Risk
9/21/2010
01:51 PM
Connect Directly
RSS
E-Mail
50%
50%

Accuvant Acquires Cybersecurity Firm Ciphent

Purchase by security consulting firm aims to grab a share of increased spending by federal agencies.




Slideshow: Next Generation Defense Technologies
(click for larger image and for full photo gallery)
Security consulting firm Accuvant announced Monday that it's acquired cybersecurity firm Ciphent. Terms of the deal were not disclosed, but Ciphent's CEO and chief operating officer will become part of Accuvant's management team, which consists of vice presidents. At least initially, Ciphent will also operate as a wholly owned subsidiary of Accuvant.

Accuvant provides information risk and compliance management; resells, implements, and manages security technology; and provides security research and assessment through its Accuvant Labs. Ciphent will add secure software development -- especially for project implementations -- plus a security operations center, managed services, online training, and support. In addition, the move buys Accuvant a number of government clients, as half of Ciphent's customers are federal agencies.

Both firms have been growing rapidly. "Independently, Accuvant and Ciphent have been two of the fastest growing cybersecurity companies for years," said James C. Foster, CEO for Ciphent. Both firms were featured on the 2010 Inc. magazine list of the fastest-growing companies in the United States. Ciphent, in fact, ranked 16th, reporting a three-year growth of 8,907%, to reach 2009 revenue of $9.3 million. The combined Accuvant expects to earn $250 million in revenue for 2010.

The information security market is hot, as evidenced by a recent wave of security acquisitions. "Security as a market is growing, certainly that's true for the commercial sector, and also in the public sector," said Scott Walker, Accuvant's VP of strategic planning, who's in charge of the company's mergers and acquisitions. "Cybersecurity within the federal government is one of the top defense concerns, and you hear the Obama administration talk about making major investments in the national information infrastructure."

But what accounts for the two firms' growth rates in particular? "Ciphent and Accuvant are growing fast because consumers -- be it federal agencies or large enterprises -- are bombarded with a very confusing landscape, you have a growing list of threats, a ton of regulations, and a slew of different vendors promising to solve all of your problems," said Walker. "If you're a chief information officer, it's very difficult to know what to do about all of that complexity."

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.