Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Operations

6/2/2016
02:00 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Optiv Security Further Strengthens New England Presence with Acquisition of Adaptive Communications

Move Enables Company to Better Meet the Growing Cyber Security Needs of New England Businesses

DENVER – June 2, 2016Optiv Security, a market-leading provider of end-to-end cyber security solutions, today announced that it has completed its acquisition of Adaptive Communications LLC, a New England-based provider of robust and flexible information security solutions. The transaction further strengthens Optiv’s presence across New England while increasing its cyber security capabilities and expertise in the region. As a result, companies based in New England will have more local access to Optiv’s comprehensive services and solutions to better plan, build and run successful cyber security programs. The terms of the transaction are not being disclosed.

“Optiv is on a mission to help make businesses more secure,” said Tim Hoffman, Optiv’s executive vice president, client solutions. “Since entering the New England market in 2011, we have built a solid presence, and attracted strong regional leadership and an exceptional team of cyber security professionals. This acquisition presents an opportunity to add scale to our New England region and efficiently provide cyber security services and solutions that can be leveraged to better meet our clients’ specific needs. We are pleased with our success in New England, and we are confident that partnering with Adaptive will only add to our momentum.”

This transaction brings together two premier cyber security companies, providing clients with:

·         An expanded regional presence with more local resources and capabilities to meet clients’ specific cyber security needs.

·         An even broader and deeper New England-based team of seasoned security experts available to provide market-leading end-to-end cyber security solutions.

·         Exceptional relationships with the industry’s leading technology manufacturers.

“Since our inception nearly 20 years ago, Adaptive has been committed to serving local clients and communities,” said Steve Thorpe, president for Adaptive Communications. “Our professionalism, technical consistency and attention to detail have enabled our dedicated staff to grow an impressive and loyal customer base of more than 600 organizations. We are excited to join the Optiv team and look forward to further expanding the capabilities we provide to New England-based businesses.”

Holland & Hart LLP served as advisors to Optiv on the transaction.

 

About Optiv Security
Optiv is a market-leading provider of end-to-end cyber security solutions. We help clients plan, build and run successful cyber security programs that achieve business objectives through our depth and breadth of cyber security offerings, extensive capabilities and proven expertise in cyber security strategy, managed security services, incident response, risk and compliance, security consulting, training and support, integration and architecture services, and security technology. A portfolio company, majority-owned by Blackstone (NYSE: BX) in conjunction with Investcorp and Sverica Capital Management, Optiv maintains premium partnerships with more than 300 of the leading security technology manufacturers. For more information, visit www.optiv.com or follow us at www.twitter.com/optiv, www.facebook.com/optivinc and www.linkedin.com/company/optiv-inc.

 

About Adaptive Communications

Since 1998, Adaptive Communications has dedicated itself to becoming the premier value-added reseller, designer, and installer of enterprise networking, information security and data storage solutions on the East coast. Since its inception, Adaptive’s core values of professional commitment, customer focus, technical consistency, and attention to detail have not gone unnoticed. We take great pride in our ability to successfully design, install and support state-of-the-art solutions and meet the critical networking, storage and security needs of the country’s largest corporations.

 

###

 

 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
How to Better Secure Your Microsoft 365 Environment
Kelly Sheridan, Staff Editor, Dark Reading,  1/25/2021
Attackers Leave Stolen Credentials Searchable on Google
Kelly Sheridan, Staff Editor, Dark Reading,  1/21/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-3331
PUBLISHED: 2021-01-27
WinSCP before 5.17.10 allows remote attackers to execute arbitrary programs when the URL handler encounters a crafted URL that loads session settings. (For example, this is exploitable in a default installation in which WinSCP is the handler for sftp:// URLs.)
CVE-2021-3326
PUBLISHED: 2021-01-27
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid input sequences in the ISO-2022-JP-3 encoding, fails an assertion in the code path and aborts the program, potentially resulting in a denial of service.
CVE-2021-22641
PUBLISHED: 2021-01-27
A heap-based buffer overflow issue has been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22653
PUBLISHED: 2021-01-27
Multiple out-of-bounds write issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).
CVE-2021-22655
PUBLISHED: 2021-01-27
Multiple out-of-bounds read issues have been identified in the way the application processes project files, allowing an attacker to craft a special project file that may allow arbitrary code execution on the Tellus Lite V-Simulator and V-Server Lite (versions prior to 4.0.10.0).