Risk
9/21/2010
01:51 PM
50%
50%

Accuvant Acquires Cybersecurity Firm Ciphent

Purchase by security consulting firm aims to grab a share of increased spending by federal agencies.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full photo gallery)
Security consulting firm Accuvant announced Monday that it's acquired cybersecurity firm Ciphent. Terms of the deal were not disclosed, but Ciphent's CEO and chief operating officer will become part of Accuvant's management team, which consists of vice presidents. At least initially, Ciphent will also operate as a wholly owned subsidiary of Accuvant.

Accuvant provides information risk and compliance management; resells, implements, and manages security technology; and provides security research and assessment through its Accuvant Labs. Ciphent will add secure software development -- especially for project implementations -- plus a security operations center, managed services, online training, and support. In addition, the move buys Accuvant a number of government clients, as half of Ciphent's customers are federal agencies.

Both firms have been growing rapidly. "Independently, Accuvant and Ciphent have been two of the fastest growing cybersecurity companies for years," said James C. Foster, CEO for Ciphent. Both firms were featured on the 2010 Inc. magazine list of the fastest-growing companies in the United States. Ciphent, in fact, ranked 16th, reporting a three-year growth of 8,907%, to reach 2009 revenue of $9.3 million. The combined Accuvant expects to earn $250 million in revenue for 2010.

The information security market is hot, as evidenced by a recent wave of security acquisitions. "Security as a market is growing, certainly that's true for the commercial sector, and also in the public sector," said Scott Walker, Accuvant's VP of strategic planning, who's in charge of the company's mergers and acquisitions. "Cybersecurity within the federal government is one of the top defense concerns, and you hear the Obama administration talk about making major investments in the national information infrastructure."

But what accounts for the two firms' growth rates in particular? "Ciphent and Accuvant are growing fast because consumers -- be it federal agencies or large enterprises -- are bombarded with a very confusing landscape, you have a growing list of threats, a ton of regulations, and a slew of different vendors promising to solve all of your problems," said Walker. "If you're a chief information officer, it's very difficult to know what to do about all of that complexity."

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: "I've seen worse.  Last week Tim had a dragon."
Current Issue
Security Operations and IT Operations: Finding the Path to Collaboration
A wide gulf has emerged between SOC and NOC teams that's keeping both of them from assuring the confidentiality, integrity, and availability of IT systems. Here's how experts think it should be bridged.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.