Endpoint
8/30/2010
11:57 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

CA To Acquire Authentication Vendor Arcot Systems Inc.

Software giant will pay $200 million for emerging security tool vendor

CA Technologies today announced it has signed a definitive agreement to acquire privately-held Arcot Systems, Inc., a leader in providing advanced authentication and fraud prevention solutions through on premises software or cloud services, in an all-cash transaction valued at $200 million.

The acquisition of Arcot adds visionary technology for fraud prevention and advanced authentication to CA Technologies leading Identity and Access Management (IAM) offerings.

Arcot’s solutions – delivered as cloud services or deployed on premises – help prevent fraudulent transactions for about one million online credit card transactions each day. In addition, by combining Arcot’s technology with CA Technologies market-leading CA SiteMinder portfolio, the company will provide advanced capabilities to help customers further reduce risk, support regulatory compliance and confidently secure business transactions.

"Arcot brings to CA Technologies a strong business in fraud prevention and unique capabilities in advanced authentication using a software-only approach," said Dave Hansen, general manager for the Security business at CA Technologies. "This acquisition adds industry-leading technology that extends the breadth and depth of our strong IAM portfolio and gives our customers more first-class options for securing their Web-based business."

The acquisition builds on CA Technologies cloud security strategy, providing the on-ramp to accelerate its delivery of IAM solutions as a comprehensive service from the cloud. The CA Technologies cloud security strategy is a three-fold approach: enable organizations to extend existing on-premises IAM systems to support cloud applications and services; provide IAM technology to cloud providers to secure their services – whether public, private or hybrid; and enable IAM services from the cloud.

In addition to helping customers leverage the value of cloud computing, this acquisition is compelling from several market perspectives:

The Advanced Authentication market, a segment of the overall IAM sector, is expected to grow at low double digits over the next four years. The transaction is expected to drive new revenue streams for CA Technologies IAM business by growing Arcot’s eCommerce transaction business and growing sales to managed service providers that serve emerging enterprises.

The synergies and customer benefits gained by combining solutions from Arcot with leading IAM solutions from CA Technologies, open strong cross-sell opportunities into both companies’ existing customer bases, as well as opportunities for net new sales.

The acquisition fast-tracks CA Technologies IAM cloud service offering, with 120 million identities already verified using the Arcot technology today.

"Identity is a critical area for security whether you’re talking about in-house or the cloud, and with 120 million identities verified by our solutions today, we bring a strong, solid recurring revenue base as well as sources of new growth opportunities for CA Technologies," said Ram Varadarajan, president and CEO, Arcot Systems Inc. "Arcot’s strong established knowledge and expertise in core security and fraud prevention technology -- coupled with IAM solutions from CA Technologies -- will offer robust capabilities to our numerous shared customers, particularly in the financial industry."

Arcot’s business features a subscription-based model, with almost 90 percent of revenue recurring and nearly 100 percent customer retention rates. Arcot has been cash-flow positive since the second quarter of 2009, which ended June 30, 2009.

The all-cash transaction is expected to be dilutive in fiscal 2011 to CA Technologies GAAP earnings per share and slightly accretive to non-GAAP earnings per share. The transaction is expected to close by the end of CA Technologies second fiscal quarter, ending September 30, 2010, and is subject to certain regulatory approvals and customary closing conditions. Founded in 1997, Arcot is a recognized visionary in the Web fraud prevention sector. With 35 patents awarded and pending, Arcot co-invented with Visa the 3-D Secure protocol for online payment security.

Arcot’s operations and its approximately 165 employees will become part of the Security business at CA Technologies.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7392
Published: 2014-07-22
Gitlist allows remote attackers to execute arbitrary commands via shell metacharacters in a file name to Source/.

CVE-2014-2385
Published: 2014-07-22
Multiple cross-site scripting (XSS) vulnerabilities in the web UI in Sophos Anti-Virus for Linux before 9.6.1 allow local users to inject arbitrary web script or HTML via the (1) newListList:ExcludeFileOnExpression, (2) newListList:ExcludeFilesystems, or (3) newListList:ExcludeMountPaths parameter t...

CVE-2014-3518
Published: 2014-07-22
jmx-remoting.sar in JBoss Remoting, as used in Red Hat JBoss Enterprise Application Platform (JEAP) 5.2.0, Red Hat JBoss BRMS 5.3.1, Red Hat JBoss Portal Platform 5.2.2, and Red Hat JBoss SOA Platform 5.3.1, does not properly implement the JSR 160 specification, which allows remote attackers to exec...

CVE-2014-3530
Published: 2014-07-22
The org.picketlink.common.util.DocumentUtil.getDocumentBuilderFactory method in PicketLink, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 5.2.0 and 6.2.4, expands entity references, which allows remote attackers to read arbitrary code and possibly have other unspecified impact via...

CVE-2014-4326
Published: 2014-07-22
Elasticsearch Logstash 1.0.14 through 1.4.x before 1.4.2 allows remote attackers to execute arbitrary commands via a crafted event in (1) zabbix.rb or (2) nagios_nsca.rb in outputs/.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Where do information security startups come from? More important, how can I tell a good one from a flash in the pan? Learn how to separate ITSec wheat from chaff in this episode.