Symantec snares Vontu for $350 million

Symantec has plunged into the data-loss protection (DLP) market via the acquisition route, announcing on Monday that it has agreed to purchase partner Vontu for $350 million. The acquisition, rumored for several weeks, further validates the hot DLP sector, where a number of large players, including EMC and Websense, already have snatched up similar companies. Symantec took a similar approach. “The big guys are gulping these companies up, basically,” Chenxi Wang, the principal security and risk management analyst for Forrester Research, told SCMagazineUS.com today.

Wang said she believes the addition of Vontu’s DLP software, which is used to control the flow of sensitive information across corporate networks, is a smart move for Symantec.

“That piece of their content security strategy is now more comprehensive, and that’s important for them strategically,” she said.

The DLP arena is “a hot market, and the average customer is looking” at data-loss protection software, she said. “Strategically, this market can grow, and also Vontu has a good reputation.”

Several factors led to the acquisition, said Ken Schneider, chief technology officer and a fellow in the security and data management group at Symantec.

“We saw Vontu as head and shoulders” above the other vendors in the DLP market, he told SCMagazineUS.com today. In addition, Symantec had already integrated Vontu technology into its SMS 8300 appliance that prevents emails and instant messages with sensitive data from leaving the network.

The acquisition is “all about protecting data and answering three simple questions for chief information security officers: Where is my confidential information stored in the organization, how is it being used, and how do I prevent it from being lost?” Steve Roop, Symantec’s vice president of marketing and products, told SCMagazineUS.com today.

The Vontu acquisition will also give Symantec better traction in the so-called “e-discovery” arena, Roop said.

“Vontu’s discovery capabilities can reach into Symantec archival and backup and content repositories and help companies comply with the new rules of e-discovery,” he said.

The DLP niche has become a growing star within the broader IT security market, expanding to about 35 to 40 vendors. Some experts, such as Nick Selby of The 451 Group, have said the plethora of solutions do very little to differentiate themselves from each other.

But all hope to grab a piece of the growing compliance-driven needs of customers in heavily regulated industries — most notably, financial services, say experts.

Vontu was one the largest remaining independent developers of DLP software, which has been hyped as one of the few available ways to protect against insider threats. Insider threats can lead to the theft of data customer records or valuable intellectual property by employees, business partners or malware attacks.

In addition to the Symantec-Vontu deal, other acquisitions in the DLP market so far this year include EMC’s purchase of Tablus in August for an unknown amount, Websense’s buy of PortAuthority for $90 million in January and Raytheon’s acquisition of Oakley Networks for an undisclosed amount in September.

Not surprising, reaction to the Symantec-Vontu deal was mixed. Symantec competitor McAfee, for instance, went on the offensive.

“Even with its acquisition of Vontu, Symantec still doesn’t compare to McAfee as a data-protection vendor,” Vimal Solanki, senior director of product marketing at McAfee, said in a prepared statement. “McAfee was the first major security vendor to offer DLP (with the recently announced SafeBoot acquisition).”

So did Websense: “Though Symantec claims the acquisition of Vontu is strategic, given its past history with acquisitions, it is likely that the level of focus on the technology will decline and future innovation slow, which may force Symantec to rely on their size rather than a best-in-class technology to sell the DLP solution,” the company said in a prepared statement.

Tizor, which offers database monitoring tools, took another tack.

“Symantec’s acquisition of Vontu validates the heightened importance of protecting data in today’s enterprises,” said Bill Bartow, vice president of product management at Tizor. “It makes sense that the big security players would take a strong interest in data leakage because that’s what the enterprise market has been focused on in recent months.”

One Comment

  1. ◾PROTOCOL SHIELDERS◾
    HELLO, I am COREY RODRIGUEZ by name,the only CEO of protocol-cyber-shield-hackers.  In this message, we will explain how you can almost avoid SCAMMERS and stay safe,  plus how our organization works. Read it carefully,Its reading will not take more than 10mins. 
    We kindly URGE you to not respond without have read the entire text. Those who mail without have read everything, ask questions that are been answered here.

    ⚠️WARNING:
    MOST HACKERS YOU SEE HERE ARE FAKES AND SIMULTANEOUSLY INCONGRUOUS. 
    It tears US up when we receive bitter mails of Jobs attempts proposals from most clients with hacking issues but never get close to having them done, thereby wasting a lot $ in the process, 
    EXAMPLES: 
    ➡️MOBILE PHONE HACKING.
    ➡️BINARY FUNDS&BITCOIN RECOVERIES.

    ➡️SOCIAL MEDIA ACCOUNT&EMAIL HACKING etc....
    if you in a haste to have any of these done by seeking hackers yourselves,you will only get ripped.
    PLEASE PAY ATTENTION TO THIS ARTICLE AS YOU READ THROUGH IT.

    HOW WOULD YOU KNOW?? 

    TAKE NOTE AND PRECAUTIONS:

    1. you see uncertified email accounts carrying numberings likeiamhacklord1232@(gmail,yahoo or hotmailDOTcom)  pls flee from them, BIG SCAMMERS.

    They take your money and never do your job.

    2. you see posts like "do you need to spy on spouse?" All fake!just a way to lure you towards getting ripped!. 3, posting fake testimonies and comments to trick you into feeling safe. Pls endeavour to ignore!! 

    ➡️NOTE: beware as we urge you not to make respond to any "IVAN HONG,PETER SANTOS,MONICA HART (impersonating with our articles pretending to work under us)
    WE ONLY HAVE 2 EMAILS WHICH ARE LISTED BELOW THIS ARTICLE TO ATTEND TO ALL MANNERS OF CYBER HACKING ISSUES.

                           ◾VERY IMPORTANT ◾
    For years now, We've helped  organizations  secure data base,  so many sites USE US AS SECURITY BACK UP TEAM BECAUSE OF OUR METHODS OF  HANDLING CYBER MISHAPS. 

    "iPhone&ANDROID HACKS"

    "CLEAR CRIMINAL RECORDS"   

    "FUNDS RECOVERIES" AND LOT MORE BEEN DONE IN SHORT TIMING.
    these are significant EXPERIENCES & RECORDS a good and effectively fully recognized organization must firmly ascertain. 

                            ◾OUR AIMS HERE◾

    1◾to assign a qualified agent of specific rank to particularly any sort of cyber issues you intend dealing with in short and accurate timing.

    2◾ to screen in real hackers (gurus only) in need of job with or without a degree, to speed up the  availability of time given for Job contracts given to us.Thus an online binary decoding exam will be set for those who seeks employment under the teams Establishment.
     write us on:
    ◾Protocolhacks@gmail .com
    ◾Cybershieldnotch@gmail .com
    COREY ROD, 
    SIGNED...
    Thank you..

    ReplyDelete

Back to Top