Home Tags Data Loss Prevention

Tag: Data Loss Prevention

Data loss prevention software that are designed to detect potential data breaches / data ex-filtration transmissions and prevent them by monitoring, detecting and blocking sensitive data while in-use (endpoint actions), in-motion (network traffic), and at-rest (data storage). In data leakage incidents, sensitive data is disclosed to unauthorized personnel either by malicious intent or inadvertent mistake. Such sensitive data can come in the form of private or company information, intellectual property (IP), financial or patient information, credit-card data, and other information depending on the business and the industry.

The terms “data loss” and “data leak” are closely related and are often used interchangeably, though they are somewhat different. Data loss incidents turn into data leak incidents in cases where media containing sensitive information is lost and subsequently acquired by unauthorized party. However, a data leak is possible without the data being lost in the originating side. Some other terms associated with data leakage prevention are information leak detection and prevention (ILDP), information leak prevention (ILP), content monitoring and filtering (CMF), information protection and control (IPC), and extrusion prevention system (EPS), as opposed to intrusion prevention system.

CounterTack Adds Data Loss Prevention to Endpoint Threat Platform

The security vendor bolsters the endpoint detection and response capabilities of its Endpoint Threat Platform with the addition of data loss prevention in a bid to reduce risk.

Google upgrades G Suite with tools for IT pros

Google today bolstered its G Suite of productivity apps with new controls and tools for IT professionals.

G Suite administrators now have more access to control security key enforcement, data control with data loss prevention (DLP) for Google Drive and Gmail, and additional insights by connecting Gmail to BigQuery, Google’s enterprise data warehouse designed to enable SQL queries, according to Google.All of the changes, which are live today, are designed to elevate G Suite for the enterprise, especially among companies that need more confidence in the controls they can maintain over corporate data, according to Google.To read this article in full or to leave a comment, please click here

F5 Networks Expands Beyond Application Delivery, Launches Portfolio Of Security Solutions

F5 Networks is diving into the security market, launching on Wednesday a portfolio of security offerings for partners to complement its application delivery products. 

The new Herculon security product line includes Herculon SSL Orchestrator, which provides dynamic service chaining and context-based policy management of the traffic flows between network security devices, including next-generation firewalls, secure web gateways, IPS, DLP and more.
In doing that, companies can better orchestrate traffic, improve performance and detect attacks, Vice President of North American Channel Sales Aldo Dossola said.

That includes visibility into encrypted traffic, a growing security gap for many companies as encryption becomes more wide-reaching, he said.   

F5 also launched Herculon DDoS Hybrid Defender, which is a purpose-built solution for preventing application and underlying infrastructure DDoS attacks by simplifying the workflows around DDoS prevention, adding behavioral analytics and integrations with SIEM vendors like Splunk.

[Related: F5 Networks Partners: Buyout Could Lead To 'Significant Risk' For Channel]

The Seattle, Wa.-based company also announced Silverline WAF Express, a self-service Software-as-a-Service offering for companies to choose which applicants web application firewall services are applied to.

F5 also boosted its security services offerings, with a new Security Incident Response Team for monitoring, analysis, post-incident reports and recommended best practices, as well as its F5 Labs research and threat intelligence division.

John Van Blaricum, vice president of global marketing at Kudelski Security, a Switzerland-based top F5 partner, said the new solutions address specific security needs demanded by the global security solution provider's clients, especially around the need to gain visibility into encrypted network traffic.  

"What F5 is addressing in this latest launch is being able to have that inline visibility into the encrypted traffic and be able to provide a better visibility into targeted attacks," Van Blaricum said. "I think the demand will be increasing.

The propagation of encrypted traffic is going to go up, so the problem will only get worse."

Van Blaricum said it was good to see F5 expand to offer this type of solution, as its long history with clients around load balancing, application delivery and web application firewalls make it more trusted by clients.

That will be a competitive advantage over other companies offering similar solutions, he said.

"The advantage of working with a company like F5 is they have this history and this depth… In security that trust factor is a critical component to how well a product or technology will be adopted.

They certainly have an advantage when they sit down with a customer and say, 'you’ve made an investment in F5, now here's how you can leverage that investment and extend the value of what you’ve got.'"

Dossola said the launches are part of a pivot by F5 to bolster its security portfolio to complement its existing load balancing and application delivery offerings.

Mobile is still the safest place for your data

When I talk to IT managers, I almost always hear fears of mobile devices as conduits for sensitive corporate data to leave the company.
I don’t know why I keep hearing this.

There’s simply no evidence to support this fear.
In fact, there’s solid evidence that says mobile devices are not a significant—or even moderate—risk factor. Every year, I check the Identity Theft Resource Center’s database of personally identifying information (PII) breaches, which require disclosure by both state and federal laws.
I’m sure many losses go unreported, and the database doesn’t cover corporate information not containing PII.

But if mobile devices were a conduit to data loss, they should show up in this database. Mobile-linked breaches haven’t shown up in previous years, and they didn’t show up again in 2016—despite the fact that nearly everyone these days uses a smartphone. What does show up? Paper records, thumb drives, external hard drives, laptops, hacks into databases and storage systems, and successful phishing attempts. Many of the reported breaches involve lost papers, drives, and laptops, where a data thief probably wasn’t involved.

But many involve active hacking of IT systems where data theft is the goal.

And some involve insiders (contractors and ex-employees) steal data to use themselves, bring to new employers, or—least often—sell to others. None of the lost, stolen, or compromised devices were smartphones or tablets.

That’s probably because encrypted devices need not be reported; they’re presumed safe. iPhones and iPads have long encrypted their contents, and professional-grade Android devices have done that in recent years.
In both cases, a simple IT policy can enforce that encryption.
It doesn’t take a fancy mobile security tool; Microsoft Exchange can do the trick. Well, there was one data breach involving a smartphone: A former hospital manager, after resigning, took patient-identifying information by forwarding certain documents such as patient lists to her personal email account.
She had work email set up on her personal smartphone—a common BYOD scenario—and simply forwarded the work emails to her personal email account.

That’s not a mobile-specific issue—she could have done that from a work computer or a home computer. IT’s remedy for this case is the same no matter the device running the email app: Use restricted email accounts where possible and data loss prevention (DLP) tools where not to identify and perhaps prevent such odd email usage.

And don’t distribute PII or other sensitive information in routine documents in the first place! Also not in the breach list were the cloud storage services that IT managers fret about after they’re done worrying about mobile devices: Apple iCloud Drive, Box, Dropbox, Google Drive, and Microsoft OneDrive. But that omission may be misleading because if a lost (unencrypted) laptop has stored the access credentials for such services—which is common—then the data on that cloud drive is available to a data thief, just as the locally stored data is.

The Identity Theft Resource Center database doesn’t go into great detail of each case, but because a lost (unencrypted) laptop is presumed to be a data breach, that breach extends to any data on that laptop, including cloud-accessed data. Still, we didn’t see cases of these popular cloud storage services as the specific vector of a data breach—despite frequent IT fears to the contrary. In this day and age, IT pros have plenty of security threats to deal with.

Active hacking is the biggest threat, of course, and should get the lion’s share of the resources. The client side should be addressed but not dwelled on. Of the clients in use, mobile is the least risky.

Based on the actual risks, a good place to start is securing laptops, then external drives that people use when they don’t have access to a corporate cloud storage service.

Those devices compromise the biggest client risk.

Encryption is your main line of defense for these devices—for cloud storage, too. For the much smaller risk posed by mobile devices, mobile management tools are both mature and effective; there’s no excuse not to have them in place already.

Symantec Sues IT Cloud Security Vendor Zscaler For Patent Infringement

Symantec has filed a patent infringement lawsuit against Zscaler alleging the cloud security vendor violated seven of its patents in its portfolio.

Zscaler offers a security platform that uses a cloud-based firewall proxy architecture to deliver a full portfolio of software-as-a-service web and network security solutions.

The lawsuit, filed with the U.S.

Federal District Court for the District of Delaware, claims that Zscaler violated Symantec's patents around web security, DLP, threat prevention, access control and antivirus.

The lawsuit affects U.S. Patent Nos. 6,279,113; 7,203,959; 7,246,227; 7,392,543; 7,735,116; 8,181,036; and 8,661,498.
Symantec said it will continue to investigate its patents and may file further lawsuit claims if necessary.

[Related: Symantec CEO Takes Aim At Cylance, Other Next-Gen Security Vendors As Blue Coat Integration Gets Under Way]

"We have an obligation to our customers and our shareholders to defend our intellectual property when we believe it has been infringed, and the lawsuit filed against Zscaler is intended to stop them from copying our pioneering technologies in network security," Scott Taylor, Symantec’s executive vice president, general counsel and secretary, said in a statement about the lawsuit. "Since 2004, Symantec has invested over $10 billion in R&D to provide our customers with innovative technologies, and much of that investment is protected by our portfolio of more than 2,000 United States patents.

Today’s action is a necessary step to defend our valuable ideas and assets that Symantec customers rely on for industry-leading cyber defense."

Zscaler did not provide a comment by the time of publication.

CRN will update this story later, if necessary. 

The lawsuit is the latest example of an increasingly combative tone at Symantec towards its competition, a rhetoric that hasn't necessarily been present at the vendor in months and years past.
Symantec, in particular, has gone after its competition in the next-generation endpoint security market, with CEO Greg Clark recently calling out Cylance, Carbon Black and Tanium, as well as taking shots at Sophos and Proofpoint, claiming the technologies were merely "trendy" and lacked effectiveness.

Partners have also noticed this shift in tone at Symantec, particularly since the company brought in new leadership from its Blue Coat acquisition, which closed in August. One partner executive, who did not want to be named, said "this is new" for Symantec to be so combative, though said the recent shots at Zscaler are "kind of out of nowhere."

"We need to step up and be a leader and continue to be a leader," the partner executive said.

The challenge, the partner said, is that Symantec needs to be careful that partners don't get caught in the crosshairs, as many of them partner with other vendors, including Zscaler.

"It’s tough," the partner said, as his company partners with both Zscaler and Symantec, among many others. "I'm going to be stuck right in the middle of it."

WatchGuard Takes Guesswork Out of Wi-Fi Security With Cloud-based Solution

WatchGuard Wi-Fi Cloud delivers automated wireless threat prevention with interactive engagement and analytics18 October 2016 – WatchGuard® Technologies has announced WatchGuard Wi-Fi Cloud, a secure, scalable and feature-rich Wi-Fi management platform with a new family of high-performance, cloud-ready access points.

Deployed together, this next-generation secure wireless solution delivers a sophisticated Wireless Intrusion Prevention System (WIPS), while turning Wi-Fi hot spots into powerful consumer research, analytics and push marketing tools. WatchGuard WiFi logo Architected from the ground up to focus on ease of deployment and administration, the WatchGuard Wi-Fi Cloud simplifies even the most complex aspects of Wi-Fi management, making fast, secure and intelligent Wi-Fi accessible to organisations of all types and sizes. WatchGuard Wi-Fi Cloud delivers high-quality wireless performance, while ensuring consistent security policies across all connected devices, even at remote locations.

The patented WIPS technology built into WatchGuard’s new cloud-ready AP120 and AP320 access points automatically classifies wireless devices as Authorized, Rogue, or External, resulting in a very low false positive rate.

This advanced rogue detection process can safely and automatically shut down unauthorised access points and clients, while nearly eliminating the risk of illegally interfering with neighbouring wireless networks. “Today’s savvy businesses realise that safe and reliable Wi-Fi is a basic requirement, but many SMBs and distributed enterprise organisations struggle to deliver it. We’ve developed a comprehensive solution that dramatically simplifies how businesses deploy and manage wireless, while at the same time elevating Wi-Fi security standards,” said Ryan Orsi, director of wireless products at WatchGuard. “In addition to security, the WatchGuard Wi-Fi Cloud makes it easier for organisations to turn Wi-Fi into an extension of their brand, an interactive experience for their customers and a powerful analytics tool.” WIRELESS SECURITYMost traditional wireless network management solutions fail to stop rogue devices from connecting to their networks or block threats like wireless denial-of-service attacks.

Current WIPS technology delivers a high rate of false positives, incorrectly categorising neighbouring hotspots and innocuously connected devices as malicious, which creates unnecessary frustration and end-user complaints. In addition to automatically detecting and disabling rogue wireless devices and attacks, WatchGuard’s industry-leading WIPS also provides customers with: Secure Bring Your Own Device (BYOD) Policy Enforcement – automatically identifies on-network smart devices and blocks unapproved connections. Accurate Location Tracking – pinpoints the location of connected wireless devices or sources of interference, enabling administrators to quickly take action. Flexible Deployment – deployable in configurations to meet any security need.
It can be installed as an overlay on top of an existing WLAN infrastructure or as a stand-alone enforcement system for Wi-Fi prohibited zones. Customers can easily and cost effectively run all of their wireless network traffic through one of WatchGuard's leading network security appliances, thereby providing the same AV, IPS, web filtering, spam blocking, application control, APT blocking, data loss prevention and reputation lookup techniques to wireless traffic.

This protects them against malware planting, eavesdropping and data theft and prevents inappropriate or illegal use of their network. INTERACTIVE ENGAGEMENT AND ANALYTICSThe Wi-Fi Cloud provides visibility into marketing data, including insights into footfall and customer demographics visualised on customisable dashboards. Organisations can easily monetise these insights by tapping into the mobile engagement features, which allow direct and customised communication with individual customers in the form of SMS, MMS and their social network of choice. WatchGuard Wi-Fi Cloud management features also include: Custom Splash Pages and Social Wi-Fi Engagement – captive portals allow businesses to personalise customer Wi-Fi experiences by offering promotional opportunities, surveys and strong authentication through Facebook, Twitter, LinkedIn, Instagram and other social applications. Mobile Engagement – delivers custom messages to customers via SMS, MMS, and social networks, based on predefined triggers including user interaction and length of time on-network. Wi-Fi Analytics - data is collected via passive scans, active scans and user connections in and around your Wi-Fi networks.

Analyses and conceptualises this data to provide insight into traffic patterns, behaviour and demographics of your Wi-Fi users, in addition to generating a visual map of foot traffic patterns on a floor plan. “There is a strong demand among our customers for widely deployable, cloud-enabled solutions and we are excited to add WatchGuard Wi-Fi Cloud to our portfolio,” said Ian Kilpatrick, director at Wick Hill. “This new Wi-Fi cloud functionality expands our ability to sell more to existing customers and to reach brand new customers.

Additionally, Firebox and Wi-Fi Cloud installations will increase partners’ service revenues.

This represents a big win for everyone.” ADDITIONAL RESOURCES: AVAILABILITY:WatchGuard Wi-Fi Cloud subscriptions, along with the AP120 and AP320 are available now.

Customers can purchase them as a stand-alone solution, or as part of a holistic configuration that routes traffic through a Firebox or XTM appliance, to extend best-in-class security services like APT Blocker, WebBlocker, and Gateway AntiVirus into their wireless environments.

For more information, visit https://www.watchguard.com/wifi. About WatchGuard Technologies, Inc.WatchGuard® Technologies, Inc. is a global leader in network security, providing best-in-class Unified Threat Management, Next Generation Firewall, secure Wi-Fi, and network intelligence products and services to more than 75,000 customers worldwide.

The company’s mission is to make enterprise-grade security accessible to companies of all types and sizes through simplicity, making WatchGuard an ideal solution for Distributed Enterprises and SMBs. WatchGuard is headquartered in Seattle, Washington, with offices throughout North America, Europe, Asia Pacific, and Latin America.

To learn more, visit WatchGuard.com. For additional information, promotions and updates, follow WatchGuard on Twitter, @WatchGuard on Facebook, or on the LinkedIn Company page.

Also, visit our InfoSec blog, Secplicity, for real-time information about the latest threats and how to cope with them at www.secplicity.org. Contacts:Rowena Case, WatchGuard Technologies0203 608 9070, ukmarketing@watchguard.com Peter Rennison, PRPR01442 245030, pr@prpr.co.uk

Enterprises outsmarting themselves with security, while attackers easily use common techniques

Bad guys use common techniques to steal data, while companies focus too much on sophisticated attacks, according to the second annual Hacker's Playbook, based on an analysis of nearly 4 million breach methods. Security professionals are figuring out how to block attacks from state-sponsored, advanced, persistent adversaries, said Itzik Kotler, CTO and co-founder at penetration company SafeBreach, which produced the report. "But if you look at the different hacks, they're not all carried out by nation-states," he said. "They're carried out by script kiddies and cyber criminals." In fact, while conducting penetration tests on behalf of its customers, SafeBreach found that old standbys are extremely effective. There are few adversaries skilled enough to create zero days.

The majority of attackers use and reuse common techniques -- which is exactly what SafeBreach did when running its penetration tests. Corporate environments typically offered many exfiltration channels, including HTTP, IRC, SIP and Syslogs. Take, for example, Internet Relay Chat which dates back to before the Web was invented. "It is not sophisticated at all," he said. "And, to our knowledge, it has no business value.

But it can still be used to initiate a connection out of a company and carry data." Syslogs are event logs from network and security products sent to external aggregators for consolidation and analysis -- and are usually not scrutinized by security.

They should be limited to specific servers, encrypted, or sent via a VPN tunnel. Simiarly, SIP, which is used for voice-over-IP communication sessions, needs to be limited to specific, pre-identified servers. And HTTP is the most common type of outbound traffic, and is the easiest protocol to take advantage of, according to SafeBreach.

These communications need to be monitored and inspected by data loss prevention platforms. When it comes to getting into a company in the first place, companies are still not locking down many common approaches. For example, executable files in attachments were successful in a quarter of all attempts.
So were Microsoft Office macros and visual Basic scripts. And one of the oldest tricks in the book -- encrypted zip files downloaded via HTTP -- still works. The kinds of files should be limited by policy or inspected by next-generation firewalls, SafeBreach recommended. And the top five most successful malware kits have been around for a year or more, including Citadel, Dridex, Hesperbot, SpyEye and Cryptolocker. Finally, human error was a common problem.

The most damaging mistake was misconfiguring malware sandboxes and proxies.

For example, sandboxes were often not set up to cover all ports, protocols, file formats, and encrypted traffic.

And misconfigured proxies allow attackers to move laterally within corporate networks. This story, "Enterprises outsmarting themselves with security, while attackers easily use common techniques" was originally published by CSO.

Cryptzone Launches New Channel Enhancements, Incentives As It Looks To Grow...

Cryptzone is accelerating its push into the channel with the launch this week of the next wave of enhancements and incentives to its growing partner program. Cryptzone, based in Waltham, Mass., offers a portfolio of network security products, including a software-defined perimeter offering for network access control called AppGate, a data loss prevention product for SharePoint called Security Sheriff, and a web compliance tool called Compliance Sheriff. Under the new program enhancements, launching Tuesday, Cryptzone will have two types of partners: strategic alliances and traditional channel partners.

The company's strategic alliances include top-tier consultants like Honeywell Technology Solutions, and OEMs like Hewlett Packard Enterprise, Amazon Web Services and Microsoft. [Related: Webroot Expands Network Security, IoT Capabilities With Acquisition Of CyberFlow Analytics] Cryptzone has brought on cloud-focused distributor Avant Communications to help drive traditional channel partner sales, which include both security-focused solution providers and resellers looking to get into security for the first time.

The program has three levels: Bronze, Silver and Gold, with corresponding incentives for certification, co-marketing dollars, and margins based on annual revenue quotas. The program also includes certification programs, business planning, channel seeding initiatives, additional sales promotions, automation of opportunities and scoring for leads. However, where the program distinguishes itself with what it calls "Plan Ahead Marketing Development Funds," which include significant investments in pre-sale activities, said Senior Vice President of Strategic Alliances Tina Gravel.   "These are not all new, but I think for our size it is really aggressive and really, really expensive," Gravel said. "But, it is well worth it.
I am excited about it and I think the awareness of Cryptzone should be coming up through all of this." Drew Lydecker, president and co-founder of Avant, said the company has seen "explosive growth in cloud-based security services," which is why the company is looking to partner with Cryptzone to help bring its offerings to more partners and enhance its own security portfolio.  "Cryptzone's security solutions complement our cloud portfolio of services for our channel sales partners. We are excited to add Cryptzone's channel program to our Sales Enablement-as-a-Service methodology to further help enable channel sales people to sell IT services to enterprise customers," Lydecker said in an email. Gravel joined Cryptzone in September 2015 from Dimension Data, where she was vice president and general manager of cloud services, charged with ramping up the company's efforts around the channel.

The company currently does around 40 percent of its business through the channel and is looking to grow that percentage, Gravel said. "I think it will be a relatively easy sale for partners.
I can't guarantee every customer will want to go through a partner, but we want to do channel first.

Every time we do a deal, we want to assign it so a partner can learn and work with us," Gravel said.

Fourth Region Added To Nuvias EMEA Structure

Nuvias acquires value-added distribution business in DubaiLondon, UK: 7/9/16: Specialist EMEA distributor, the Nuvias Group, announces it has added a fourth region, MEA, to its regional EMEA structure.

The other three Nuvias Group regions are Northern, Central and Southern Europe. Paul Eccleston Head of Nuvias Group Nuvias has acquired SCD, a distributor operating out of Dubai.

The new office will now act as a hub for Nuvias’ MEA activities, covering all parts of the Gulf Co-operation Council[1] (GCC) area, Pakistan and Afghanistan. This is the latest development in the strong growth and development plans of Nuvias, which was established in July 2016. Nuvias is building an EMEA-wide, high-value, specialist distribution business, with a common proposition and consistent delivery.

The strategy is to redefine value distribution to the channel, enabling the channel and vendor community to deliver exceptional business value to their customers and creating new standards of channel success. Also being announced today is the setting up of the Nuvias Cyber Security Practice at the Dubai office, which includes vendors Unitrends (cloud empowered continuity solutions), Malwarebytes (advanced malware prevention and remediation), Black Duck (open source security and management) and Netskope (cloud data loss prevention). Other recent vendor signings for Nuvias in the MEA region include JetNEXUS (load balancing), Lifesize (videoconferencing) and Tintri (VM-aware storage for virtualisation and the cloud). Nuvias has already recruited several new staff for the MEA office bringing the current total up to 16.

These include recent recruit Muneeb Anjum, the new sales director.

Anjum has twelve years’ experience in the IT sector, with a proven track record in managing channel partners across the Middle East and extensive experience in successfully introducing new solutions to market. Paul Eccleston, head of Nuvias Group, commented: “We are delighted to be announcing today the opening of our Middle East and Africa (MEA) region, completing our regional coverage of EMEA. MEA is a very important part of the region and a significant opportunity for us, our vendor partners and our customers. “We have been working hard to bring the cyber security, advanced networking and unified comms capability of Wick Hill and Zycko to this region. With the acquisition of the business in Dubai, operating across the region, and the recruitment of Muneeb Anjum, which will be followed by further additions to the team very soon, this is an exciting development for Nuvias and we look forward to bringing more capability and vendors to the region quickly.” Alasdair Kilgour, regional VP MEA for Nuvias, commented: “It's both exciting and a privilege to be part of the Nuvias team and I look forward to leading the growth of the business across MEA and beyond. We will do this firstly by enabling our vendor partners locally to experience the same high standard of value-added service they already receive from the Group across Europe; secondly by expanding our channel partner community through our solution distribution philosophy; and thirdly by geographic expansion. We are exhibiting at Gitex in October at the Dubai World Trade Centre, which will give us a great platform to show the industry what Nuvias in the MEA region can offer.” [1] Gulf Co-operation Council (GCC)A regional, political organisation consisting of six middle eastern countries – Saudi Arabia, Kuwait, the United Arab Emirates, Oman, Qatar and Bahrain. About Nuvias GroupNuvias Group is the pan-EMEA, high value distribution business being built by Rigby Private Equity (RPE), to redefine international, specialist value distribution in IT.

The Group provides a common proposition and consistent delivery across EMEA, allowing channel and vendor communities to deliver exceptional business value to customers, and enabling new standards of channel success. The Group today consists of Wick Hill, an award-winning, value-added distributor with a strong specialisation in security; and Zycko, an award-winning, specialist EMEA distributor, with a focus on advanced networking.

Both companies have proven experience at providing innovative technology solutions from world-class vendors, and delivering market growth for vendor and reseller partners alike.

The Group has fourteen regional offices across EMEA and turnover is in excess of US$ 300 million. ENDS For further press information, please contact Annabelle Brown on +44 (0) 1326 318212, email abpublicrelations@btinternet.com. Wick Hill https://www.wickhill.com/ Zycko http://www.zycko.com/

Review: Top tools for preventing data leaks

Most security tools are focused on keeping external attackers at bay.

But what about the sensitive data that lives inside your network? How do you make sure it doesn't get out, either intentionally or by accident? That's where Data Loss Prevention (DLP...

New air-gap jumper covertly transmits data in hard-drive sounds

Cyber Security Labs @ Ben Gurion Universityreader comments 18 Share this story Researchers have devised a new way to siphon data out of an infected computer even when it has been physically disconnected from the Internet to prevent the leakage of s...

Symantec Closes Acquisition Of Blue Coat, Looks To Begin Product Integration...

Symantec’s blockbuster acquisition of Blue Coat Systems is officially complete, the Mountain View, Calif.-based security vendor said Monday morning, a milestone CEO Greg Clark said “marks the beginning of a new era in cybersecurity.” The completion of the $4.65 billion acquisition, which was first announced in June, creates a single security vendor with around $4.2 billion in revenue for this year, the majority of which comes from enterprise security, and a portfolio that includes endpoint, email, DLP, data center, cloud security and secure web gateway solutions. “Symantec and Blue Coat combined creates by far the best opportunity in the security industry.

The brand is phenomenal … you combine that with the network and cloud power of Blue Coat, I think the future is massive for us,” Clark said in a blog post about the closing. [Related: Q&A: New Symantec CEO Talks Blue Coat Acquisition, Integration Roadmap And Plans For Partners] The announcement also officially puts Clark into the CEO role at the security giant, replacing Michael Brown, who said in April that he planned to step down.

Clark had previously been the CEO of Blue Coat. “I am honored to lead Symantec as it enters its next chapter of expanded product innovation and growth.

As the largest dedicated cybersecurity company on the planet, we’re eager to get started and we look forward to defining the future of cybersecurity with you,” Clark said in the blog post.
Symantec also announced in July that Blue Coat President and COO Michael Fey would join the new company in the same role, saying at the time it would unveil the rest of the executive lineup in the months to come. With the closing, Symantec and Blue Coat are able to jump fully into their integration strategy, which centers on a vision for an open platform that will “fuel an ecosystem that encourages vendors of all sizes to play a part in tackling our industry’s toughest challenges,” Clark said in the post. “As we shift into execution mode of our integration strategy, we are focused on capturing the strengths of both companies to ensure a seamless and efficient transition. While the opportunity ahead for us is vast, to seize it, we must apply rigor, move faster and continue to transform.

A big part of my job is to accelerate our ability to bring innovative products to our customers more quickly,” Clark said in the post. That integration strategy will also include significant cost-cutting efforts, the company said last month, with a target to cut about $400 million in costs primarily from the enterprise security business.

The cuts will come from organizational improvements (including around 1,200 layoffs), real estate consolidation, procurement changes, and additional transition costs from the sale of Veritas earlier this year.

The cuts are expected to be completed by 2018. Symantec partners have expressed huge support for the acquisition since it was announced two months ago, predicting the combined technology and new leadership will help lead the security vendor to its next wave of growth.