Archives for May 2012 « Recent Articles
…are often the ones not made, or so the saying goes. It’s easy to look back and evaluate acquisitions that were completed, whether it be soon after or long after the fact, and evaluate the success. But overlooked sometimes, are the deals that do not close for one reason or another, or never even get off the ground.
As I was going through some earnings statements for the first quarter, I was reminded of one definitive acquisition deal that fell through, and another that may have been nothing more than a rumor, and started thinking about how the market might differ today had the transactions been completed. The more recent news first: in late 2010, there were rumors (which were denied by Fortinet at the time) that IBM was interested in acquiring the UTM market leader. In July 2010, Fortinet's quarterly…
F5 Networks has been ramping up its strategy in the security market over the last few months. It has also launched several new products and added new security features to its existing products. Traditionally more focused on application delivery, F5 recognized the opportunity in the security market to provide solutions that would bridge the gap between the application and security.
As a next step, F5 recently announced a channel program, VAULT aimed specifically at its existing partners. In other words, VAULT incentivizes F5's existing partners to sell the security solutions. VAULT, a program which focuses on F5's security solutions, is part of the company's UNITY channel-partner program. Through participation in VAULT, partners will receive targeted incentives, lucrative rewards, and technical training resources to support the joint sale of F5 security solutions. This is…
As more enterprises rush to social media as a marketing and customer engagement tool, a market is emerging between the areas of traditional enterprise Web security and online social media management. An interesting startup we recently met with is Social IQ Networks, which is trying to solve the problems of social media sprawl and access control in enterprises.
Enterprises and SMBs want to use sites such as Facebook, Twitter and other platforms to generate revenue, connect with customers, or attract potential talent. However, the ease of use and access to social media has lowered the barrier for individual employees in an enterprise to affect how the company is perceived online through the lens of social media. Poor management of a company's social media presence from a security and access control standpoint can introduce risks which could affect a…
This document was also co-authored by Namratha Dharshan
After Citigroup, Global Payments Inc., one of the world’s leading card processing merchants was the latest victim of cyber attacks. There was a security breach and it has been reported that more than 1 million cardholders' data were compromised, making it one of the largest security attacks in recent times.
Cyber attacks have drastically increased over time and have become a matter of concern for most organizations dealing with valuable data. The good news is that more and more companies are now becoming alert and vigilant. Organizations are beginning to realize the importance of IT security. Securing their businesses has now become one of their top business priorities. Many organizations have a formally documented security policy in place, and some organizations diligently follow industry…
About this channel
- 555k views
- 37 articles
- 10 followers