Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Endpoint

5/13/2011
08:12 AM
Dark Reading
Dark Reading
Products and Releases
50%
50%

Updata Partners To Buy CA Technologies Internet Security Business Unit

Transaction does not affect CA Technologies enterprise security business

RESTON, Va., May 12, 2011/PRNewswire/ -- Updata Partners, a leading technology-focused growth equity firm, today announced that it has entered into a definitive agreement to acquire the Internet Security Business Unit (the "ISBU") of CA Technologies. The ISBU has a 10-year history of providing endpoint security solutions -- including anti-malware and anti-virus -- to consumers and businesses worldwide. More than 60,000 businesses across a wide spectrum of industries have deployed the unit's solutions, including some of the most sophisticated buyers of security technology, and four million consumers worldwide use the ISBU's products. IDC recently ranked the ISBU as among the top ten providers of corporate endpoint security solutions(1), and the NPD Group recently ranked CA Technologies among the top ten retail publishers of security software(2). Financial terms of the agreement, which is expected to close in June, were not disclosed.

"CA Technologies is one of the top software companies in the world, with a record of innovation and best-in-class solutions," said James Socas, General Partner at Updata Partners. "We are delighted to be able to work with them, with the ISBU's strong team, and on behalf of their customers and partners, to create a new leader in the information security market."

Updata Partners is a leading technology-focused growth equity firm with over $500 million in capital under management and a ten year track record of success investing in the software, technology services and digital media industries. Recent security industry investments by Updata and its partners include M86 Security (a leading secure web gateway provider), Alert Logic (a leading cloud security vendor), CoreStreet (acquired by ActiveIdentity), SwapDrive (acquired by Symantec), and e-Security (acquired by Novell).

"This is a win-win for CA Technologies and for our ISBU customers," said Jacob Lamm, executive vice president of CA Technologies. "Updata Partners will bring a broad set of resources and industry expertise to the business, while CA Technologies pursues its mission of empowering customers to fully leverage the cloud and other resources through new models of IT management."

This transaction does not affect CA Technologies enterprise security business, which is focused primarily on identity and access management software. CA Technologies will continue to invest in internal development and innovation to grow its leadership position in this critical sector.

The new company, which will be called Total Defense, Inc., will be formed as the security software market is entering a period of rapid change. The nature of threats is shifting from computer viruses and other malware driven by computer hackers to much more complex, multi-layered and dangerous threats driven by criminal intent. At the same time, the number of threats is growing exponentially. AV-Test.org has observed that the annual volume of unique malware increased from 1 million to 19 million in the past five years(3). As a result, IDC estimates the corporate endpoint security market will grow from $7.1 billion in 2010 to $9.9 billion in 2014(4).

About Updata Partners

Updata Partners is a leading technology-focused growth equity firm with over $500 million in assets under management. Updata invests in software, digital media, and technology services businesses with innovative intellectual property and market-leading solutions where the combination of the firm's financial backing and the operating expertise of its partners will accelerate growth. For additional information, visit Updata Partners at www.updatapartners.com.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Manchester United Suffers Cyberattack
Dark Reading Staff 11/23/2020
As 'Anywhere Work' Evolves, Security Will Be Key Challenge
Robert Lemos, Contributing Writer,  11/23/2020
Cloud Security Startup Lightspin Emerges From Stealth
Kelly Sheridan, Staff Editor, Dark Reading,  11/24/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: This comment is waiting for review by our moderators.
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27218
PUBLISHED: 2020-11-28
In Eclipse Jetty version 9.4.0.RC0 to 9.4.34.v20201102, 10.0.0.alpha0 to 10.0.0.beta2, and 11.0.0.alpha0 to 11.0.0.beta2, if GZIP request body inflation is enabled and requests from different clients are multiplexed onto a single connection, and if an attacker can send a request with a body that is ...
CVE-2020-29367
PUBLISHED: 2020-11-27
blosc2.c in Blosc C-Blosc2 through 2.0.0.beta.5 has a heap-based buffer overflow when there is a lack of space to write compressed data.
CVE-2020-26245
PUBLISHED: 2020-11-27
npm package systeminformation before version 4.30.5 is vulnerable to Prototype Pollution leading to Command Injection. The issue was fixed with a rewrite of shell sanitations to avoid prototyper pollution problems. The issue is fixed in version 4.30.5. If you cannot upgrade, be sure to check or sani...
CVE-2017-15682
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to inject malicious JavaScript code resulting in a stored/blind XSS in the admin panel.
CVE-2017-15683
PUBLISHED: 2020-11-27
In Crafter CMS Crafter Studio 3.0.1 an unauthenticated attacker is able to create a site with specially crafted XML that allows the retrieval of OS files out-of-band.