RELX Group Agrees to Buy ThreatMetrix for £580M CashRELX Group Agrees to Buy ThreatMetrix for £580M Cash
Authentication firm ThreatMetrix will become part of Risk & Business Analytics under the LexisNexis Risk Solutions brand.
January 30, 2018
RELX Group will acquire ThreatMetrix in a cash transaction of £580 million, or about $817 million USD. The digital identity firm will become part of RELX's Risk & Business Analytics under the LexisNexis Risk Solutions division, officials report.
San Jose-based ThreatMetrix was founded in 2005. Its technology analyzes connections among devices, locations, anonymous identity information, and threat intelligence, and applies behavioral analytics to detect risky transactions. It processes more than 100 million transactions each day, encompassing 1.4 billion unique identities from 4.5 billion devices.
The company has already been working with LexisNexis Risk Solutions, which works in fraud and authentication by applying analytics to identity credentials, addresses, and asset ownership. LexisNexis Risk Solutions uses ThreatMetrix's device intelligence tools in its Risk Defense Platform. It appears the two companies are joining forces to expand RELX's portfolio.
"Further integration of ThreatMetrix's capabilities in device, email and social intelligence will build a more complete picture of risk in today's global, mobile digital economy, providing both physical and digital identity solutions," says ThreatMetrix. The deal is expected to close in the first half of 2018.
Read more details here.
About the Author(s)
You May Also Like
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
What's In Your Cloud?Nov 30, 2023
Everything You Need to Know About DNS AttacksNov 30, 2023
Passwords Are Passe: Next Gen Authentication Addresses Today's Threats
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Everything You Need to Know About DNS Attacks
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks