Securitas UK & Hays Travel mark 10 years partnership

Securitas UK & Hays Travel mark 10 years partnership

Ranger acquires Universal Fire & Security in South West

Ranger acquires Universal Fire & Security in South West

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Detection Tech's DT2030 strategy: Enhance X-ray detector solutions

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Intrusion detection
  4. News
  5. Corporate news
About this page

"Arctic Wolf is set to acquire Revelstoke, creators of a disruptive Security Orchestration, Automation, and Response (SOAR) platform. The combination will enhance threat detection and response, accelerating real-time automated responses, and deliver next-generation SOAR capabilities."

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec