Network World - Security software vendor McAfee Inc. today announced it intends to acquire Solidcore Systems for about $33 million in cash and an additional $14 million if certain performance targets are met.
McAfee indicated its interest in the acquisition centered on Solidcore's whitelisting technology that can set controls on what applications are allowed to run on a computer. After the acquisition is completed, McAfee expects to bring Solidcore's whitelisting and compliance enforcement mechanisms into the McAfee product line under the management umbrella of the McAfee ePolicy Orchestrator (ePO) management console.
Solidcore's current product line includes S3 Control, software for change control and configuration audit, among other products, such as the Point-of-Sale Check and Control software used in electronic POS devices.
"We will continue to invest further from the engineering and sales perspective," said Candace Worley, McAfee vice president of product management for the systems security business unit, who says McAfee will support Solidcore's current product line and customer base.
Solidcore is said to have about 1,000 customers, including NCR, Dell and General Motors, and is mainly focused on North America. McAfee would like to extend Solidcore's products to other markets globally. The products are used on more than 200,000 endpoints, which include automated teller machines, point-of-sale systems, mobile devices, process-control systems, servers and workstations.
McAfee anticipates that Solidcore's whitelisting and security-controls technology, which can assist in compliance with the Payment Card Industry (PCI) data security standards for payment-card processing, could also find use in making virtualization-based environments more secure. "We could leverage application whitelisting for securing a virtual environment," Worley noted.
The Solidcore acquisition is expected to be completed by mid-year.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Mobile Policy Checklist Here's what to consider when putting together a mobile policy designed to support a highly productive workforce.
- Securing BYOD Mobile computing is becoming so ubiquitous that people no longer bat an eye seeing someone working two devices simultaneously. Individuals and organizations are...
- Live Webcast On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy...
- Live Webcast Endpoint Backup & Restore: Protect Everyone, Everywhere Arek Sokol from the bleeding-edge IT team at Genentech/Roche explains how he leverages cross-platform enterprise endpoint backup in the public cloud as part...
- Streamline Software Asset Management, Compose a software Management Symphony Keeping track of your organization's software is easy with effective software management solutions from CDW. View the videos in our software solutions channel
- Druva inSync: Endpoint Data Protection & Governance CLICK HERE to watch this video about protecting corporate data on laptops and mobile devices, sponsored by Druva. All Security White Papers | Webcasts