Vulnerabilities / Threats

9/21/2017
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

HID Global to Acquire Mercury Security, Expanding its Leadership in Access Control

HID Global signs an agreement to acquire Mercury Security, an OEM supplier of controllers for physical access control.

AUSTIN, Texas- HID Global, a worldwide leader in trusted identity solutions, announced that it has signed an agreement to acquire Mercury Security, an OEM supplier of controllers for physical access control.  Mercury Security has over 3 million controllers installed at tens of thousands of sites worldwide, including at more than 90 of the Fortune 100 companies. Mercury’s intelligent controllers, interface boards and software perfectly complement HID’s industry-leading readers, smart cards and mobile IDs for opening doors. 

“The acquisition of Mercury Security will advance HID‘s global leadership in the physical access control industry, adding Mercury Security’s high-quality controllers to HID’s product portfolio while extending HID’s installed base of millions of users beyond the readers and smart cards that we are already well known for,” said Stefan Widing, President and CEO of HID Global.  “Customers of both HID and Mercury Security will benefit from tighter and more seamless integration of controllers with readers and credentials, as well as from our shared vision for an open, flexible approach to access control.” 

HID’s acquisition of Mercury Security is subject to regulatory approval and customary closing conditions. The closing of the deal is expected to happen by Q4 2017. Financial terms of the agreement are not being publicly disclosed.  

Based in Long Beach, California, Mercury Security has built an unrivaled access control product platform. Mercury Security has relationships with nearly all the significant OEM partners and has been working together with HID as a partner for over a decade. 

Pending the close, the Mercury Security team will report into HID’s Physical Access Control Solutions (PACS) business, which is led by Harm Radstaak, Vice President and Managing Director.  

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
WebAuthn, FIDO2 Infuse Browsers, Platforms with Strong Authentication
John Fontana, Standards & Identity Analyst, Yubico,  9/19/2018
Turn the NIST Cybersecurity Framework into Reality: 5 Steps
Mukul Kumar & Anupam Sahai, CISO & VP of Cyber Practice and VP Product Management, Cavirin Systems,  9/20/2018
NSS Labs Files Antitrust Suit Against Symantec, CrowdStrike, ESET, AMTSO
Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/19/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Flash Poll
The Risk Management Struggle
The Risk Management Struggle
The majority of organizations are struggling to implement a risk-based approach to security even though risk reduction has become the primary metric for measuring the effectiveness of enterprise security strategies. Read the report and get more details today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-11763
PUBLISHED: 2018-09-25
In Apache HTTP Server 2.4.17 to 2.4.34, by sending continuous, large SETTINGS frames a client can occupy a connection, server thread and CPU time without any connection timeout coming to effect. This affects only HTTP/2 connections. A possible mitigation is to not enable the h2 protocol.
CVE-2018-14634
PUBLISHED: 2018-09-25
An integer overflow flaw was found in the Linux kernel's create_elf_tables() function. An unprivileged local user with access to SUID (or otherwise privileged) binary could use this flaw to escalate their privileges on the system. Kernel versions 2.6.x, 3.10.x and 4.14.x are believed to be vulnerabl...
CVE-2018-1664
PUBLISHED: 2018-09-25
IBM DataPower Gateway 7.1.0.0 - 7.1.0.23, 7.2.0.0 - 7.2.0.21, 7.5.0.0 - 7.5.0.16, 7.5.1.0 - 7.5.1.15, 7.5.2.0 - 7.5.2.15, and 7.6.0.0 - 7.6.0.8 as well as IBM DataPower Gateway CD 7.7.0.0 - 7.7.1.2 echoing of AMP management interface authorization headers exposes login credentials in browser cache. ...
CVE-2018-1669
PUBLISHED: 2018-09-25
IBM DataPower Gateway 7.1.0.0 - 7.1.0.23, 7.2.0.0 - 7.2.0.21, 7.5.0.0 - 7.5.0.16, 7.5.1.0 - 7.5.1.15, 7.5.2.0 - 7.5.2.15, and 7.6.0.0 - 7.6.0.8 as well as IBM DataPower Gateway CD 7.7.0.0 - 7.7.1.2 are vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote atta...
CVE-2018-1539
PUBLISHED: 2018-09-25
IBM Rational Engineering Lifecycle Manager 5.0 through 5.02 and 6.0 through 6.0.6 could allow remote attackers to bypass authentication via a direct request or forced browsing to a page other than URL intended. IBM X-Force ID: 142561.