Access "Does information security market consolidation mean the end of the line?"
This article is part of the July/August 2011 issue of Computer incident response teams are a new line of defense
I’ve covered the information security industry for more than a decade and seen plenty of security companies come and go. Remember Entercept? How about Riptech, Neoteris or Teros? All were energetic startups that made a splash before being swallowed up by larger vendors. In fact, if there’s been any constant in the industry over the past 10 years, its consolidation. Symantec’s been one of the biggest buyers, acquiring 23 companies between May 2005 and last August. Its purchases include some big security players, such as Verisign’s security business and PGP, as well as some outside of security like Veritas. McAfee (which has been through several incarnations, including being part of the old Network Associates) has gone on its own shopping sprees, snapping up Foundstone, Reconnex and Secure Computing, among others, before being acquired by Intel last August. McAfee getting bought by chip giant Intel surprised many in the industry, but the deal was part of an ongoing shift in information security market consolidation. In addition to security vendors snapping up ... Access >>>
Access TechTarget
Premium Content for Free.
What's Inside
Features
-
-
Information security market consolidation: A mixed bag
by Marcia Savage and Michael S. Mimoso
Big tech companies are scooping up security vendors with mixed results.
-
PCI virtualization guidance warns of compliance challenges
by Robert Westervelt
PCI group outlines challenges in achieving compliance with payment data on virtualized systems.
-
Information security market consolidation: A mixed bag
by Marcia Savage and Michael S. Mimoso
-
-
Turn your computer incident response team into counter-threat operations
by Richard Bejtlich, Contributor
Fending off modern computer attacks requires actively hunting down intruders.
-
Striving for better information security intelligence
by Scott Crawford
Security teams strive to gain visibility from a deluge of security information and put that data to work.
-
Turn your computer incident response team into counter-threat operations
by Richard Bejtlich, Contributor
-
Columns
-
Your information security career and the job market: Value of information security skills
by Lee Kushner and Mike Murray
Be aware of changing technology and industry trends, and your job prospects will fall in line.
-
The threat landscape and Web 2.0 technologies
by Ravila Helen White, Contributor
The idea that social media and other Web 2.0 technologies have vastly altered the threat landscape is plain wrong.
-
Does information security market consolidation mean the end of the line?
by Marcia Savage
Large IT companies are buying up security vendors, but that doesn’t mean there won’t be plenty of room for innovative startups.
-
Your information security career and the job market: Value of information security skills
by Lee Kushner and Mike Murray
More Premium Content Accessible For Free
Next-generation firewalls play by new rules
E-Zine
Firewalls started their journey to the next generation at about the same time as the Star Trek TV series. While the products have advanced with ...
Developing your endpoint security management transition plan
E-Handbook
This TechGuide will help you develop your endpoint security management transition plan. Articles focus on overcoming the challenges of Web-based ...
Unlock new pathways to network security architecture
E-Zine
Network security architecture is showing its age at many organizations. With new technology, different data types, and use of multi-generations of ...
Security Management Strategies for the CIO