Analytics
2/10/2014
10:40 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Sophos Acquires Cyberoam Technologies

Acquisition expands Sophos' product portfolio in network security

OXFORD, UNITED KINGDOM--(Marketwired - Feb 10, 2014) - Sophos announced today that it has acquired Cyberoam Technologies, a leading global provider of network security products. The acquisition expands and deepens Sophos' already significant product portfolio in network security, by combining Cyberoam's Unified Threat Management (UTM), next-generation firewall and network security expertise with Sophos' existing award-winning network security solutions in UTM and wireless security.

"Sophos and Cyberoam create a winning combination at the right time, in the right product markets and in all the right geographies," said Kris Hagerman, Chief Executive Officer for Sophos. "Cyberoam has built a strong reputation as an aggressive and nimble innovator in the network security market, and like Sophos, has a 'channel-first' approach and reputation for delivering top-notch service and support. The acquisition expands and accelerates our network security roadmap to grow our presence in UTM, advanced threat protection, wireless and next generation firewall -- some of the fastest growing markets in all of IT. This also continues our focus of providing exciting opportunities to grow our channel partners and customers."

For more information, visit the Sophos corporate blog at: http://blogs.sophos.com/2014/02/10/sophos-acquires-cyberoam-technologies/

Founded in 1999 and headquartered in Ahmedabad, India, Cyberoam is highly regarded for its product innovation, quality, and world-class customer support. The company has more than 65,000 customers, more than 550 employees, and a strong channel focus with a network of 5,500 partners, with particular strength in India, the Middle East, and Africa. Cyberoam's high performance UTM and Next Generation Firewall appliances, built on a similar Intel-based architecture as Sophos' UTM solutions, deliver advanced technologies that will complement and expand the entire Sophos network security portfolio. Some of these technologies include the iView reporting engine, application control, user-based network policies, sophisticated next-generation firewall capabilities and advanced threat protection.

Hemal Patel, CEO of Cyberoam, said, "Together Sophos and Cyberoam form a powerhouse in network security. We are growing our network security businesses substantially faster than the market, and joining forces allows us to drive even greater innovation and value. Our global footprint, commitment to the channel and complete security portfolio are clear competitive differentiators. We're pleased to join the Sophos team."

The acquisition advances Sophos' position in network security, a strategic growth area for the company and a pivotal element of the company's complete security strategy. Sophos combines leading security technologies in endpoint, mobile, encryption and data protection, e-mail, web, server, and network -- all focused on small and midmarket enterprises and pragmatic enterprises of any size -- and delivered entirely through the channel. Combined, Sophos and Cyberoam will have more than 2,200 employees, with more than 600 focused on network security, including more than 350 in R&D.

According to IDC Research, the network security market reached $7.9 billion in 2012; UTM comprised $2.7 billion of the market and was cited as the fastest growing segment at 21% growth. In the recent Gartner Magic Quadrant for Unified Threat Management, Sophos was again named a "leader" and Cyberoam a "visionary."

Signal Hill acted as exclusive financial advisor to Cyberoam in this transaction.

* - IDC Worldwide Network Security Forecast 2013-2017, July 2013

** - Gartner, Magic Quadrant for Unified Threat Management, July 19, 2013

About Sophos

More than 100 million users in 150 countries rely on Sophos' complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos' award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs -- a global network of threat intelligence centers.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, January 2015
To find and fix exploits aimed directly at your business, stop waiting for alerts and become a proactive hunter.
Flash Poll
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2013-7402
Published: 2014-12-17
Multiple unspecified vulnerabilities in request.c in c-icap 0.2.x allow remote attackers to cause a denial of service (crash) via a crafted ICAP request.

CVE-2014-5437
Published: 2014-12-17
Multiple cross-site request forgery (CSRF) vulnerabilities in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allow remote attackers to hijack the authentication of administrators for requests that (1) enable remote management via a request to remote_management.php,...

CVE-2014-5438
Published: 2014-12-17
Cross-site scripting (XSS) vulnerability in ARRIS Touchstone TG862G/CT Telephony Gateway with firmware 7.6.59S.CT and earlier allows remote authenticated users to inject arbitrary web script or HTML via the computer_name parameter to connected_devices_computers_edit.php.

CVE-2014-7170
Published: 2014-12-17
Race condition in Puppet Server 0.2.0 allows local users to obtain sensitive information by accessing it in between package installation or upgrade and the start of the service.

CVE-2014-7285
Published: 2014-12-17
The management console on the Symantec Web Gateway (SWG) appliance before 5.2.2 allows remote authenticated users to execute arbitrary OS commands by injecting command strings into unspecified PHP scripts.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.