Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations //

Identity & Access Management

6/4/2018
11:45 AM
50%
50%

Fortinet Completes Bradford Networks Purchase

NAC and security firm added to Fortinet's portfolio.

Fortinet has completed its purchase of Bradford Networks, a network security visibility and automation company. Financial details of the purchase were not disclosed.

Bradford Networks Network Sentry's product automates a security response to malicious events and has previous integration into the Fortinet Fortigate framework.

In a statement accompanying news of the purchase, Fortinet CEO Ken Xie noted that the integration provides "continuous visibility, micro-segmentation and access control technology" for large enterprise networks.

Bradford Networks CEO Rob Scott, in a statement concerning the purchase, noted that the two companies' products could have an impact on difficult security environments, "…such as critical infrastructure — power, oil and gas and manufacturing."

For more, read here and here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NathanDavidson
50%
50%
NathanDavidson,
User Rank: Moderator
12/22/2018 | 1:47:30 AM
Fulfilling demand
In every industry, almost every organization would be seen acquiring one another especially those operating similar businesses. This is to expand their service coverage so as to reach out to a wider target audience. Greater demands can then be fulfilled, making the industry a smoother place of consumerism.
UdyRegan
50%
50%
UdyRegan,
User Rank: Apprentice
12/18/2018 | 2:06:22 AM
Good Business Deals
AT the end of the day, if the acquisition allows both companies to benefit in terms of protection and reach, then I don't see why there shouldn't be more encouragement and celebration for the takeover. It doesn't seem like any of the employees were reshuffled or redirected to other parts of the business either so it's really operations as per usual isn't it? Except with better capabilities and opportunities on the horizon!
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/6/2018 | 8:56:55 AM
Cheaper to Buy than to Build
It seems like this will continue to be on ongoing trend of acquisitions. Working in a shop that has performed both, in the long run it seems like acquisition will typcially be the most cost effective way of diversifying the company portfolio.
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-23901
PUBLISHED: 2021-01-25
An XML external entity (XXE) injection vulnerability was discovered in the Nutch DmozParser and is known to affect Nutch versions < 1.18. XML external entity injection (also known as XXE) is a web security vulnerability that allows an attacker to interfere with an application's processing of XML ...
CVE-2020-17532
PUBLISHED: 2021-01-25
When handler-router component is enabled in servicecomb-java-chassis, authenticated user may inject some data and cause arbitrary code execution. The problem happens in versions between 2.0.0 ~ 2.1.3 and fixed in Apache ServiceComb-Java-Chassis 2.1.5
CVE-2020-12512
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated reflected POST Cross-Site Scripting
CVE-2020-12513
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to an authenticated blind OS Command Injection.
CVE-2020-12514
PUBLISHED: 2021-01-22
Pepperl+Fuchs Comtrol IO-Link Master in Version 1.5.48 and below is prone to a NULL Pointer Dereference that leads to a DoS in discoveryd