07:09 AM
Tim Wilson
Tim Wilson
Quick Hits
Connect Directly
Repost This

NTT To Acquire Solutionary, Add Cloud Security Services

Pure-play managed security services provider Solutionary will become part of NTT's cloud portfolio

Telecommunications giant NTT Monday announced an agreement to buy Solutionary, one of the security industry's biggest pure-play managed security service providers (MSSPs).

In a press release, NTT said it will acquire the privately held Solutionary for an undisclosed sum in an all-cash transaction. The acquisition is subject to regulatory approvals and is expected to close in the third quarter.

NTT said it is "aggressively expanding" its security capabilities in an effort to become one of the world's largest security integrators. NTT is currently providing services to more than 50 countries through research and development, as well as its communications carrier Computer Security Incident Response Team (CSIRT).

Solutionary, incorporated in 2000, offers cloud security services to more than 600 clients. It has been positioned by Gartner as a leader in its Magic Quadrant for MSSPs in North America and is the only pure-play provider in that category.

NTT says it will combine Solutionary's security analytics platform (ActiveGuard), operation capability, and expert consultants and researchers with NTT's broad IT services and security portfolio.

Have a comment on this story? Please click "Add a Comment" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Current Issue
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2014-04-23
Memory leak in Cisco IOS before 15.1(1)SY, when IKEv2 debugging is enabled, allows remote attackers to cause a denial of service (memory consumption) via crafted packets, aka Bug ID CSCtn22376.

Published: 2014-04-23
The multicast implementation in Cisco IOS before 15.1(1)SY allows remote attackers to cause a denial of service (Route Processor crash) by sending packets at a high rate, aka Bug ID CSCts37717.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY on ASR 1000 devices, when Multicast Listener Discovery (MLD) tracking is enabled for IPv6, allows remote attackers to cause a denial of service (device reload) via crafted MLD packets, aka Bug ID CSCtz28544.

Published: 2014-04-23
Cisco IOS before 15.1(1)SY, when Multicast Listener Discovery (MLD) snooping is enabled, allows remote attackers to cause a denial of service (CPU consumption or device crash) via MLD packets on a network that contains many IPv6 hosts, aka Bug ID CSCtr88193.

Published: 2014-04-23
Cisco IOS before 15.3(1)T on Cisco 2900 devices, when a VWIC2-2MFT-T1/E1 card is configured for TDM/HDLC mode, allows remote attackers to cause a denial of service (serial-interface outage) via certain Frame Relay traffic, aka Bug ID CSCub13317.

Best of the Web