Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

End of the Road for Kasten Chase

Encryption specialist, beset by financial problems, discontinues operations

Publicly traded storage security vendor Kasten Chase has discontinued operations and filed for bankruptcy after failing to find a buyer or partner to pull it out of its financial hole. (See Kasten Chase Goes Under.)

According to a statement released yesterday, the firm was engaged in discussions with "a number of parties over many months" in an effort to resolve its financial problems. Earlier this year, for example, the vendor announced a net loss of $8.3 million for 2005 and signed a $1.5 million credit note to continue its operations. (See Kasten Chase Reports Financials.)

Specifically, Kasten Chase was looking for a potential buyer or a reseller agreement "with an established storage vendor," according to the company's statement, but execs confirmed that the firm was unable to clinch a deal in time.

Analysts were not exactly stunned by the news. "Kasten Chase had a unique encryption solution for MVS mainframe environments, but it's really about access to markets, access to channels, and access to customers," says Robert Amatruda, research manager at IDC.

"I wasn't surprised that it happened," adds Jon Oltisk, senior analyst at the Enterprise Strategy Group. "The company struggled financially, they were looking for partners, and I think that the clock just ran out."

Greg Schulz, senior analyst at the StorageIO Group, however, was slightly more taken aback. "I thought that they had good technology -- I am surprised that they are not able to hang on in there and make a go of it," he told Byte and Switch.

But, all the analysts agree on one thing: The marketplace for encryption and key management products for data storage is a difficult one. "It's a rough market, it's still in its infancy," explains Schulz, adding that a lot of the security vendors in this space are still doing, "early missionary work."

Despite a spate of headline-grabbing incidents involving lost tape, many users are still taking a lax approach to tape security, with the technology perceived in some quarters as low priority. (See Tape Security Trips Up Users, A Tale of Lost Tapes, and Iron Mountain Keeps Truckin'.)

Against this backdrop, Kasten Chase also faced stiff competition from the likes of Neoscale and Decru, which was snapped up by Network Appliance for $272 million last year. (See NeoScale Shows Off at SNW and NetApp Buys Decru.) "In an early market like this, it really comes down to relationships -- Decru being acquired by NetApp really helped them," notes Schulz.

Now, however, it will be interesting to see who picks up Kasten Chase's assets and its intellectual property. The vendor specialized in mainframe security, recently announcing a partnership with mainframe connectivity vendor Optica Technologies. (See Kasten Chase, Optica Team Up, and Review: Tape Encryption Devices.)

When Byte and Switch called Toronto-based Kasten Chase earlier today, a recorded message said that the firm's office was closed and that Ernst & Young is now acting as the trustee, "for the benefit of creditors."

— James Rogers, Senior Editor, Byte and Switch. Special to Dark Reading

Organizations mentioned in this article:

  • Decru Inc.
  • Ernst & Young International
  • The Enterprise Strategy Group (ESG)
  • IDC
  • Kasten Chase Applied Research Ltd.
  • NeoScale Systems Inc.
  • Network Appliance Inc. (Nasdaq: NTAP)
  • The StorageIO Group

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 9/25/2020
    9 Tips to Prepare for the Future of Cloud & Network Security
    Kelly Sheridan, Staff Editor, Dark Reading,  9/28/2020
    Vulnerability Disclosure Programs See Signups & Payouts Surge
    Kelly Sheridan, Staff Editor, Dark Reading,  9/22/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15216
    PUBLISHED: 2020-09-29
    In goxmldsig (XML Digital Signatures implemented in pure Go) before version 1.1.0, with a carefully crafted XML file, an attacker can completely bypass signature validation and pass off an altered file as a signed one. A patch is available, all users of goxmldsig should upgrade to at least revisio...
    CVE-2020-4607
    PUBLISHED: 2020-09-29
    IBM Security Secret Server (IBM Security Verify Privilege Vault Remote 1.2 ) could allow a local user to bypass security restrictions due to improper input validation. IBM X-Force ID: 184884.
    CVE-2020-24565
    PUBLISHED: 2020-09-29
    An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
    CVE-2020-25770
    PUBLISHED: 2020-09-29
    An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...
    CVE-2020-25771
    PUBLISHED: 2020-09-29
    An out-of-bounds read information disclosure vulnerabilities in Trend Micro Apex One may allow a local attacker to disclose sensitive information to an unprivileged account on vulnerable installations of the product. An attacker must first obtain the ability to execute low-privileged code on the ...