Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

8/27/2020
02:15 PM
50%
50%

Fastly to Acquire Signal Sciences for $775M

Signal Sciences' technology will be used to build a new web application and API security tool called [email protected]

Cloud services provider Fastly has confirmed plans to acquire Signal Sciences, a web application and API protection company, for $775 million.

California-based Signal Sciences was founded in 2014 and has raised $61.7 million in funding, Crunchbase reports. Its web application security platform was built to protect critical apps, microservices, and APIs, regardless of architecture and infrastructure. The tool covers bot management, account takeover protection, API protection, runtime self-application protection, rate limiting, and web application firewall.

Related Content:

Palo Alto Networks to Acquire The Crypsis Group for $265M

Accenture Buys Revolutionary Security in Third Acquisition of 2020

Fastly plans to use this technology and combine it with its existing products to create a new security tool called [email protected] It says this will be a unified web application and API security platform that will integrate with its [email protected] platform and give developers more control over security of their code, and greater visibility and agility, as applications move to the edge.

"We understand the responsibility we have to help not just our customers, but our customers' customers," Fastly writes in a blog post on the acquisition. "We have long envisioned a single security solution that protected web applications and web APIs at the edge, closer to users and out of the datacenter."

Read more details here.  

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Look Beyond the 'Big 5' in Cyberattacks
Robert Lemos, Contributing Writer,  11/25/2020
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: I think the boss is bing watching '70s TV shows again!
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-28576
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version and build information.
CVE-2020-28577
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal server hostname and db names.
CVE-2020-28582
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal number of managed agents.
CVE-2020-28583
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal version, build and patch information.
CVE-2020-28573
PUBLISHED: 2020-12-01
An improper access control information disclosure vulnerability in Trend Micro Apex One and OfficeScan XG SP1 could allow an unauthenticated user to connect to the product server and reveal the total agents managed by the server.