Blue Coat second company to buy Crossbeam Systems in recent weeks
- 17 December, 2012 23:02
Blue Coat Systems Monday announced an agreement to acquire Crossbeam Systems for an undisclosed amount by year-end. This would mark the second time Crossbeam has been acquired in 2012, with private equity firm Thoma Bravo acquiring it just last month.
Blue Coat makes Web security and WAN optimization gear, and Crossbeam is known for its specialized high-end X-Series hardware that supports software of several third-party security vendors, including Check Point, McAfee, IBM, Imperva, Sophos and Trend Micro. Blue Coat President and COO David Murphy says there are no plans to change this security software support, and in fact Blue Coat will be looking at how to expand into other application areas, such as forensics and analysis.
The Crossbeam X-Series platform does not currently support Blue Coat security applications but that appears likely to change. Murphy says Blue Coat will continue to offer its traditional line of products in any event.
Murphy points out that Blue Coat has approximately 15,000 customers, while Crossbeam's number can be counted as "several hundred." Known Crossbeam customers are BT, Cell C, Motel 6, NTT Globe Telecom and Volkswagen. Blue Coat is interested tapping Crossbeam's telecom provider customers for more business once the acquisition is finalized.
As for Thomas Bravo flipping Crossbeam to Blue Coat just a month after buying the company, Murphy would only say that Blue Coat had long been interested in acquiring Crossbeam, but that it hadn't engaged in any bidding war earlier. Murphy says that investment firms can move quickly, and that it's viewed as positive that Thoma Bravo went through the acquisition process since a lot of necessary disclosures and vetting have just taken place. He declines to say how profitable this brief ownership of Crossbeam will have been for Thoma Bravo.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Trust issue looms large for tech companies capitalizing on personal data
5 women who've made it in IT
Five trends affecting legal CIOs
CIO Roundtable: The changing face of security
Bitcoin malware count soars as cryptocurrency value climbs
Leading insurance provider’s desktop virtualization deployment
QBE insurance group met the challenge of swiftly deploying a desktop virtualization solution, after practically outsourcing its entire IT department overnight. Read their story to learn how to allow users a comfortable desktop while ensuring that IT can maintain control.
The Power of Transformational Knowledge
Apple saves $5 million a year on case and email deflection, while its agents find information 47 per cent faster than before they invested in something called Transformational Knowledge. In today’s consumer-empowered marketplace, you cannot afford negative customer experiences. However many companies lack the tools and processes required to empower their employees to deliver great customer experiences. In this whitepaper, we look at how to breakdown silos and deliver great customer experiences.
Implementing an Effective Vulnerability Management Program
Your company's information is often not secured in a large safe which can be easily protected. Instead, information is spread across many systems, networks and devices exposing it to a higher possibility of it being compromised in some way. This paper discusses the challenges of vulnerability management - human, implementation, changes, and software and how to overcome these by implementing an effective vulnerability management program.