Feeds

NAI revisits McAfee.com takeover bid

House in order

  • alert
  • submit to reddit

The Power of One eBook: Top reasons to choose HP BladeSystem

ComputerWire: IT Industry Intelligence

Network Associates Inc has relaunched its bid to acquire the publicly held shares of subsidiary McAfee.com Corp it does not already own, having filed its restated financial results for 1998, 1999 and 2000 with the Securities and Exchange Commission (SEC) on Friday.

Santa Clara, California-based NAI already owns 75% of McAfee.com and in April 2002 dropped its $224m bid to acquire the 25% it spun off via a 1999 IPO after discovering accounting errors in its own past financial statements. A review of the security and network management software vendor's past five years' worth of accounts threw up errors in its fiscal 1998, 1999 and 2000 statements.

The accounting errors occurred when NAI was under previous management, and are also being investigated by the SEC. With NAI's internal investigation over, and the company's statements in the hands of the SEC, it has decided to launch a third attempt to acquire consumer security services vendor McAfee.com

The original March 2002 offer of 0.675 NAI shares for each McAfee.com share was described by the McAfee.com board as "financially inadequate", and although NAI did not need the support of McAfee.com's board for the acquisition to go ahead, it upped the offer to 0.78 NAI shares in April 2002. McAfee.com's board then recommended that shareholders accept the offer before NAI's accounting problems caused the company to drop the bid.

NAI has now repeated its offer of 0.78 shares per McAfee.com share in a fresh bid that will be filed with the SEC on July 2. The offer is conditional on NAI owning at least 90% of McAfee.com Class A shares after its completion. If that condition is not met, NAI may still press ahead with the deal if more than 50% of McAfee.com shareholders (excluding NAI itself) tender their shares. McAfee.com would then be merged with an existing NAI subsidiary.

NAI is looking to acquire McAfee.com in order to reduce market confusion over its offerings. While the company spun-off McAfee.com in 1999 it retained the name for its McAfee Anti Virus Defense enterprise-focused software, McAfee ASaP managed security services unit and McAfee Consumer Products division.

The vague distinction between McAfee.com's consumer security services and Network Associates' similarly named consumer and business services was further blurred when McAfee.com started offering services to small businesses.

© ComputerWire

Designing a Defense for Mobile Applications

More from The Register

next story
DARPA-derived secure microkernel goes open source tomorrow
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.