Intel to acquire network security firm Sensory Networks
The company provides pattern matching technology for network security applications
IDG News Service - Intel has signed a deal to acquire Sensory Networks, a provider of software pattern matching technology for network security applications.
Chris Kraeuter, a spokesman at the chip maker, said he could confirm that Intel has signed an agreement to acquire Sensory Networks, but couldn't comment on the deal terms. Some reports said Intel paid about $20 million for the company.
Sensory Networks, with headquarters in Mountain View, Calif., also has a research and development office in Sydney, Australia.
Its HyperScan pattern matching engine can match large groups of regular expressions against blocks or streams of data, making it useful for applications that need to scan large amounts of data at high speed, such as intrusion prevention, antivirus and deep packet inspection systems. It runs entirely in software and has been deployed on a wide range of different processors and operating systems, Sensory Networks said on its website.
Sensory Networks already has partnerships with Intel and its embedded and mobile software subsidiary Wind River, besides alliances with other semiconductor companies such as ARM, Broadcom and Freescale Semiconductor.
Intel subsidiary McAfee acquired in July another security company, Stonesoft, for $389 million. Intel said that technology from the Helsinki, Finland, maker of firewall software would be integrated with McAfee's products. Intel acquired McAfee in 2011.
- iOS 7 Must Know Tips and Tricks
- Apple iPhone 5S vs. Nokia Lumia 1020: Which Camera is Better?
- How Tech Companies Can Succeed by Going Private
- CIOs Share How They Made the Leap to CEO
- Slideshow: 7 ways users drive IT support crazy
- How to spot a phishing email
- Social engineering: The basics
- 20 security and privacy apps for Android and iPhone
- IT Certification Study Tips
- Register for this Computerworld Insider Study Tip guide and gain access to hundreds of premium content articles, cheat sheets, product reviews and more.
- The 10 "Must-Haves" for Secure Enterprise Mobility. A security framework and evaluators' checklist.
- Critical Capabilities for Mobile Device Management Software Gartner reviews critical capabilities, attributes that differentiate products in a class in terms of their quality and performance, for mobile device management.
- Embracing BYOD Through Secure App and Data Delivery Enterprise mobility management in the real world. BYOD isn't just a trend; it's an important new model for allowing people to choose the...
- Integrated Data Protection for VMware infrastructure This paper describes how Data Protector enables fast, efficient, and reliable protection for mission-critical data and applications in VMware vSphere and vCloud Director...
- Live Webcast Securing Mobile Devices with Citrix XenMobile MDM In this video, Chief Demo Officer, Brad Peterson provides a demo of how Citrix XenMobile MDM works.
- Live Webcast Secure Mobile Email Users Will Love Maintain full control over sensitive corporate data
- Secure Mobile Email Users Will Love Maintain full control over sensitive corporate data
- Securing Mobile Devices with Citrix XenMobile MDM In this video, Chief Demo Officer, Brad Peterson provides a demo of how Citrix XenMobile MDM works. All Security White Papers | Webcasts