Risk

10/9/2008
08:32 PM
George V. Hulme
George V. Hulme
Commentary
50%
50%

Symantec Buys MessageLabs: SaaS Security Ready To Rock

Symantec snaps up e-mail security services, IM, and Web-filtering company MessageLabs for $695 million. It's a great fit and shows Symantec is (finally) serious about how security software will be delivered in the years to come.

Symantec snaps up e-mail security services, IM, and Web-filtering company MessageLabs for $695 million. It's a great fit and shows Symantec is (finally) serious about how security software will be delivered in the years to come.My only complaint with this acquisition is that it just took Symantec too long to make this move. Founded in 1999, MessageLabs is one of the most mature e-mail services providers, and may even be the largest in number of subscribers, and it makes a much better fit than Symantec's 2004 purchase of anti-spam vendor Brightmail. It's also a great answer to Google's acquisition of Postini.

In a story that ran earlier today, InformationWeek's Antone Gonsalves detailed Symantec's plan:

Symantec plans to integrate MessageLabs' services with its own to form a new SaaS product group for businesses. Initially, such a combination would bring together MessageLabs' online e-mail and e-mail storage, IM, and Web filtering services with Symantec's online backup, storage, and remote access products. The latter makes it possible for corporate employees to access information and applications on their office PCs from any location where there's Internet access.

Symantec expects the combined technologies to give it "a great foundation on which to grow" its SaaS product line, John W. Thompson, chairman and chief executive of the company, said in a statement.

Rounding out Symantec's current online backup and storage services with e-mail security services makes perfect sense. While most companies still shun the outsourcing of security (a trend I suspect will dramatically change next year), enterprises have embraced the outsourcing of e-mail (and the associated anti-spam, antivirus, and storage) since MessageLabs' founding almost a decade ago. And the continued success of MessageLabs and even Postini clearly proved that point, while the success of CRM vendor Salesforce.com and Qualys' vulnerability and compliance assessment services revealed the market's interest in SaaS.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
More Than Half of Users Reuse Passwords
Curtis Franklin Jr., Senior Editor at Dark Reading,  5/24/2018
Is Threat Intelligence Garbage?
Chris McDaniels, Chief Information Security Officer of Mosaic451,  5/23/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
Flash Poll
[Strategic Security Report] Navigating the Threat Intelligence Maze
[Strategic Security Report] Navigating the Threat Intelligence Maze
Most enterprises are using threat intel services, but many are still figuring out how to use the data they're collecting. In this Dark Reading survey we give you a look at what they're doing today - and where they hope to go.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11471
PUBLISHED: 2018-05-25
Cockpit 0.5.5 has XSS via a collection, form, or region.
CVE-2018-11472
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has Reflected XSS during Login (i.e., the login parameter to admin/index.php).
CVE-2018-11473
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has XSS in the registration Form (i.e., the login parameter to users/registration).
CVE-2018-11474
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Administrations Tab. A password change at admin/index.php?id=users&action=edit&user_id=1 does not invalidate a session that is open in a different browser.
CVE-2018-11475
PUBLISHED: 2018-05-25
Monstra CMS 3.0.4 has a Session Management Issue in the Users tab. A password change at users/1/edit does not invalidate a session that is open in a different browser.