|By PR Newswire||
|November 5, 2012 04:00 PM EST||
SCOTTSDALE, Ariz., Nov. 5, 2012 /PRNewswire/ -- Lumension, a global leader in endpoint management and security, today announced the completed asset acquisition of CoreTrace Corporation, an innovative application control software provider. Austin-based CoreTrace delivers solutions that prevent the execution of malware and unknown executables. The acquisition will enhance Lumension's application control feature set, grow its software and patent/IP portfolio and extend Lumension's growing customer, OEM and reseller bases.
The rise of advanced persistent attacks and weaponized malware has resulted in a new generation of widely distributed malware. In upcoming State of the Endpoint Lumension-sponsored research to be released in early December, researchers identified growing alarm among IT security professionals related to advanced persistent threats (APTs). Understanding this new threat environment, Lumension has strengthened its leadership position in the endpoint management and security space by acquiring the assets of CoreTrace Corporation, and further consolidating market share in the application control space.
"The threat of advanced persistent attacks is growing at a significant rate," said Pat Clawson, Chairman and CEO of Lumension. "Look at oil operators in the middle east who have suffered devastating cyber attacks. With this rise in advanced persistent threats, and weaponized malware, along with the fact that Gartner projects[i] that 'by 2015, more than 50% of enterprises will have instituted 'default deny' policies' that restrict the applications users can install,' Lumension felt a strategic acquisition of CoreTrace would further equip both current and prospective customers in the ever-evolving threat landscape and cement Lumension's leadership in next generation technologies. We are thrilled to have CoreTrace on board to continue our drive to advanced, persistent protection for organizations of all sizes."
With the acquisition of CoreTrace assets, Lumension will add more than 130 customers, key development staff, and additional OEM and reseller partners.
- Lumension acquires key IP and patent portfolio from CoreTrace.
- Lumension will likely integrate key aspects of CoreTrace's technology into Lumension® Application Control and continue to offer Lumension Application Control through the Lumension Endpoint Management Security Suite.
- Lumension will continue to provide technical and support services to CoreTrace's current application control commercial customers.
- Lumension will provide existing CoreTrace customers with a seamless upgrade path to Lumension's endpoint management platform once key features of the CoreTrace technology are integrated.
- Lumension will likely continue to offer the CoreTrace Bouncer® product through existing commercial sales channels.
A financial analyst briefing will be held at 11:30 a.m. EST on Wednesday, Nov. 7. RSVP is required; please contact Kim Doyle at [email protected] or 480-444-1229 for dial-in instructions.
Additional Acquisition Resources:
Lumension Security, Inc., a global leader in endpoint management and security, develops, integrates and markets security software solutions that help businesses protect their vital information and manage critical risk across network and endpoint assets. Lumension enables more than 5,100 customers worldwide to achieve optimal security and IT success by delivering a proven and award-winning solution portfolio that includes Vulnerability Management, Endpoint Protection, Data Protection, Antivirus and Reporting and Compliance offerings. Lumension is known for providing world-class customer support and services 24x7, 365 days a year. Headquartered in Scottsdale, Arizona, Lumension has operations worldwide, including Texas, Florida, Ireland, Luxembourg, the United Kingdom, Australia and Singapore. Lumension: IT Secured. Success Optimized.™ More information can be found at www.lumension.com.
CoreTrace provides the most advanced threat protection for physical and virtual Windows servers, desktops and laptops, as well as Linux enterprise servers. The Company's flagship solution, CoreTrace Bouncer®, protects customers' most valuable intellectual property and systems by preventing the most advanced threats. Bouncer's advanced threat protection is based upon adaptive application whitelisting to prevent the execution of all unauthorized code, memory protection to stop attackers from exploiting whitelisted applications and risk-profiling of all applications via cloud-based reputation services.
[i] Predicts 2012: Sophisticated Attacks, Complex IT Environments and Increased Risks Demand New Approaches to Infrastructure Protection; By Ray Wagner, Mark Nicolett, Lawrence Orans, John Pescatore, Kelly M. Kavanagh Peter Firstbrook, Neil MacDonald, Rob McMillan, Joseph Feiman; Nov. 29, 2011
Lois Paul and Partners
The enterprise is being consumerized, and the consumer is being enterprised. Moore's Law does not matter anymore, the future belongs to business virtualization powered by invisible service architecture, powered by hyperscale and hyperconvergence, and facilitated by vertical streaming and horizontal scaling and consolidation. Both buyers and sellers want instant results, and from paperwork to paperless to mindless is the ultimate goal for any seamless transaction. The sweetest sweet spot in innov...
Oct. 9, 2015 02:15 PM EDT Reads: 189
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and Containers together help companies to achieve their business goals faster and more effectively.
Oct. 9, 2015 02:15 PM EDT Reads: 158
Docker is hot. However, as Docker container use spreads into more mature production pipelines, there can be issues about control of Docker images to ensure they are production-ready. Is a promotion-based model appropriate to control and track the flow of Docker images from development to production? In his session at DevOps Summit, Fred Simon, Co-founder and Chief Architect of JFrog, will demonstrate how to implement a promotion model for Docker images using a binary repository, and then show h...
Oct. 9, 2015 02:15 PM EDT Reads: 126
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, will review the current landscape of...
Oct. 9, 2015 02:00 PM EDT
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data...
Oct. 9, 2015 02:00 PM EDT Reads: 228
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, al...
Oct. 9, 2015 02:00 PM EDT Reads: 181
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
Oct. 9, 2015 02:00 PM EDT Reads: 296
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Oct. 9, 2015 01:45 PM EDT Reads: 125
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll sha...
Oct. 9, 2015 01:45 PM EDT Reads: 558
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driv...
Oct. 9, 2015 01:45 PM EDT
DevOps has often been described in terms of CAMS: Culture, Automation, Measuring, Sharing. While we’ve seen a lot of focus on the “A” and even on the “M”, there are very few examples of why the “C" is equally important in the DevOps equation. In her session at @DevOps Summit, Lori MacVittie, of F5 Networks, will explore HTTP/1 and HTTP/2 along with Microservices to illustrate why a collaborative culture between Dev, Ops, and the Network is critical to ensuring success.
Oct. 9, 2015 01:30 PM EDT Reads: 166
There are many considerations when moving applications from on-premise to cloud. It is critical to understand the benefits and also challenges of this migration. A successful migration will result in lower Total Cost of Ownership, yet offer the same or higher level of robustness. Migration to cloud shifts computing resources from your data center, which can yield significant advantages provided that the cloud vendor an offer enterprise-grade quality for your application.
Oct. 9, 2015 01:30 PM EDT Reads: 261
There will be 20 billion IoT devices connected to the Internet soon. What if we could control these devices with our voice, mind, or gestures? What if we could teach these devices how to talk to each other? What if these devices could learn how to interact with us (and each other) to make our lives better? What if Jarvis was real? How can I gain these super powers? In his session at 17th Cloud Expo, Chris Matthieu, co-founder and CTO of Octoblu, will show you!
Oct. 9, 2015 01:15 PM EDT
As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction of desired change. Renowned for its approach to leadership and emphasis on their people, organizations increasingly look to our military for insight into these challenges.
Oct. 9, 2015 01:15 PM EDT Reads: 136
Overgrown applications have given way to modular applications, driven by the need to break larger problems into smaller problems. Similarly large monolithic development processes have been forced to be broken into smaller agile development cycles. Looking at trends in software development, microservices architectures meet the same demands. Additional benefits of microservices architectures are compartmentalization and a limited impact of service failure versus a complete software malfunction....
Oct. 9, 2015 01:15 PM EDT Reads: 245