Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

Dell Acquires Security Specialist SonicWall

SonicWall's Unified Threat Management systems will let Dell compete more effectively with the likes of Juniper and Check Point.

10 Companies Driving Mobile Security
10 Companies Driving Mobile Security
(click image for larger view and for slideshow)
Dell on Tuesday said it reached a deal to acquire SonicWall with an eye to expanding its presence in the market for systems that help businesses fend off a wide range of cyber-attacks. Privately-held SonicWall specializes in so-called Unified Threat Management platforms, which combine multiple security systems into a single appliance.

Terms of the deal, which has received board approval from both companies and is expected to close in Dell's fiscal second quarter, were not disclosed. Wall Street analysts pegged the pact's value at anywhere between $1 billion and $1.5 billion.

Dell officials said customers are looking for ways to centrally management a wide range of disparate security technologies, such as antivirus and antimalware software, intrusion and prevention detection, content filtering, and VPNs, and that SonicWall's appliance firewalls provide that.

UTM "brings simplicity to what can be a very disjointed and very complex issue," said Dell Software president John Swainson, on a conference call with reporters. "Businesses are feeling worse, not better, about their ability to defend against risk."

[ You need to worry about more than external threats. Read 10 Best Ways To Stop Insider Attacks. ]

SonicWall has traditionally focused on providing security systems for small and mid-sized businesses, but began pursuing the enterprise market with its introduction of the SuperMassive E10000 series last year. The E10000 systems are designed to monitor traffic across large, corporate networks. "SonicWall aligns well with Dell's midmarket focus, and this transaction will allow us to accelerate the growth of our SuperMassive product line into Dell's large enterprise customers," said SonicWall CEO Matt Madeiros.

Dell had already been building out its security and business continuity offerings in recent years, through the acquisitions of vendors like Secure Works and App Assure, as well as the formation of its security managed services group. The SonicWall deal with bring it further into competition with enterprise security specialists like Juniper, Check Point, and Fortinet, as well as networking giant Cisco.

"The deal allows Dell to play in the next-generation Firewall market," said FBN Securities analyst Shebly Seyrafi, in a research note.

Dell also has marketing partnerships with a number of security specialists, some of which may be sacrificed as it moves deeper into the market in its own right. "Clearly as we enhance our portfolio we'll have our own offerings to provide to customers," said Dave Johnson, Dell's senior VP for corporate strategy.

Beyond the security element, Dell's plan to acquire SonicWall is indicative of a larger plan to become a bigger player in the enterprise software and systems management market.

"My goal is to make software a meaningful part of Dell's overall portfolio. This is not the last thing you're going to see from us, we are going to build and buy software assets," said Swainson. "If you think about systems management, it's an area our customers are looking for us to participate in," added Johnson.

San Jose-based SonicWall currently has about 950 employees and 300,000 active customers.

The right forensic tools in the right hands are just a start. The new Digital Detectives issue of Dark Reading shows you how to better apply the lessons they teach. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
CBELL000
50%
50%
CBELL000,
User Rank: Apprentice
3/14/2012 | 12:08:39 AM
re: Dell Acquires Security Specialist SonicWall
Looks like it is time to buy WatchGuard!
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
3/22/2012 | 1:06:28 AM
re: Dell Acquires Security Specialist SonicWall
I have to wonder if Dell's going to integrate the command and control of these (formerly) Sonicwall units into their KACE systems management product. With KACE already being able to deploy endpoint security package definitions, and Sonicwall's ability to ensure that endpoints don't get Internet connectivity unless they are up to date, it seems like a no-brainer.

It's an interesting acquisition - giving SMBs the opportunity to buy an entire Dell-branded, end to end solution.

And with regards to Dave Johnson's comment on how Dell's clients want them to participate in the systems management space - I have to wonder if he's familiar with the KACE product line. I'll admit that I'm biased in that I love working with KACE, but it seems like Dell corporate is treating it like an unwanted kitten that got left on the doorstep.

Andrew Hornback
InformationWeek Contributor
Exploits Released for As-Yet Unpatched Critical Citrix Flaw
Jai Vijayan, Contributing Writer,  1/13/2020
Microsoft to Officially End Support for Windows 7, Server 2008
Kelly Sheridan, Staff Editor, Dark Reading,  1/13/2020
Active Directory Needs an Update: Here's Why
Raz Rafaeli, CEO and Co-Founder at Secret Double Octopus,  1/16/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
[Just Released] How Enterprises are Attacking the Cybersecurity Problem
Organizations have invested in a sweeping array of security technologies to address challenges associated with the growing number of cybersecurity attacks. However, the complexity involved in managing these technologies is emerging as a major problem. Read this report to find out what your peers biggest security challenges are and the technologies they are using to address them.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-15625
PUBLISHED: 2020-01-18
A memory usage vulnerability exists in Trend Micro Password Manager 3.8 that could allow an attacker with access and permissions to the victim's memory processes to extract sensitive information.
CVE-2019-19696
PUBLISHED: 2020-01-18
A RootCA vulnerability found in Trend Micro Password Manager for Windows and macOS exists where the localhost.key of RootCA.crt might be improperly accessed by an unauthorized party and could be used to create malicious self-signed SSL certificates, allowing an attacker to misdirect a user to phishi...
CVE-2019-19697
PUBLISHED: 2020-01-18
An arbitrary code execution vulnerability exists in the Trend Micro Security 2019 (v15) consumer family of products which could allow an attacker to gain elevated privileges and tamper with protected services by disabling or otherwise preventing them to start. An attacker must already have administr...
CVE-2019-20357
PUBLISHED: 2020-01-18
A Persistent Arbitrary Code Execution vulnerability exists in the Trend Micro Security 2020 (v160 and 2019 (v15) consumer familiy of products which could potentially allow an attacker the ability to create a malicious program to escalate privileges and attain persistence on a vulnerable system.
CVE-2020-7222
PUBLISHED: 2020-01-18
An issue was discovered in Amcrest Web Server 2.520.AC00.18.R 2017-06-29 WEB 3.2.1.453504. The login page responds with JavaScript when one tries to authenticate. An attacker who changes the result parameter (to true) in this JavaScript code can bypass authentication and achieve limited privileges (...