Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Analytics

12/18/2013
10:01 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Blue Coat Acquires Norman Shark

Acquisition unites zero-day sandboxing technology with advanced threat protection

SUNNYVALE, Calif., December 18, 2013– Blue Coat Systems, Inc., the market leader in business assurance technology, today announced it has acquired Norman Shark, the global leader in malware analysis solutions for enterprises, service providers and government. The acquisition unites the industry's most proven zero-day sandboxing technology with Blue Coat's leading Advanced Threat Protection solution to help customers bridge the gap between identification of advanced persistent threats and resolution of those threats.

"We have a long history of high performance web traffic processing, and by combining the industry's most proven sandboxing technology in-line with our market leading secure web gateway, we are removing an obstacle enterprises have faced up to now," said Greg Clark, CEO of Blue Coat Systems. "Integration of the Norman Shark technology with the Blue Coat Content Analysis System and Security Analytics Platform delivers a solution that protects against zero-day threats before, during and after an attack by detecting, analyzing, blocking, resolving and fortifying the network against unknown and latent threats."

Norman Shark brings to Blue Coat a world class research and malware analysis team,and its sandboxing technology represents the most mature and proven in the industry with the ability to scale to support enterprise requirements. Norman Shark's IntelliVM and SandBox emulation technologiesprovide advanced security teams the ability to analyze any threat type, in any version of any application they choose. This allows security teams to gather intelligence on malware targeting their specific environment and application vulnerabilities in order to more effectively contain and resolve the incident. Blue Coat already integrates the Norman Shark technology into its Malware Analysis Appliance to deliver the industry's most robust sandboxing capability.

"Blue Coat's acquisition of Norman Shark is a great addition to the company's advanced malware prevention, detection, and analytics capabilities," said Jon Oltsik, Senior Principal Analyst at the Enterprise Strategy Group. "The market is growing very quickly, and ESG believes that enterprises need strong integrated solutions to identify, contain and resolve advanced persistent threats in a more automated way."

Unlike point solutions, the new Blue Coat Advanced Threat Protection solution, which integrates the Norman Shark malware analysis technology, provides a lifecycle defense that fortifies the network against unknown and latent threats. The combined advanced threat protection technologies improve the efficiency and effectiveness of the Blue Coat Global Intelligence Network'sability to dynamically protect all Blue Coat customers. This comprehensive approach allows IT organizations to move beyond protection to empowering the business.

"Our team is a trusted provider to some of the largest, most demanding companies in the world and earned that position with a commitment to excellence in technology," said Stein Surlien, CEO of Norman Shark. "The power of our sandboxing technology combined with Blue Coat's gateway security and security analytics gives enterprises unmatched advanced persistent threat detection, root-cause analysis and resolution."

As part of its commitment to securely empowering businesses, Blue Coat continues to execute on its strategy of acquiring strategically important, best-of-breed technologies to deliver Business Assurance Technology solutions. The Norman Shark acquisition complements earlier acquisitions of Solera Networks and SSL technology from Netronome to provide customers with the industry's only lifecycle defense against advanced persistent threats.

About Blue Coat Systems

Blue Coat empowers enterprises to safely and quickly choose the best applications, services, devices, data sources, and content the world has to offer, so they can create, communicate, collaborate, innovate, execute, compete and win in their markets. Blue Coat is a portfolio company of Thoma Bravo, LLC. For additional information, please visit www.bluecoat.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Can Your Patching Strategy Keep Up with the Demands of Open Source?
Tim Mackey, Principal Security Strategist, CyRC, at Synopsys,  6/18/2019
Florida Town Pays $600K to Ransomware Operators
Curtis Franklin Jr., Senior Editor at Dark Reading,  6/20/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-12928
PUBLISHED: 2019-06-24
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.
CVE-2019-12929
PUBLISHED: 2019-06-24
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server.
CVE-2019-12936
PUBLISHED: 2019-06-23
BlueStacks App Player 2, 3, and 4 before 4.90 allows DNS Rebinding for attacks on exposed IPC functions.
CVE-2019-12937
PUBLISHED: 2019-06-23
apps/gsudo.c in gsudo in ToaruOS through 1.10.9 has a buffer overflow allowing local privilege escalation to the root user via the DISPLAY environment variable.
CVE-2019-12935
PUBLISHED: 2019-06-23
Shopware before 5.5.8 has XSS via the Query String to the backend/Login or backend/Login/load/ URI.