Feeds

NAI sells firewall business

Secure Computing picks up Gauntlet

  • alert
  • submit to reddit

Maximizing your infrastructure through virtualization

Secure Computing has acquired the Gauntlet firewall and VPN business from Network Associates (NAI) for an undisclosed amount.

Network Associates customers will be "transitioned" to Secure Computing, developers of the Sidewinder Firewall and VPN Gateway, under the deal which sees the transfer of NAI's technology, along with related customer support contracts. Secure Computing takes on approx. 4,000 Gauntlet customers and 100 resellers.

Tim McGurran, Secure Computing president and chief operating officer, told us that the company will visit major Gauntlet customers to explain the deal (which completes next week), and gave us a broad idea on its strategy to combine the products.

"Two years from now it'll be very disappointing if we're supporting two standalone application level firewalls. We intend to bring the best of both products, such as the embedded McAfee anti-virus software in Gauntlet, together in one firewall," he said.

Secure Computing has merge five firewall lines into Sidewinder which give it the experience to manage the technology merger, according to McGurran.

In October last year, NAI announced it was looking for a buyer for its PGP desktop encryption and Gauntlet firewall product lines, as part of a restructure. It announced development would cease on the products for sale (though support would continue). The rest of its PGP Security portfolio was to be integrated into the firm's McAfee and Sniffer product lines.

In announcing the sale of its Gauntlet business today, NAI said that Secure Computing is well positioned to ensure "seamless support transition" for its firewall customers. Gauntlet is number four software firewall in the market with a share of around four per cent of the combined software firewall and appliance market.

Jose Lopez, an industry analyst at Frost & Sullivan, said the deal is probably good news for customers asNAI was not committed to developing Gauntlet.

"Secure Computing has a good product line but weaker branding, certainly it doesn't have much of a profile in Europe," said Lopez, who added that the acquisition will allow Secure Computing to sell its other products into Gauntlet shops.

Both Secure Computing and Trusted Information Systems, which originally developed Gauntlet prior to an acquisition by NAI in 1998, began life as security firms under contract with the US Government, including the National Security Agency (NSA). ®

Related Stories

Network Associates puts PGP up for sale
Virus plague fails to stem losses at Network Associates
NAI belatedly joins OpenPGP Alliance
PGP creator Zimmerman leaves Network Associates
Gaping hole in NAI's Gauntlet firewall
NY sues NAI so you can say McAfee sucks

External links

Secure Computing acquires Gauntlet Firewall and VPN business from Network Associates

Top three mobile application threats

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
iPad? More like iFAD: We reveal why Apple fell into IBM's arms
But never fear fanbois, you're still lapping up iPhones, Macs
White? Male? You work in tech? Let us guess ... Twitter? We KNEW it!
Grim diversity numbers dumped alongside Facebook earnings
Microsoft: We're making ONE TRUE WINDOWS to rule us all
Enterprise, Windows still power firm's shaky money-maker
HP, Microsoft prove it again: Big Business doesn't create jobs
SMEs get lip service - what they need is dinner at the Club
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.