Feeds

Cisco borgs Securent for $100m

And sprays China with cash

HP ProLiant Gen8: Integrated lifecycle automation

Cisco is dipping into loose change to buy Securent, a Silicon Valley data security startup, for $100m cash.

Securent makes software for companies to restrict user access to data on a network, helping prevent sensitive information from falling into nefarious hands.

The firm has 57 employees in Mountain View, California, with R&D in Hyderbad, India. Cisco will pay about $100m in cash and assumed options. The staff and technology will be assimilated into Cisco's Collaborative Software Group.

Their flagship software is Securent Entitlement Management Solution, which uses SQL agents as bouncers on Oracle databases or Sharepoint servers. The software intercepts requests before it reaches a database, and restricts what can come out based on the user.

Securent is Cisco's twelfth acquisition this year, and 125th in toto. It's the second security firm purchase by Cisco this year, since it announced intentions to acquire IronPort, an email filtering and web security firm for $830m.

Cisco expects the deal to close in the second quarter of its fiscal year 2008.

Cisco borgs China

Cisco said today it plans to spend $16bn in China over the next five years, nearly double the $8.5bn it has invested in China since 2002.

The money will go towards parts procurement, education, joint ventures and establishing a "green technology" center.

"Cisco has made significant investments in our China business since we established operations in the country in 1994, and this program will lay the foundation for the next chapter in Cisco's development in China," Cisco CEO John Chambers said today at a press conference in Beijing.

He gave a broad outline of the program, which will include significant investments in "Web 2.0" technologies through cooperation with Alibaba, China's largest ecommerce site. Cisco has previously agreed to buy a $17.5m stake in Alibaba, which will be valued at $8.8bn when it makes debut on the Hong Kong stock exchange next week.

The investment also includes an increase in local procurement of parts as well as increased funding for Cisco Systems Capital China, which provides credit for customers.

China provides ample opportunities for Cisco, housing the second-largest market for internet users after the US. However, the company has taken heat from some human rights organizations, which say the Chinese government uses Cisco gear to censor the internet and limit political dissidence. ®

Reducing security risks from open source software

More from The Register

next story
Sysadmin Day 2014: Quick, there's still time to get the beers in
He walked over the broken glass, killed the thugs... and er... reconnected the cables*
Amazon Reveals One Weird Trick: A Loss On Almost $20bn In Sales
Investors really hate it: Share price plunge as growth SLOWS in key AWS division
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
SHOCK and AWS: The fall of Amazon's deflationary cloud
Just as Jeff Bezos did to books and CDs, Amazon's rivals are now doing to it
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
The triumph of VVOL: Everyone's jumping into bed with VMware
'Bandwagon'? Yes, we're on it and so what, say big dogs
Carbon tax repeal won't see data centre operators cut prices
Rackspace says electricity isn't a major cost, Equinix promises 'no levy'
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.