Harris Acquires Crucial SecurityHarris Acquires Crucial Security
Crucial Security helps Harris expand presence in cybersecurity market
April 17, 2009
WASHINGTON and MELBOURNE, Fla., April 16 /PRNewswire-FirstCall/ -- Harris Corporation (NYSE: HRS), an international communications and information technology company, has completed its acquisition of privately held Crucial Security, Inc., expanding Harris capabilities and customer footprint in the cyber security market. Crucial Security has approximately 110 employees located primarily in Chantilly, Virginia.
Crucial Security offers an array of mission-enabling engineering solutions that address both offensive and defensive IT security challenges. The company provides critical support to federal law enforcement and other U.S. government agencies. Their core cyber competencies:
-- enable customers to launch sophisticated attacks against their own systems to determine network vulnerabilities; -- defend against outside attacks utilizing technology such as malicious code reverse engineering to determine the functionality of hostile programs; -- include predictive capabilities that allow for large-scale, high-speed bulk analysis, visualization, and graphic display of mission-critical data; and -- include cutting-edge computer forensics for the extraction and examination of counterintelligence and counterterrorism evidence that may be stored on captured computer hard drives or other digital storage media.
"Crucial Security's deep understanding of both offensive and defensive cyber security, unparalleled software engineering domain expertise, and immensely talented employees -- most of whom have high-level security clearances -- add significantly to our current initiatives in the fast-growing cyber security market," said Howard L. Lance, chairman, president and CEO of Harris. "With this acquisition and the recent hiring of Dale Meyerrose, former CIO (Chief Information Officer) for the Intelligence Community, we have greatly expanded our leadership and expertise in cyber and information assurance. Crucial Security is deeply embedded with its customers and has key contracts with federal law enforcement and intelligence agencies. The company's services and solutions have broad applications to the Law Enforcement Community, all agencies within the Intelligence Community, Department of Defense, and civilian markets."
"Crucial Security has a solid track record with high levels of customer satisfaction and technical excellence," said Meyerrose, vice president of Cyberspace Solutions for Harris. "As part of Harris, Crucial Security will continue to provide the same outstanding level of service to its existing customer base while taking advantage of the additional scale economies and technical resources."
Meyerrose is a retired U.S. Air Force Major General and was named vice president of Harris Cyberspace Solutions, a newly created position, in January. He is responsible for leading all aspects of strategy, business development, and program execution for the company's cyberspace business. Harris has been using state-of-the-art technology assessment techniques and architecture engineering for decades to define and operate secure networks supporting nationally critical programs. The company's technology countermeasures and monitoring capabilities, backed by more than 200 cyber professionals, proactively safeguard vital information assets supporting the missions of U.S. military, intelligence, transportation, and commerce customers. The company currently supports three of the nation's largest secure networks, including the FAA Telecommunications Infrastructure, the National Reconnaissance Office network, and the Navy and Marine Corps Intranet.
About Harris Corporation
Harris is an international communications and information technology company serving government and commercial markets in more than 150 countries. Headquartered in Melbourne, Florida, the company has annual revenue of more than $5.4 billion and 16,000 employees -- including nearly 7,000 engineers and scientists. Harris is dedicated to developing best-in-class assured communications(R) products, systems, and services. Additional information about Harris Corporation is available at www.harris.com.
This press release contains forward-looking statements that reflect management's current expectations, assumptions and estimates of future performance and economic conditions. Such statements are made in reliance upon the safe harbor provisions of Section 27A of the Securities Act of 1933 and Section 21E of the Securities Exchange Act of 1934. The company cautions investors that any forward-looking statements are subject to risks and uncertainties that may cause actual results and future trends to differ materially from those matters expressed in or implied by such forward-looking statements. Statements about the expected value of the program to Harris are forward-looking and involve risks and uncertainties. Harris disclaims any intention or obligation to update or revise any forward-looking statements, whether as a result of new information, future events, or otherwise.
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
AI in Cybersecurity: Using artificial intelligence to mitigate emerging security risks
The Evolving Ransomware Threat: What Business Leaders Should Know About Data Leakage
Managed Security and the 3rd Party Cyber Risk Opportunity Whitepaper