{"id":2154,"date":"2006-10-02T00:00:00","date_gmt":"2006-10-02T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/02\/security-firms-jump-in-the-acquisition-pool\/"},"modified":"2021-12-30T11:40:47","modified_gmt":"2021-12-30T11:40:47","slug":"security-firms-jump-in-the-acquisition-pool","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2006\/10\/02\/security-firms-jump-in-the-acquisition-pool\/","title":{"rendered":"Security firms jump in the acquisition pool"},"content":{"rendered":"<p>The fish are jumping in the IT security industry.  In recent months, the sector has seen several billion-dollar buyout deals.  That has created a feeding frenzy among would-be acquisition targets, roiling the industry&#8217;s waters.  In June, storage giant EMC announced a $2.1 billion megamerger with RSA Security.  &#8220;Security has gone from a &#8216;nice to have&#8217; to a &#8216;must have,&#8217; and corporate board rooms across America are spending millions to solve the problem,&#8221; said Peter Kuper, an analyst at Morgan Stanley.  Driving the changes, in part, are new regulatory compliance issues and a desire by customers to deal with fewer vendors, investment bankers and analysts say.  In addition, system management and networking companies are active buyers of this technology, as they seek to embed security into their systems or applications.  &#8220;The consolidation is happening now, but security will remain in silos until there is full integration of products, and that will take some time,&#8221; said Ranjini Chandirakanthan, an analyst at ThinkEquity Partners.  Hot sectors Security sectors that have particularly caught buyers&#8217; eyes include companies that prevent data leakage, as well as those that tackle identity theft, Chandirakanthan noted.   Encryption technology, intrusion prevention systems, electronic data security and compliance driven applications are also gaining attention from prospective buyers, said Ian MacLeod, managing director of investment banking for Goldman Sachs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Customers want to have a smaller set of vendors accountable if their technology fails to keep information secure and in compliance with regulations&#8211;and large systems and storage companies have the financial clout  to act as consolidators.  &#8220;They have the ability to do the potential M&#038;A (mergers and acquisition) deals in cash, or are large enough to do them with stock, or a combination of both,&#8221; MacLeod said.<\/p>\n<p>Prior to their acquisition announcements, ISS and RSA Security, for example, had long been rumored to be potential buyout candidates.  Other names analysts point to on a short list of potential targets include Trend Micro, Check Point Software Technologies, McAfee and Secure Computing.<\/p>\n<p>&#8220;On one side, you have companies like Cisco (Systems) and Microsoft that will discount the price they charge for security, and on the other side, you have the best-of-breed (niche security) companies,&#8221; Kuper said.<\/p>\n<p>Buyers don&#8217;t want the consumer side, so maybe it could take the consumer piece private and sell the enterprise business,&#8221; said one security analyst, who requested anonymity.<\/p>\n<p>http:\/\/news.com.com\/Security+firms+jump+in+the+acquisition+pool\/2100-7350_3-6121403.html?tag=nefd.lede<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11],"tags":[],"class_list":["post-2154","post","type-post","status-publish","format-standard","hentry","category-trends"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2154","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=2154"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2154\/revisions"}],"predecessor-version":[{"id":4641,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/2154\/revisions\/4641"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=2154"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=2154"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=2154"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}