Feeds

Peapod bought out of administration

Phoenix from the flames

  • alert
  • submit to reddit

IT consultancy/distie Peapod announced today that it has been bought out of administration by Communication Technology Investment Ltd (CTIL). Financial terms of the deal were not disclosed.

CTIL is part of Global Emerging Markets Ltd, a group which operates other IT and security-related businesses as well as firms involved in agriculture and heavy industry-related businesses. The investment in Peapod is part of GEM's strategy to invest more heavily in the IT security sector.

In a statement Rakesh Gandhi, a partner at CTIL, said it was looking to working with Peapod's existing management team in its goal of making one of the country's best IT security providers.

Peapod said that it was able to trade successfully through its adminstration period and said that the acquisition marks a return to "business as usual" for its customers and partners.

High profile security consultancy/distie Peapod has went into administration in October after attempts by parent company e-initiative to expand into Europe ran aground. At the time, administrators Numerica told us it was confident of securing a rapid sale - a prediction that has now come to pass, albeit from a slightly unlikely quarter.

Eight people - including one director - were made redundant in October but 40 core staff remained on board and the company traded normally through administration. ®

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.