SonicWALL targets SMB security with two corporate acquisitions

Share this article:

Security firm SonicWALL today announced that it has acquired data backup company Lasso Logic together with the assets of enKoo, a developer of remote access technology.

San Francisco-based Lasso is an early-stage company providing continuous data protection for backup and recovery systems, for the small and medium business (SMB) market.

Lasso says its tapeless, hands-free, appliance-based technology aims to eliminate the need to purchase separate backup software, hardware, servers and storage products. Its flagship product, Lasso CDP is a continuous data protection appliance.The disk-based product includes user-level instant data recovery, central administration and offsite data protection technology.

SonicWALL's second purchase, enKoo, is based in San Jose. It focuses on a core technology offering of secure remote access products for SMBs.

With these acquisitions, SonicWALL said the purchases give it "a strong entry" point to the growing data protection segment, while extending its remote access capabilities.

"Small and medium-sized businesses share a number of key concerns about their data: They want to know that their information is safe; they want to access it whenever they need to; and they want assurance that only authorized individuals can access it," said Matthew Medeiros, president and chief executive officer of SonicWALL. "We see continuous, dynamic data protection as a natural extension of our product line, complementing our existing capabilities in secure content management, unified threat management and remote access."

Financial terms of the deals were not immediately disclosed.

www.sonicwall.com

Share this article:

Sign up to our newsletters

More in News

Leahy bill would end bulk data collection, introduce reforms

Leahy bill would end bulk data collection, introduce ...

Sen. Patrick Leahy introduced an NSA reform bill that would update the USA Freedom Act.

House passes two cyber security bills

One bill aims to improve agencies' website security, while another works to thwart critical infrastructure attacks.

A five-month-long Tor attack attempting to 'deanonymize' users

For roughly five months beginning in January, traffic confirmation attacks were used to attempt to "deanonymize" Tor users.