Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/22/2009
05:19 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Entrust Files Investor Presentation With SEC

Urges Entrust stockholders to vote for the amended merger agreement with Thoma Bravo

DALLAS, July 16 /PRNewswire-FirstCall/ -- Entrust (Nasdaq: ENTU), a world leader in securing digital identities and information, today filed an investor presentation with the Securities and Exchange Commission (the "SEC") in connection with the Company's amended merger agreement with an affiliate of Thoma Bravo, LLC ("Thoma Bravo"), under which Thoma Bravo will acquire all of the outstanding shares of Entrust for $2.00 per share in cash.

The Company's presentation is available on the Investor Relations section of the Company's Web site at www.entrust.com/investor/thoma-bravo.htm or at the SEC's Web site at www.sec.gov.

The Company's board of directors urges stockholders of Entrust to vote FOR the amended merger agreement - by telephone, Internet or by signing, dating and returning the Company's proxy card today.

Any Entrust stockholders who have questions or require assistance voting their shares should contact the Company's proxy solicitor, Innisfree M&A Incorporated, toll-free at (877) 825-8772.

Additional Information and Where You Can Find It

In connection with the proposed transaction, Entrust has filed a proxy statement and relevant documents concerning the proposed transaction with the SEC. Investors and security holders of Entrust are urged to read the proxy statement and any other relevant documents filed with the SEC because they will contain important information about Entrust and the proposed transaction. The proxy statement and any other documents filed by Entrust with the SEC may be obtained free of charge at the SEC's web site at www.sec.gov. In addition, investors and security holders may obtain free copies of the documents filed with the SEC by Entrust by contacting Entrust Investor Relations at [email protected] or via telephone at 972-728-0424. Investors and security holders are urged to read the proxy statement and the other relevant materials when they become available before making any voting or investment decision with respect to the proposed transaction.

Entrust and its directors, executive officers and certain other members of its management and employees may, under SEC rules, be deemed to be participants in the solicitation of proxies from Entrust's stockholders in connection with the transaction. Information regarding the interests of such directors and executive officers (which may be different then those of Entrust's stockholders generally) is included in Entrust's proxy statements and Annual Reports on Form 10-K, previously filed with the SEC, and information concerning all of Entrust's participants in the solicitation will be included in the proxy statement relating to the proposed transaction when it becomes available. Each of these documents is, or will be, available free of charge at the SEC's web site at http://www.sec.gov and from Investor Relations Entrust, at entrust.com\investor.

About Entrust

Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises and governments in more than 2,000 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include SSL, authentication, fraud detection, shared data protection and e-mail security. For information, call 888-690-2424, e-mail [email protected] or visit www.Entrust.com.

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/27/2020
The Problem with Artificial Intelligence in Security
Dr. Leila Powell, Lead Security Data Scientist, Panaseer,  5/26/2020
How an Industry Consortium Can Reinvent Security Solution Testing
Henry Harrison, Co-founder & Chief Technology Officer, Garrison,  5/21/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8603
PUBLISHED: 2020-05-27
A cross-site scripting vulnerability (XSS) in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow a remote attacker to tamper with the web interface of affected installations. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or ...
CVE-2020-8604
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to disclose sensitive informatoin on affected installations.
CVE-2020-8605
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to execute arbitrary code on affected installations. Authentication is required to exploit this vulnerability.
CVE-2020-8606
PUBLISHED: 2020-05-27
A vulnerability in Trend Micro InterScan Web Security Virtual Appliance 6.5 may allow remote attackers to bypass authentication on affected installations of Trend Micro InterScan Web Security Virtual Appliance.
CVE-2020-11075
PUBLISHED: 2020-05-27
In Anchore Engine version 0.7.0, a specially crafted container image manifest, fetched from a registry, can be used to trigger a shell escape flaw in the anchore engine analyzer service during an image analysis process. The image analysis operation can only be executed by an authenticated user via a...