Feeds

McAfee gobbles up MX Logic for cloud security push

Splashes out again with SAAS-y purchase

Securing Web Applications Made Simple and Scalable

McAfee has agreed to buy email and filtering services firm MX Logic for $140m in cash, followed by a further $30m, providing performance targets are met.

The deal - announced Thursday - is designed to bolster McAfee's existing 'security as a service' portfolio. MX Logic's filtering, email archiving and continuity services will be integrated with McAfee's threat intelligence technologies. MX Logic has 40,000 customers and four million end users.

McAfee's existing cloud-based security portfolio includes anti-malware scanning and vulnerability assessment services, among other items. Alongside Panda and Trend Micro, the firm is among the most aggressive players in the security market in talking up the benefits of cloud-based architectures, in responding to the increased volume of malware variants vendors face every day.

The acquisition, which is subject to regulatory approval and other customary closing conditions, in expected to close in Q3 2009. McAfee expects the acquisition of MX Logic to break even or better in 2010.

The MX Logic deal is the latest in a string of purchases by McAfee, which has opened up its cheque book even more frequently than before the economic downturn.

McAfee also announced its Q2 financial results on Thursday. For the second quarter ending June 30, McAfee recorded revenues of $469m, an increase of 18 per cent from the same quarter last year. However, Q2 09 net income fell to $28.7m, compared with $47.8m in Q2 08 as a result of increased charges and adverse currency fluctuations. ®

The smart choice: opportunity from uncertainty

More from The Register

next story
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Don't look, Snowden: Security biz chases Tails with zero-day flaws alert
Exodus vows not to sell secrets of whistleblower's favorite OS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.