Feeds

NetScout buys Network General for $205m

Give it a wash, good as new

Beginner's guide to SSL certificates

NetScout Systems wants to purchase Network General for $205m, the company said today. The takeover will be the third time the once-leading packet monitoring firm has changed hands, 10 years after McAfeee purchased Network General for $1.1bn.

The deal will consist of six million shares of NetScout stock, $50m cash and $100m of debt financing. The transaction is set to close in early November.

NetScout expects the deal to double its current revenue rate by fiscal 2009. It said a broader portfolio will drive faster revenue growth and "significant" cost savings across the combined company.

"Today, we are bringing together two established companies with complementary technologies to form a new stronger organization that will have the scale, technology and mindshare to meet some of the greatest challenges associated with virtualization, convergence, SOA and highly distributed network-centric operations," wrote Anil Singhal, CEO of NetScout in an exceedingly long sentence.

Private equity firms Silver Lake and Texas Pacific Group, which purchased the company in 2003, will become NetScout shareholders and are expected to join the NetScout board. The combined company will be based in Westford, Massachusetts.

NetScout is the third in line to buy Network General since its founding in 1987. McAfee had an unsuccessful merger with NG in 1997, and sold the company to Silver Lake and TPG in 2003. In its heyday, Network General had even passed up acquiring Frontier Networks, which would later become NetScout. ®

Ye Olde Chronology

  • 1987: Network General Founded with Sniffer software.

  • 1992: Passes on acquiring Frontier Networks (which becomes NetScout).

  • 1997: McAfee merges with NG for $1.1bn, renamed Network Associates.

  • 2003: Silver Lake Partners purchases Sniffer Technologies unit for $275m, renamed Network General (McAfee reverts to previous name as well).

  • 2007: NetScout purchase for $205m. ®

Internet Security Threat Report 2014

More from The Register

next story
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
Astro-boffins start opening universe simulation data
Got a supercomputer? Want to simulate a universe? Here you go
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.