Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.


08:00 AM

Entrust Bags Business Signatures

Security vendor gets anti-fraud gear and new inroads to financial services market

Authentication specialist Entrust today bought privately held anti-fraud specialist Business Signatures for $50 million in cash, as it looks to boost its data security story.

Business Signatures is a competitor to Cyota, which will soon be part of the EMC portfolio, thanks to its recent $2.1 billion acquisition of RSA. (See EMC Buys RSA, Users Welcome Super-Deal, RSA Ramps Up Revenues , and Did EMC Overpay?.) Cyota, which was bought by RSA back in December, has already been identified as a potential jewel in the crown for EMC, offering the storage vendor a clear path to lucrative deals in the financial sector. (See RSA to Acquire Cyota, EMC Secures RSA for $2.1B, RSA IDs Phishing Technique, and RSA Reports on Fraud.)

"Customers have immediate security requirements that over time will spread across multiple applications and storage devices," said Bill Conner, Entrust CEO, speaking on a conference call this morning. "Sensitive data does not reside in one place, it is fluid and is used across the organization," he added.

Business Signatures' flagship software eFraud monitors firms' customer transactions. The product works by converting HTTP data streams generated by a transactional Website into what it describes as "business signatures." These could be, for example, identifying which individual customers are setting up fund transfers on a financial firm's Website.

Over the next six months, Entrust will integrate Business Signatures' technology with its own IdentityGuard authentication software, although Chris Voice, Entrust's CTO, told Dark Reading that this is just the first step in a broader data security push.

As well as authentication, Entrust offers a family of software products which aim to lock down data as it moves across a network from, for example, file systems and email servers. "We have an information platform that's about keeping data encrypted," he explained.

Sometime in 2007, according to the exec, Entrust will look to integrate eFraud with this technology, adding an additional layer of internal security. "One of the strengths of eFraud is that it can passively detect what is happening on the wire," he said. "There's no reason why that could not be applied to your internal networks."

The exec added that the combined offering could be used, for example, to monitor data going to and coming from a database. But Voice said that Entrust is not setting itself up as a direct competitor to encryption specialists such as Decru and Neoscale. (See Decru Unveils New Gear, NeoScale Intros Encryption Suite, and NeoScale Claims Speedy Encryption.)

"What we have found is that there is enough encryption technology coming from the storage and the database vendors," he said, adding that Entrust will remain focused on data as it moves across an organization.

Certainly, more and more vendors are touting encryption, particularly at the file level, as a way to avoid embarrassing and potentially costly data breaches. (See File Security Gets All Cryptic, Decru Picks Key Partners, and New PGP Extends Encryption.)

Voice also confirmed that Business Signatures CEO Peter Relan and the firm's 40-strong workforce will be moving over to Entrust. The Dallas-based firm will also keep Business Signatures' site in Redwood City, Calif.

Just as Cyota represents an opening into the lucrative financial market for EMC, Entrust already sees Business Signatures in terms of dollar signs. Execs on this morning's call said that they expect the new acquisition to deliver up to $4 million in revenue over the remainder of this year, and around $10 million over the next 12 months.

This performance could prove critical for Entrust, which also released its second quarter financial results today, posting revenues of $22.1 million, down from $24.8 million in the same period last year, and just below analyst estimates of $22.61 million. (See Entrust Announces Q2.)

The vendor also recorded a second quarter net loss of $1.3 million, or 2 cents per share, compared to net income of $1.1 million, or 2 cents per share, in the year ago quarter. This was also below analyst estimates.

In trading today, shares of Entrust dropped 21 cents (6.77 percent) to $2.89.

— James Rogers, Senior Editor, Byte and Switch

  • Decru Inc.
  • EMC Corp. (NYSE: EMC)
  • Entrust Inc.
  • NeoScale Systems Inc.
  • RSA Security Inc. (Nasdaq: EMC)

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 9/25/2020
    Hacking Yourself: Marie Moe and Pacemaker Security
    Gary McGraw Ph.D., Co-founder Berryville Institute of Machine Learning,  9/21/2020
    Startup Aims to Map and Track All the IT and Security Things
    Kelly Jackson Higgins, Executive Editor at Dark Reading,  9/22/2020
    Register for Dark Reading Newsletters
    White Papers
    Current Issue
    Special Report: Computing's New Normal
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    How IT Security Organizations are Attacking the Cybersecurity Problem
    How IT Security Organizations are Attacking the Cybersecurity Problem
    The COVID-19 pandemic turned the world -- and enterprise computing -- on end. Here's a look at how cybersecurity teams are retrenching their defense strategies, rebuilding their teams, and selecting new technologies to stop the oncoming rise of online attacks.
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    PUBLISHED: 2020-09-25
    In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, when determining the common dimension size of two tensors, TFLite uses a `DCHECK` which is no-op outside of debug compilation modes. Since the function always returns the dimension of the first tensor, malicious attackers can ...
    PUBLISHED: 2020-09-25
    In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, a crafted TFLite model can force a node to have as input a tensor backed by a `nullptr` buffer. This can be achieved by changing a buffer index in the flatbuffer serialization to convert a read-only tensor to a read-write one....
    PUBLISHED: 2020-09-25
    In tensorflow-lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, if a TFLite saved model uses the same tensor as both input and output of an operator, then, depending on the operator, we can observe a segmentation fault or just memory corruption. We have patched the issue in d58c96946b and ...
    PUBLISHED: 2020-09-25
    In TensorFlow Lite before versions 1.15.4, 2.0.3, 2.1.2, 2.2.1 and 2.3.1, saved models in the flatbuffer format use a double indexing scheme: a model has a set of subgraphs, each subgraph has a set of operators and each operator has a set of input/output tensors. The flatbuffer format uses indices f...
    PUBLISHED: 2020-09-25
    In TensorFlow Lite before versions 2.2.1 and 2.3.1, models using segment sum can trigger writes outside of bounds of heap allocated buffers by inserting negative elements in the segment ids tensor. Users having access to `segment_ids_data` can alter `output_index` and then write to outside of `outpu...