Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

7/22/2009
05:19 PM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Entrust Files Investor Presentation With SEC

Urges Entrust stockholders to vote for the amended merger agreement with Thoma Bravo

DALLAS, July 16 /PRNewswire-FirstCall/ -- Entrust (Nasdaq: ENTU), a world leader in securing digital identities and information, today filed an investor presentation with the Securities and Exchange Commission (the "SEC") in connection with the Company's amended merger agreement with an affiliate of Thoma Bravo, LLC ("Thoma Bravo"), under which Thoma Bravo will acquire all of the outstanding shares of Entrust for $2.00 per share in cash.

The Company's presentation is available on the Investor Relations section of the Company's Web site at www.entrust.com/investor/thoma-bravo.htm or at the SEC's Web site at www.sec.gov.

The Company's board of directors urges stockholders of Entrust to vote FOR the amended merger agreement - by telephone, Internet or by signing, dating and returning the Company's proxy card today.

Any Entrust stockholders who have questions or require assistance voting their shares should contact the Company's proxy solicitor, Innisfree M&A Incorporated, toll-free at (877) 825-8772.

Additional Information and Where You Can Find It

In connection with the proposed transaction, Entrust has filed a proxy statement and relevant documents concerning the proposed transaction with the SEC. Investors and security holders of Entrust are urged to read the proxy statement and any other relevant documents filed with the SEC because they will contain important information about Entrust and the proposed transaction. The proxy statement and any other documents filed by Entrust with the SEC may be obtained free of charge at the SEC's web site at www.sec.gov. In addition, investors and security holders may obtain free copies of the documents filed with the SEC by Entrust by contacting Entrust Investor Relations at [email protected] or via telephone at 972-728-0424. Investors and security holders are urged to read the proxy statement and the other relevant materials when they become available before making any voting or investment decision with respect to the proposed transaction.

Entrust and its directors, executive officers and certain other members of its management and employees may, under SEC rules, be deemed to be participants in the solicitation of proxies from Entrust's stockholders in connection with the transaction. Information regarding the interests of such directors and executive officers (which may be different then those of Entrust's stockholders generally) is included in Entrust's proxy statements and Annual Reports on Form 10-K, previously filed with the SEC, and information concerning all of Entrust's participants in the solicitation will be included in the proxy statement relating to the proposed transaction when it becomes available. Each of these documents is, or will be, available free of charge at the SEC's web site at http://www.sec.gov and from Investor Relations Entrust, at entrust.com\investor.

About Entrust

Entrust [NASDAQ: ENTU] secures digital identities and information for consumers, enterprises and governments in more than 2,000 organizations spanning 60 countries. Leveraging a layered security approach to address growing risks, Entrust solutions help secure the most common digital identity and information protection pain points in an organization. These include SSL, authentication, fraud detection, shared data protection and e-mail security. For information, call 888-690-2424, e-mail [email protected] or visit www.Entrust.com.

Entrust is a registered trademark of Entrust, Inc. in the United States and certain other countries. In Canada, Entrust is a registered trademark of Entrust Limited. All Entrust product names are trademarks or registered trademarks of Entrust, Inc. or Entrust Limited. All other company and product names are trademarks or registered trademarks of their respective owners.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Cyber-Risk Is a C-Suite Issue
Marc Wilczek, Digital Strategist & CIO Advisor,  11/12/2019
Black Hat Q&A: Hacking a '90s Sports Car
Black Hat Staff, ,  11/7/2019
The Cold Truth about Cyber Insurance
Chris Kennedy, CISO & VP Customer Success, AttackIQ,  11/7/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
Rethinking Enterprise Data Defense
Rethinking Enterprise Data Defense
Frustrated with recurring intrusions and breaches, cybersecurity professionals are questioning some of the industrys conventional wisdom. Heres a look at what theyre thinking about.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18954
PUBLISHED: 2019-11-14
Pomelo v2.2.5 allows external control of critical state data. A malicious user input can corrupt arbitrary methods and attributes in template/game-server/app/servers/connector/handler/entryHandler.js because certain internal attributes can be overwritten via a conflicting name. Hence, a malicious at...
CVE-2019-3640
PUBLISHED: 2019-11-14
Unprotected Transport of Credentials in ePO extension in McAfee Data Loss Prevention 11.x prior to 11.4.0 allows remote attackers with access to the network to collect login details to the LDAP server via the ePO extension not using a secure connection when testing LDAP connectivity.
CVE-2019-3661
PUBLISHED: 2019-11-14
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to execute database commands via carefully constructed time based payloads.
CVE-2019-3662
PUBLISHED: 2019-11-14
Path Traversal: '/absolute/pathname/here' vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows remote authenticated attacker to gain unintended access to files on the system via carefully constructed HTTP requests.
CVE-2019-3663
PUBLISHED: 2019-11-14
Unprotected Storage of Credentials vulnerability in McAfee Advanced Threat Defense (ATD) prior to 4.8 allows local attacker to gain access to the root password via accessing sensitive files on the system.