{"id":1524,"date":"2006-12-19T00:00:00","date_gmt":"2006-12-19T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/12\/19\/check-point-to-acquire-nfr-security\/"},"modified":"2021-12-30T11:39:32","modified_gmt":"2021-12-30T11:39:32","slug":"check-point-to-acquire-nfr-security","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/12\/19\/check-point-to-acquire-nfr-security\/","title":{"rendered":"Check Point to acquire NFR Security"},"content":{"rendered":"<p>Check Point Software Technologies announced an agreement to acquire privately held NFR Security, a maker of intrusion-detection and -prevention systems, for approximately $20 million.  Gil Shwed, founder and CEO of Israel-based Check Point, indicated the firm has plans to incorporate NFRs Sentivist IDS and IPS technologies into the Check Point line of firewall, VPN and security management products.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The acquisition of Rockville, Md.-based NFR Security, founded a decade ago by IDS pioneer Marcus Ranum, follows Check Points failure earlier this year to complete the acquisition of IDS and IPS vendor Sourcefire.  NFR Security, which has 22 employees, does not publish figures related to its earnings.  While not discussing NFR Securitys exact earnings, Shwed acknowledged NFR isnt a big money-maker, but it isnt losing money.<\/p>\n<p>Gartner analyst John Pescatore said the NFR Security acquisition is clearly a replacement for the failed merger with Sourcefire.  Pescatore said the merger between Check Point and NFR Security will probably work out well because NFR Security has good technologies that can be combined with Check Points strength in firewalls and management.<\/p>\n<p>http:\/\/www.networkworld.com\/news\/2006\/121906-check-point-acquires-nfr-security.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1524","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1524","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1524"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1524\/revisions"}],"predecessor-version":[{"id":4011,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1524\/revisions\/4011"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1524"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1524"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1524"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}