Welcome!

News Feed Item

INSIDE Secure to Acquire Embedded Security Solutions (ESS), a Security Specialist in the Mobile and Networking Markets

INSIDE Secure (NYSE Euronext INSD.PA) today announced that it has entered into an agreement to purchase Embedded Security Solutions (ESS), a high expertise business which designs and develops encryption-related security hardware intellectual property (IP) and software for a variety of industries, including the mobile and networking markets. The transaction is expected to close before the end of 2012 subject to certain customary closing conditions. The Supervisory Board of INSIDE Secure has unanimously approved the transaction.

This strategic acquisition will enable INSIDE Secure to reinforce its position as a key player in the fast-growing security solutions market:

  • ESS brings to INSIDE Secure complementary offerings for a complete security architecture, as well as additional solutions for securing both content (Digital Rights Management or “DRM”) and data exchange (Virtual Private Network or “VPN”);
  • ESS complements INSIDE Secure’s know-how with a talented team of 79 highly qualified employees located in Europe, Asia and in the US, as well as its extensive and highly regarded security intellectual property and technology portfolio, which aligns with INSIDE’s long-term strategy to generate its own IP licensing revenue;
  • This acquisition will allow INSIDE Secure to access a wider customer base in the mobile, content provider and network industries that serve a variety of application markets (smart grids, automotive, gaming and others); and
  • By leveraging the strong capabilities of INSIDE Secure’s existing Mobile NFC and Digital Security businesses, the combined offer should lead to additional sales in high growth markets.

At closing, INSIDE Secure will pay USD38 million in cash subject to a working capital adjustment, and up to an additional USD10 million subject to completion of certain post-closing transactions. The transaction is expected to be accretive to INSIDE Secure’s 2013 adjusted operating and net results, and to enhance INSIDE Secure’s gross margin.

Commenting on this announcement, Rémy de Tonnac, chief executive officer of INSIDE Secure, said: “This transaction is an important opportunity to extend our position in the security value chain and reinforce our global offer in high-end security solutions. It will enable us to complement our product and solution portfolio in Mobile NFC and Digital Security and enhance our customer offerings in fast-growing markets. The talented ESS team who will be joining will contribute their know-how and expertise to advancing our innovative technologies, and help us address new security markets.”

Overview of ESS know-how, products and expertise

ESS designs, develops and sells a range of embedded security solutions, encompassing hardware IP and software. It offers a host of security solutions tailored for businesses and consumers on the move.

The ESS portfolio offer includes a comprehensive suite of embedded security solutions which include semiconductor IP, security toolkits and DRM solutions that address both client- and server-side security.

The solutions are centered on the use of encryption algorithms and security blocks to protect data and ensure confidentiality, integrity and availability. ESS offers three product lines: a Content Protection product line, a Security Toolkit product line and a Semiconductor IP product line.

ESS products are used in hundreds of millions of mobile and networking products to ensure data privacy for businesses and individuals, and are sold to a variety of tier-one brand name customers, such as Alcatel-Lucent, Cisco, HBO, LG, Motorola, Nokia, Samsung, Sky and Texas Instruments.

ESS recorded2 net revenue of USD25.3 million in 2011, with gross margins exceeding 90 percent and operating income of USD6.3 million. For the first nine months of 2012, the net revenue was USD21.4 million and the operating income USD6.2 million.

Conference call details

Rémy de Tonnac, Chief Executive Officer of INSIDE Secure, jointly with Richard Vacher Detournière, General Manager and Chief Financial Officer, will comment on the acquisition of ESS and will be available to answer questions during a conference call to be held on 19 November 2012 at 3pm CET / 2pm GMT / 9am EST. The call will be held in English.

To participate in the conference call, you may call the following numbers prior to the scheduled start time: +33 (0) 1 70 77 09 40 (France) or +44 203 367 9453 (United Kingdom) or + (1) 866 907 5923 (USA).

This press release and other presentation materials will be available on INSIDE Secure’s website: www.insidesecure.com.

A replay of the conference call will also be available approximately two hours following the conference call and for 90 days on the Group’s website.

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD.PA) is a leading designer, developer and supplier of semiconductors, embedded software and platforms for secure transactions and digital security. INSIDE mobile NFC, secure payment and digital security products provide security for a wide range of information processing, storage and transmission applications. The company’s customers are found in a wide range of markets, including mobile payment, identification documents, access control, transit, electronic device manufacturing, pay television and mobile service operators. For more information, visit www.insidesecure.com.

Forward-looking statements

This press release contains certain forward-looking statements concerning the INSIDE Secure group. Although INSIDE Secure believes its expectations to be based on reasonable assumptions, they do not constitute guarantees of future performance. The group’s actual results may accordingly differ materially from those anticipated in these forward-looking statements owing to a number of risks and uncertainties. For a more detailed description of these risks and uncertainties, please refer to the “Risk Factors” section of the annual financial report of 27 April 2012, available on www.insidesecure.com.

1 INSIDE Secure uses performance indicators that are not strictly accounting measures (adjusted operating result, and adjusted income /(loss)). These indicators are not defined under IFRS, and do not constitute accounting elements used to measure the group’s financial performance. They should be considered in addition to, and not as a substitute for, any other operating and financial performance indicator of strict accounting nature, as presented in the Group’s Consolidated Financial Statements and the corresponding notes. The Group uses these indicators because it believes they are useful measures of its operating performance and of its operating cash flow generation.

2 Unaudited, US GAAP

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California.
In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable.
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...
Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points.
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace.
An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f...
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service. In his session at 19th Cloud Exp...
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.