Risk
12/18/2012
07:38 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Blue Coat To Acquire Crossbeam Systems

With Crossbeam, Blue Coat gains a support infrastructure and high-performing platform

SUNNYVALE, Calif., December 17, 2012 – Blue Coat Systems, Inc., a market leader in Web security and optimization, today announced that it has entered into an agreement to acquire Crossbeam Systems, Inc., a proven leader in delivering scalable network security. The acquisition brings together two market leaders that deliver complementary technologies to scale and secure the world's largest and most complex networks. By acquiring Crossbeam, Blue Coat is laying the foundation for a broader strategy to transform the way businesses secure and optimize their networks.

"Our service provider and enterprise customers are excited we are bringing together two complementary technologies," said Greg Clark, chief executive officer at Blue Coat Systems. "With Crossbeam, Blue Coat gains a best-in-class support infrastructure and a high performing platform that scales to meet the needs of even the most complex enterprise IT environments."

New customer initiatives and an increasing number of devices accessing rich media content are driving the need for more capacity and performance in the network. Enabling these initiatives, however, often requires investments in additional networking and security solutions. For enterprises, being able to deploy these new solutions into their existing security environment is crucial.

"As enterprises seek to improve corporate agility with mobile and cloud-based solutions, the dual demands for greater capacity and improved threat response force enterprises into a cycle of constantly expanding networking and security infrastructures," said Christian Christiansen, IDC's program vice president of security products & services. "Blue Coat and Crossbeam have a history of embracing emerging security ecosystems, and this acquisition potentially enables customers to further tap into even more synergistic security and networking solutions."

The Crossbeam X-Series portfolio provides the industry's only highly scalable platform that allows businesses to consolidate their security and networking infrastructures. Combined with Blue Coat's leading Unified Security solution, the X-Series is an ideal control point in the network for managing applications that secure both inbound and outbound traffic from all users in any location.

"Blue Coat and Crossbeam are natural partners. The combination of Blue Coat's web security solutions and Crossbeam's scalable X-Series platform is an exciting proposition for us," said Matthew Gyde, global general manager of security at Dimension Data. "We're confident that this union will appeal to our clients that are looking to innovate securely and cost effectively."

Together, Blue Coat and Crossbeam will continue to embrace an open ecosystem and support best-of-breed ISV applications that allow customers to cost effectively deploy the security solutions that best fit their needs.

"Crossbeam has been a great partner for us, and we are committed to continuing and strengthening that relationship with Blue Coat going forward," said Amnon Bar-Lev, president at Checkpoint.

The acquisition is expected to close on December 31, 2012.

Blue Coat and Crossbeam are portfolio companies of Thoma Bravo, LLC, a leading private equity firm with more than 30 years of providing equity and strategic support to experienced management teams and growing companies.

About Blue Coat Systems

Blue Coat Systems provides Web security and WAN optimization solutions to 86% of FORTUNE Global 500 companies. As the market share leader in the secure web gateway market, Blue Coat sets the standard for enterprise security. Its solutions provide the visibility, protection and control required to optimize and secure the flow of information to any user, on any network, anywhere. For additional information, please visit www.bluecoat.com.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-6501
Published: 2015-03-30
The default soap.wsdl_cache_dir setting in (1) php.ini-production and (2) php.ini-development in PHP through 5.6.7 specifies the /tmp directory, which makes it easier for local users to conduct WSDL injection attacks by creating a file under /tmp with a predictable filename that is used by the get_s...

CVE-2014-9652
Published: 2015-03-30
The mconvert function in softmagic.c in file before 5.21, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not properly handle a certain string-length field during a copy of a truncated version of a Pascal string, which might allow remote atta...

CVE-2014-9653
Published: 2015-03-30
readelf.c in file before 5.22, as used in the Fileinfo component in PHP before 5.4.37, 5.5.x before 5.5.21, and 5.6.x before 5.6.5, does not consider that pread calls sometimes read only a subset of the available data, which allows remote attackers to cause a denial of service (uninitialized memory ...

CVE-2014-9705
Published: 2015-03-30
Heap-based buffer overflow in the enchant_broker_request_dict function in ext/enchant/enchant.c in PHP before 5.4.38, 5.5.x before 5.5.22, and 5.6.x before 5.6.6 allows remote attackers to execute arbitrary code via vectors that trigger creation of multiple dictionaries.

CVE-2014-9709
Published: 2015-03-30
The GetCode_ function in gd_gif_in.c in GD 2.1.1 and earlier, as used in PHP before 5.5.21 and 5.6.x before 5.6.5, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted GIF image that is improperly handled by the gdImageCreateFromGif function.

Dark Reading Radio
Archived Dark Reading Radio
Good hackers--aka security researchers--are worried about the possible legal and professional ramifications of President Obama's new proposed crackdown on cyber criminals.