Feeds

Second time lucky, Check Point marries intrusion prevention firm

Feds raise no objection to second bride

The Essential Guide to IT Transformation

Check Point Software has agreed to buy threat prevention firm NFR Security for around $20m. The deal, announced Tuesday, is expected to close by the end of the year.

NFR, established in 1996, is based in Rockville, Maryland, and has 22 employees. Its flagship product is a piece of intrusion detection and prevention software called Sentivist. As well as blocking (or at least warning about) incoming hack attacks, the product boasts features that can defend against zero-day attacks, anomaly exploits, malicious code, backdoors, command tampering, polymorphic buffer overflows, and more.

Israel-based Check Point tried to buy into the intrusion prevention market before, but it dropped its $225m for Sourcefire in March after objections from the FBI and Pentagon were heard by the Treasury's Committee on Foreign Investments. FBI and Pentagon officials took exception to letting foreigners acquire sensitive technology used to protect them from hacker attack.

The acquisition of NFR is free of these national security concerns and has already been approved by regulators.

Post acquisition, Check Point plans to add NFR's technology to its existing portfolio of firewall, VPN, and security management product. Check Point will also offer stand-alone security products by unifying NFR's product line with its InterSpect internal security gateway kit.

"This acquisition is an important step in Check Point's leadership strategy to continuously raise the level of security available to enterprises for protecting their mission-critical networks. It is part of our focus on two primary layers: network security as our core platform and our recently announced expansion into data security," Check Point founder and chief executive officer Gil Shwed said.

In related news, Check Point upped its bid to acquire Protect Data, the holding company for mobile security firm PointSec Mobile Technologies, on Monday. The revised bid values Protect Data at $625m (SEK 4,314m) compared to the previous offer of $586m (SEK 4,152m).

The offer is subject to the agreement of 90 per cent of Protect's shareholders, as well as regulatory approval. Protect Data shareholders will have the festive season to make up their mind on the deal after the offer was extended until 8 January. ®

Build a business case: developing custom apps

More from The Register

next story
14 antivirus apps found to have security problems
Vendors just don't care, says researcher, after finding basic boo-boos in security software
'Things' on the Internet-of-things have 25 vulnerabilities apiece
Leaking sprinklers, overheated thermostats and picked locks all online
Only '3% of web servers in top corps' fully fixed after Heartbleed snafu
Just slapping a patched OpenSSL on a machine ain't going to cut it, we're told
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
Israel's Iron Dome missile tech stolen by Chinese hackers
Corporate raiders Comment Crew fingered for attacks
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.