Endpoint
8/30/2010
11:57 PM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

CA To Acquire Authentication Vendor Arcot Systems Inc.

Software giant will pay $200 million for emerging security tool vendor

CA Technologies today announced it has signed a definitive agreement to acquire privately-held Arcot Systems, Inc., a leader in providing advanced authentication and fraud prevention solutions through on premises software or cloud services, in an all-cash transaction valued at $200 million.

The acquisition of Arcot adds visionary technology for fraud prevention and advanced authentication to CA Technologies leading Identity and Access Management (IAM) offerings.

Arcot’s solutions – delivered as cloud services or deployed on premises – help prevent fraudulent transactions for about one million online credit card transactions each day. In addition, by combining Arcot’s technology with CA Technologies market-leading CA SiteMinder portfolio, the company will provide advanced capabilities to help customers further reduce risk, support regulatory compliance and confidently secure business transactions.

"Arcot brings to CA Technologies a strong business in fraud prevention and unique capabilities in advanced authentication using a software-only approach," said Dave Hansen, general manager for the Security business at CA Technologies. "This acquisition adds industry-leading technology that extends the breadth and depth of our strong IAM portfolio and gives our customers more first-class options for securing their Web-based business."

The acquisition builds on CA Technologies cloud security strategy, providing the on-ramp to accelerate its delivery of IAM solutions as a comprehensive service from the cloud. The CA Technologies cloud security strategy is a three-fold approach: enable organizations to extend existing on-premises IAM systems to support cloud applications and services; provide IAM technology to cloud providers to secure their services – whether public, private or hybrid; and enable IAM services from the cloud.

In addition to helping customers leverage the value of cloud computing, this acquisition is compelling from several market perspectives:

The Advanced Authentication market, a segment of the overall IAM sector, is expected to grow at low double digits over the next four years. The transaction is expected to drive new revenue streams for CA Technologies IAM business by growing Arcot’s eCommerce transaction business and growing sales to managed service providers that serve emerging enterprises.

The synergies and customer benefits gained by combining solutions from Arcot with leading IAM solutions from CA Technologies, open strong cross-sell opportunities into both companies’ existing customer bases, as well as opportunities for net new sales.

The acquisition fast-tracks CA Technologies IAM cloud service offering, with 120 million identities already verified using the Arcot technology today.

"Identity is a critical area for security whether you’re talking about in-house or the cloud, and with 120 million identities verified by our solutions today, we bring a strong, solid recurring revenue base as well as sources of new growth opportunities for CA Technologies," said Ram Varadarajan, president and CEO, Arcot Systems Inc. "Arcot’s strong established knowledge and expertise in core security and fraud prevention technology -- coupled with IAM solutions from CA Technologies -- will offer robust capabilities to our numerous shared customers, particularly in the financial industry."

Arcot’s business features a subscription-based model, with almost 90 percent of revenue recurring and nearly 100 percent customer retention rates. Arcot has been cash-flow positive since the second quarter of 2009, which ended June 30, 2009.

The all-cash transaction is expected to be dilutive in fiscal 2011 to CA Technologies GAAP earnings per share and slightly accretive to non-GAAP earnings per share. The transaction is expected to close by the end of CA Technologies second fiscal quarter, ending September 30, 2010, and is subject to certain regulatory approvals and customary closing conditions. Founded in 1997, Arcot is a recognized visionary in the Web fraud prevention sector. With 35 patents awarded and pending, Arcot co-invented with Visa the 3-D Secure protocol for online payment security.

Arcot’s operations and its approximately 165 employees will become part of the Security business at CA Technologies.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7407
Published: 2014-10-22
Cross-site request forgery (CSRF) vulnerability in the MRBS module for Drupal allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

CVE-2014-3675
Published: 2014-10-22
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.

CVE-2014-3676
Published: 2014-10-22
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."

CVE-2014-3677
Published: 2014-10-22
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.

CVE-2014-3828
Published: 2014-10-22
Multiple SQL injection vulnerabilities in Centreon 2.5.1 and Centreon Enterprise Server 2.2 allow remote attackers to execute arbitrary SQL commands via (1) the index_id parameter to views/graphs/common/makeXML_ListMetrics.php, (2) the sid parameter to views/graphs/GetXmlTree.php, (3) the session_id...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.