Feeds

Feds nix Check Point's Sourcefire bid

$255m deal sunk

Intelligent flash storage arrays

A takeover bid by an Israeli firewall firm has become the latest victim of US security protectionism. Check Point Software has dropped its bid for US rival Sourcefire after objections from the FBI and Pentagon were heard by the Treasury's Committee on Foreign Investments.

The Committee has also overseen the recent rumpus surrounding the Dubai carve-up of P&O, which would put Arab business in control of US ports.

Federal agency objections to the security software tie-up centre on the implementation of Sourcefire's anti-intrusion software 'Snort' by the Bureau and Department of Defense, AP reports. In private meetings between the panel and Check Point, FBI and Pentagon officials took exception to letting foreigners acquire the sensitive technology.

If the $225m deal had gone ahead as announced back in October, Check Point would have got the rights to all patents and source code. Check Point says the two companies will find ways round the roadblock. CEO Gil Shwed said: "We've decided to pursue alternative ways for Check Point and Sourcefire to partner in order to bring to market the most comprehensive security solutions."

Company lawyers had tried to salvage the deal by offering to attach conditions intended to satisfy the Feds, despite execs feeling they were onerous. Agreement could still not be reached.

The full Committee investigation into Check Point's bid began in early February. According to AP just being investigated often sounds a death knell for foreign investment - about half of companies pull out of their bids rather than face rejection.®

Intelligent flash storage arrays

More from The Register

next story
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
Why did it take antivirus giants YEARS to drill into super-scary Regin? Symantec responds...
FYI this isn't just going to target Windows, Linux and OS X fans
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Home Office: Fancy flogging us some SECRET SPY GEAR?
If you do, tell NOBODY what it's for or how it works
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
'Regin': The 'New Stuxnet' spook-grade SOFTWARE WEAPON described
'A degree of technical competence rarely seen'
Syrian Electronic Army in news site 'hack' POP-UP MAYHEM
Gigya redirect exploit blamed for pop-rageous ploy
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.