Top mergers and aquisitions activity in 2013

Share this article:
A look at the top mergers and acquisitions in the information security industry this year.

Company

Purchased

Gains

Terms

Blue Coat Systems

Solera Networks

Addition of security analytics and forensic functions to future products.

Undisclosed

CA Technologies

Layer 7 Technologies

CA will integrate tools to manage APIs into its own IAM suite.

Undisclosed

Cisco

Sourcefire

Expands the company's IT security portfolio and threat-research offerings.

$2.7b

EMC

Aveksa

Extends mobile device portfolio with cloud and on-premises provisioning and SSO technology.

Undisclosed

IBM

Trusteer

Extends Big Blue's data security capabilities into the cloud, mobile and endpoint security space.

$1b

SoftLayer

IBM builds out its public cloud offerings.

Undisclosed

McAfee (Intel)

Stonesoft

Adds next-generation firewalls and intrusion detection.

$389m

Microsoft

Nokia

Microsoft acquires a global mobile device business.

$7.2b

Yahoo

Tumblr

Yahoo will take over operations of the social media blogging site.

$1.1b

Verizon

Vodaphone

Will enhance its ability to offer customers "seamless and integrated services."

$130b

Vista Equity

Websense

Private equity firm aquires the internet security firm. Goes private with little expected to change.

$1b

Share this article:
You must be a registered member of SC Magazine to post a comment.
close

Next Article in Features

Sign up to our newsletters

TOP COMMENTS

More in Features

Transparency reports useful, but more info needed on 'digital searches'

Transparency reports useful, but more info needed on ...

Transparency reports are common these days, but the information they provide can still be difficult to read and understand.

Same battle, different field

Same battle, different field

Cyberwarfare is so new that the ground rules are still being established. Nazan Osman provides an overview.

Passwords are passé

Passwords are passé

New solutions are gaining traction to complement, or replace, the legacy use of username and password, reports Ashley Carman.