Feeds

Cisco borgs Securent for $100m

And sprays China with cash

Choosing a cloud hosting partner with confidence

Cisco is dipping into loose change to buy Securent, a Silicon Valley data security startup, for $100m cash.

Securent makes software for companies to restrict user access to data on a network, helping prevent sensitive information from falling into nefarious hands.

The firm has 57 employees in Mountain View, California, with R&D in Hyderbad, India. Cisco will pay about $100m in cash and assumed options. The staff and technology will be assimilated into Cisco's Collaborative Software Group.

Their flagship software is Securent Entitlement Management Solution, which uses SQL agents as bouncers on Oracle databases or Sharepoint servers. The software intercepts requests before it reaches a database, and restricts what can come out based on the user.

Securent is Cisco's twelfth acquisition this year, and 125th in toto. It's the second security firm purchase by Cisco this year, since it announced intentions to acquire IronPort, an email filtering and web security firm for $830m.

Cisco expects the deal to close in the second quarter of its fiscal year 2008.

Cisco borgs China

Cisco said today it plans to spend $16bn in China over the next five years, nearly double the $8.5bn it has invested in China since 2002.

The money will go towards parts procurement, education, joint ventures and establishing a "green technology" center.

"Cisco has made significant investments in our China business since we established operations in the country in 1994, and this program will lay the foundation for the next chapter in Cisco's development in China," Cisco CEO John Chambers said today at a press conference in Beijing.

He gave a broad outline of the program, which will include significant investments in "Web 2.0" technologies through cooperation with Alibaba, China's largest ecommerce site. Cisco has previously agreed to buy a $17.5m stake in Alibaba, which will be valued at $8.8bn when it makes debut on the Hong Kong stock exchange next week.

The investment also includes an increase in local procurement of parts as well as increased funding for Cisco Systems Capital China, which provides credit for customers.

China provides ample opportunities for Cisco, housing the second-largest market for internet users after the US. However, the company has taken heat from some human rights organizations, which say the Chinese government uses Cisco gear to censor the internet and limit political dissidence. ®

Secure remote control for conventional and virtual desktops

More from The Register

next story
Azure TITSUP caused by INFINITE LOOP
Fat fingered geo-block kept Aussies in the dark
NASA launches new climate model at SC14
75 days of supercomputing later ...
Yahoo! blames! MONSTER! email! OUTAGE! on! CUT! CABLE! bungle!
Weekend woe for BT as telco struggles to restore service
Cloud unicorns are extinct so DiData cloud mess was YOUR fault
Applications need to be built to handle TITSUP incidents
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
BOFH: WHERE did this 'fax-enabled' printer UPGRADE come from?
Don't worry about that cable, it's part of the config
Stop the IoT revolution! We need to figure out packet sizes first
Researchers test 802.15.4 and find we know nuh-think! about large scale sensor network ops
DEATH by COMMENTS: WordPress XSS vuln is BIGGEST for YEARS
Trio of XSS turns attackers into admins
SanDisk vows: We'll have a 16TB SSD WHOPPER by 2016
Flash WORM has a serious use for archived photos and videos
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.