Analytics
2/10/2014
10:40 AM
Dark Reading
Dark Reading
Products and Releases
Connect Directly
RSS
E-Mail
50%
50%

Sophos Acquires Cyberoam Technologies

Acquisition expands Sophos' product portfolio in network security

OXFORD, UNITED KINGDOM--(Marketwired - Feb 10, 2014) - Sophos announced today that it has acquired Cyberoam Technologies, a leading global provider of network security products. The acquisition expands and deepens Sophos' already significant product portfolio in network security, by combining Cyberoam's Unified Threat Management (UTM), next-generation firewall and network security expertise with Sophos' existing award-winning network security solutions in UTM and wireless security.

"Sophos and Cyberoam create a winning combination at the right time, in the right product markets and in all the right geographies," said Kris Hagerman, Chief Executive Officer for Sophos. "Cyberoam has built a strong reputation as an aggressive and nimble innovator in the network security market, and like Sophos, has a 'channel-first' approach and reputation for delivering top-notch service and support. The acquisition expands and accelerates our network security roadmap to grow our presence in UTM, advanced threat protection, wireless and next generation firewall -- some of the fastest growing markets in all of IT. This also continues our focus of providing exciting opportunities to grow our channel partners and customers."

For more information, visit the Sophos corporate blog at: http://blogs.sophos.com/2014/02/10/sophos-acquires-cyberoam-technologies/

Founded in 1999 and headquartered in Ahmedabad, India, Cyberoam is highly regarded for its product innovation, quality, and world-class customer support. The company has more than 65,000 customers, more than 550 employees, and a strong channel focus with a network of 5,500 partners, with particular strength in India, the Middle East, and Africa. Cyberoam's high performance UTM and Next Generation Firewall appliances, built on a similar Intel-based architecture as Sophos' UTM solutions, deliver advanced technologies that will complement and expand the entire Sophos network security portfolio. Some of these technologies include the iView reporting engine, application control, user-based network policies, sophisticated next-generation firewall capabilities and advanced threat protection.

Hemal Patel, CEO of Cyberoam, said, "Together Sophos and Cyberoam form a powerhouse in network security. We are growing our network security businesses substantially faster than the market, and joining forces allows us to drive even greater innovation and value. Our global footprint, commitment to the channel and complete security portfolio are clear competitive differentiators. We're pleased to join the Sophos team."

The acquisition advances Sophos' position in network security, a strategic growth area for the company and a pivotal element of the company's complete security strategy. Sophos combines leading security technologies in endpoint, mobile, encryption and data protection, e-mail, web, server, and network -- all focused on small and midmarket enterprises and pragmatic enterprises of any size -- and delivered entirely through the channel. Combined, Sophos and Cyberoam will have more than 2,200 employees, with more than 600 focused on network security, including more than 350 in R&D.

According to IDC Research, the network security market reached $7.9 billion in 2012; UTM comprised $2.7 billion of the market and was cited as the fastest growing segment at 21% growth. In the recent Gartner Magic Quadrant for Unified Threat Management, Sophos was again named a "leader" and Cyberoam a "visionary."

Signal Hill acted as exclusive financial advisor to Cyberoam in this transaction.

* - IDC Worldwide Network Security Forecast 2013-2017, July 2013

** - Gartner, Magic Quadrant for Unified Threat Management, July 19, 2013

About Sophos

More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs -- a global network of threat intelligence centers.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0485
Published: 2014-09-02
S3QL 1.18.1 and earlier uses the pickle Python module unsafely, which allows remote attackers to execute arbitrary code via a crafted serialized object in (1) common.py or (2) local.py in backends/.

CVE-2014-3861
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to inject arbitrary web script or HTML via a crafted reference element within a nonXMLBody element.

CVE-2014-3862
Published: 2014-09-02
CDA.xsl in HL7 C-CDA 1.1 and earlier allows remote attackers to discover potentially sensitive URLs via a crafted reference element that triggers creation of an IMG element with an arbitrary URL in its SRC attribute, leading to information disclosure in a Referer log.

CVE-2014-5076
Published: 2014-09-02
The La Banque Postale application before 3.2.6 for Android does not prevent the launching of an activity by a component of another application, which allows attackers to obtain sensitive cached banking information via crafted intents, as demonstrated by the drozer framework.

CVE-2014-5136
Published: 2014-09-02
Cross-site scripting (XSS) vulnerability in Innovative Interfaces Sierra Library Services Platform 1.2_3 allows remote attackers to inject arbitrary web script or HTML via unspecified parameters.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
This episode of Dark Reading Radio looks at infosec security from the big enterprise POV with interviews featuring Ron Plesco, Cyber Investigations, Intelligence & Analytics at KPMG; and Chris Inglis & Chris Bell of Securonix.