Feeds

Cambridge Consultants restarts VC biz

Money meets mouth

Internet Security Threat Report 2014

Cambridge Consultants is reopening its venture capital business. It will raise a fund with an investment partner and aims to have its first new venture up and running by 2007.

It will then work towards producing a spin-out company every two years. The fund will be invested exclusively in Cambridge Consultants' own businesses.

A spokesman for Cambridge Consultants said: "We are negotiating with three partners at the moment but the fund will raise between $5m and $10m depending on which partner we choose." He added that the firm pulled out of funding in 2002 mainly because it was so hard to raise money.

Jamille Jinnah, managing director of placement firm Almeida Capital, said: "It's good to see venture money coming to Europe because so much more goes to Israel and the US. But the question is whether they raise enough money to take firms far enough so that other investors will be interested."

The firm has been advising for 45 years and ex-CC companies now employ some 3,000 people and have a total market cap of almost £2bn.

Press release available here. ®

Intelligent flash storage arrays

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.