NEWPORT BEACH, Calif, April 1, 2020 — Obsidian Security, the Cloud Detection and Response company, and Snowflake, the cloud data platform, today announced a partnership to deliver unified operational visibility of cloud applications, networks, and endpoints. Snowflake and Obsidian customers can seamlessly access Obsidian’s enriched, normalized data on access, privileges, and activity across their SaaS applications in Snowflake’s secure, instant data exchange. By combining this rich SaaS telemetry with network and endpoint activity data, security teams can more effectively discover threats and respond to breaches across their cloud environment.
“Obsidian gives its customers powerful visibility into who has access to which SaaS applications and what they are doing in them. This is foundational for SaaS security,” said Omer Singer, Head of Cyber Security Strategy at Snowflake. “Obsidian and Snowflake make it easy to combine SaaS logs and alerts with other sources in a security data lake for unified threat detection and response.”
“Integrating the industry’s first CDR solution from Obsidian with Snowflake delivers unparalleled value to our joint customers.” said Glenn Chisholm, co-founder and CEO of Obsidian. “Customers will not only save time and financial overhead needed to sort and clean logs, but also gain a holistic understanding of the actors, activities and relationships in their cloud environments. Through our partnership with Snowflake, we now offer the safest way to integrate security with business, paving the path for sustained innovation.”
The Obsidian Cloud Detection and Response platform aggregates, normalizes and enriches data around user access and activity from an organization’s SaaS apps through deep integrations with the leading SaaS services. Obsidian’s integration with the Snowflake Data Exchange marketplace allows customers to access this enriched data securely in a private data share. Security teams can use the enriched time stream data to investigate incidents and hunt for threats in their SaaS environments. By combining activity data across their cloud services, endpoint devices and additional logs, customers are well positioned to make rapid and effective security decisions that preserve business productivity.