Vulnerabilities / Threats

9/21/2017
03:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

HID Global to Acquire Mercury Security, Expanding its Leadership in Access Control

HID Global signs an agreement to acquire Mercury Security, an OEM supplier of controllers for physical access control.

AUSTIN, Texas- HID Global, a worldwide leader in trusted identity solutions, announced that it has signed an agreement to acquire Mercury Security, an OEM supplier of controllers for physical access control.  Mercury Security has over 3 million controllers installed at tens of thousands of sites worldwide, including at more than 90 of the Fortune 100 companies. Mercury’s intelligent controllers, interface boards and software perfectly complement HID’s industry-leading readers, smart cards and mobile IDs for opening doors. 

“The acquisition of Mercury Security will advance HID‘s global leadership in the physical access control industry, adding Mercury Security’s high-quality controllers to HID’s product portfolio while extending HID’s installed base of millions of users beyond the readers and smart cards that we are already well known for,” said Stefan Widing, President and CEO of HID Global.  “Customers of both HID and Mercury Security will benefit from tighter and more seamless integration of controllers with readers and credentials, as well as from our shared vision for an open, flexible approach to access control.” 

HID’s acquisition of Mercury Security is subject to regulatory approval and customary closing conditions. The closing of the deal is expected to happen by Q4 2017. Financial terms of the agreement are not being publicly disclosed.  

Based in Long Beach, California, Mercury Security has built an unrivaled access control product platform. Mercury Security has relationships with nearly all the significant OEM partners and has been working together with HID as a partner for over a decade. 

Pending the close, the Mercury Security team will report into HID’s Physical Access Control Solutions (PACS) business, which is led by Harm Radstaak, Vice President and Managing Director.  

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Meet 'Bro': The Best-Kept Secret of Network Security
Greg Bell, CEO, Corelight,  6/14/2018
Containerized Apps: An 8-Point Security Checklist
Jai Vijayan, Freelance writer,  6/14/2018
Four Faces of Fraud: Identity, 'Fake' Identity, Ransomware & Digital
David Shefter, Chief Technology Officer at Ziften Technologies,  6/14/2018
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2018-0291
PUBLISHED: 2018-06-20
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol ...
CVE-2018-0292
PUBLISHED: 2018-06-20
A vulnerability in the Internet Group Management Protocol (IGMP) Snooping feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in ...
CVE-2018-0293
PUBLISHED: 2018-06-20
A vulnerability in role-based access control (RBAC) for Cisco NX-OS Software could allow an authenticated, remote attacker to execute CLI commands that should be restricted for a nonadministrative user. The attacker would have to possess valid user credentials for the device. The vulnerability is du...
CVE-2018-0294
PUBLISHED: 2018-06-20
A vulnerability in the write-erase feature of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, local attacker to configure an unauthorized administrator account for an affected device. The vulnerability exists because the affected software does not properly delete sensitive...
CVE-2018-0295
PUBLISHED: 2018-06-20
A vulnerability in the Border Gateway Protocol (BGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the device unexpectedly reloading. The vulnerability is due to incomplete input validation of the BGP update...