Advertisment

Secure Computing to acquire Securify

author-image
DQW Bureau
New Update



Advertisment

Secure Computing Corporation, a enterprise gateway security company, has
signed a definitive agreement to acquire Securify, a provider of identity-based
monitoring solutions, for approximately $15 million plus an earn-out of up to $5
million. The purchase price is payable in cash or, at Secure Computing's
election, partially in shares of Secure Computing common stock. The acquisition
is expected to close in the fourth calendar quarter of 2008, subject to certain
closing conditions.

Securify, based in Cupertino, CA provides a solution for monitoring and
controlling user access to applications within complex and rapidly changing
networks. Its 'plug-and-play' appliance offers automatic discovery and policy
development in intuitive business terms of users, groups and applications.

By monitoring network traffic against these policies and leveraging
transparent integration with user directories including Microsoft Active
Directory, Securify's solution immediately identifies and alerts organizations
to out-of-policy behavior in real time, whether accidental or intentional.
Securify can also initiate automated blocking actions in routers, switches or,
in the case of Secure Computing, in firewalls.

Advertisment

"In the near future, the combination of our products will facilitate a
seamless workflow where out-of-policy behavior can be analyzed, reported and, in
combination with Secure Firewall, automatically mitigated," said Dan Ryan,
President and CEO of Secure Computing. "Longer term, combining Securify's
technology with Secure Firewall will allow us to deliver a unique,
next-generation firewall that enforces business policy by enabling visibility
and control over applications and user access, as opposed to the current
paradigm of protocols and IP addresses."

Increasing compliance demands and insider risk mitigation, coupled with
accelerated opening of the network, are shifting the focus to internal
user-based access control in the enterprise. This necessitates not only true
application recognition, but more granular application-specific controls to
balance adherence to business/mission policy, compliance and security needs. In
this environment, control and availability gaps continue to grow as
infrastructure complexities increase and business change accelerates.

"Old-school firewalls inspect packets and associate ports with protocols and
applications, but this is inadequate for the Web 2.0 world," said Chris
Christiansen, Program VP-Security Products and Services at IDC. "Today, most
Internet traffic is dynamic and applications run across multiple ports. In this
dynamic environment, enterprises worry that the increasing use of Web-based
applications may be responsible for leaked data, malware infections and policy
violations. With this acquisition, Secure Computing now has the necessary
capabilities for next-generation firewall technology that includes application
inspection and user-aware access."

Advertisment