Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

10/8/2019
09:45 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

VMware Completes Tender Offer for Carbon Black Common Stock

PALO ALTO, Calif., Oct. 08, 2019 (GLOBE NEWSWIRE) -- VMware, Inc. (NYSE: VMW) and Carbon Black, Inc. (NASDAQ: CBLK) today announced that VMware has successfully completed its previously announced tender offer to purchase all outstanding shares of common stock (the “Shares”), of Carbon Black for a price of $26 per share (the “Tender Offer”), net to the seller in cash, without interest and less any applicable withholding taxes. 

The Tender Offer expired at 5:00 p.m., New York City Time, on Monday, October 7, 2019 and was not extended. Approximately 64.1 million Shares of Carbon Black, representing approximately 85.1% of the outstanding Shares, were validly tendered in the Tender Offer and not validly withdrawn.

All conditions to the Tender Offer were satisfied. All Shares of Carbon Black that were validly tendered and not validly withdrawn have been accepted for purchase.

VMware will promptly complete its acquisition of Carbon Black through consummation of a merger of Calistoga Merger Corp., with and into Carbon Black without a vote of the Carbon Black stockholders, in accordance with Section 251(h) of the General Corporation Law of the State of Delaware. Each remaining Share of Carbon Black not purchased in the Tender Offer (other than the exceptions) will be converted into the right to receive the same $26 in cash, without interest and less any applicable withholding taxes, that will be paid in the Tender Offer. Upon completion of the merger, Carbon Black will be a wholly-owned subsidiary of VMware.

As a result of the acquisition, Shares of Carbon Black will cease to be traded on the Nasdaq Stock Market, effective today as of market open.

About Carbon Black

Carbon Black (NASDAQ: CBLK) is a leader in cloud-native endpoint protection dedicated to keeping the world safe from cyberattacks. The CB Predictive Security Cloud® (PSC) consolidates endpoint protection and IT operations into an endpoint protection platform (EPP) that prevents advanced threats, provides actionable insight and enables businesses of all sizes to simplify operations. By analyzing billions of security events per day across the globe, Carbon Black has key insights into attackers’ behaviors, enabling customers to detect, respond to and stop emerging attacks.

More than 5,600 global customers, including approximately one third of the Fortune 100, trust Carbon Black to protect their organizations from cyberattacks. The company’s partner ecosystem features more than 500 MSSPs, VARs, distributors and technology integrations, as well as many of the world’s leading IR firms, who use Carbon Black’s technology in more than 500 breach investigations per year.

Carbon Black and CB Predictive Security Cloud are registered trademarks or trademarks of Carbon Black, Inc. in the United States and other jurisdictions.

About VMware

VMware software powers the world’s complex digital infrastructure. The company’s cloud, networking and security, and digital workspace offerings provide a dynamic and efficient digital foundation to customers globally, aided by an extensive ecosystem of partners. Headquartered in Palo Alto, California, VMware is committed to being a force for good, from its breakthrough innovations to its global impact. For more information, please visit https://www.vmware.com/company.html.

Contacts

Paul Ziots
VMware Investor Relations
[email protected] 
650-427-3267

Michael Thacker
VMware Global PR
[email protected] 
650-427-4454

 

 

 

 

Comment  | 
Print  | 
More Insights
Comments
Oldest First  |  Newest First  |  Threaded View
DevSecOps: The Answer to the Cloud Security Skills Gap
Lamont Orange, Chief Information Security Officer at Netskope,  11/15/2019
Attackers' Costs Increasing as Businesses Focus on Security
Robert Lemos, Contributing Writer,  11/15/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Navigating the Deluge of Security Data
In this Tech Digest, Dark Reading shares the experiences of some top security practitioners as they navigate volumes of security data. We examine some examples of how enterprises can cull this data to find the clues they need.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-19037
PUBLISHED: 2019-11-21
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
CVE-2019-19036
PUBLISHED: 2019-11-21
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
CVE-2019-19039
PUBLISHED: 2019-11-21
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program.
CVE-2019-6852
PUBLISHED: 2019-11-20
A CWE-200: Information Exposure vulnerability exists in Modicon Controllers (M340 CPUs, M340 communication modules, Premium CPUs, Premium communication modules, Quantum CPUs, Quantum communication modules - see security notification for specific versions), which could cause the disclosure of FTP har...
CVE-2019-6853
PUBLISHED: 2019-11-20
A CWE-79: Failure to Preserve Web Page Structure vulnerability exists in Andover Continuum (models 9680, 5740 and 5720, bCX4040, bCX9640, 9900, 9940, 9924 and 9702) , which could enable a successful Cross-site Scripting (XSS attack) when using the products web server.