Operations //

Identity & Access Management

6/4/2018
11:45 AM
50%
50%

Fortinet Completes Bradford Networks Purchase

NAC and security firm added to Fortinet's portfolio.

Fortinet has completed its purchase of Bradford Networks, a network security visibility and automation company. Financial details of the purchase were not disclosed.

Bradford Networks Network Sentry's product automates a security response to malicious events and has previous integration into the Fortinet Fortigate framework.

In a statement accompanying news of the purchase, Fortinet CEO Ken Xie noted that the integration provides "continuous visibility, micro-segmentation and access control technology" for large enterprise networks.

Bradford Networks CEO Rob Scott, in a statement concerning the purchase, noted that the two companies' products could have an impact on difficult security environments, "…such as critical infrastructure — power, oil and gas and manufacturing."

For more, read here and here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
NathanDavidson
50%
50%
NathanDavidson,
User Rank: Apprentice
12/22/2018 | 1:47:30 AM
Fulfilling demand
In every industry, almost every organization would be seen acquiring one another especially those operating similar businesses. This is to expand their service coverage so as to reach out to a wider target audience. Greater demands can then be fulfilled, making the industry a smoother place of consumerism.
UdyRegan
50%
50%
UdyRegan,
User Rank: Apprentice
12/18/2018 | 2:06:22 AM
Good Business Deals
AT the end of the day, if the acquisition allows both companies to benefit in terms of protection and reach, then I don't see why there shouldn't be more encouragement and celebration for the takeover. It doesn't seem like any of the employees were reshuffled or redirected to other parts of the business either so it's really operations as per usual isn't it? Except with better capabilities and opportunities on the horizon!
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/6/2018 | 8:56:55 AM
Cheaper to Buy than to Build
It seems like this will continue to be on ongoing trend of acquisitions. Working in a shop that has performed both, in the long run it seems like acquisition will typcially be the most cost effective way of diversifying the company portfolio.
It Takes an Average of 3 to 6 Months to Fill a Cybersecurity Job
Kelly Jackson Higgins, Executive Editor at Dark Reading,  3/12/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
5 Emerging Cyber Threats to Watch for in 2019
Online attackers are constantly developing new, innovative ways to break into the enterprise. This Dark Reading Tech Digest gives an in-depth look at five emerging attack trends and exploits your security team should look out for, along with helpful recommendations on how you can prevent your organization from falling victim.
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-6149
PUBLISHED: 2019-03-18
An unquoted search path vulnerability was identified in Lenovo Dynamic Power Reduction Utility prior to version 2.2.2.0 that could allow a malicious user with local access to execute code with administrative privileges.
CVE-2018-15509
PUBLISHED: 2019-03-18
Five9 Agent Desktop Plus 10.0.70 has Incorrect Access Control (issue 2 of 2).
CVE-2018-20806
PUBLISHED: 2019-03-17
Phamm (aka PHP LDAP Virtual Hosting Manager) 0.6.8 allows XSS via the login page (the /public/main.php action parameter).
CVE-2019-5616
PUBLISHED: 2019-03-15
CircuitWerkes Sicon-8, a hardware device used for managing electrical devices, ships with a web-based front-end controller and implements an authentication mechanism in JavaScript that is run in the context of a user's web browser.
CVE-2018-17882
PUBLISHED: 2019-03-15
An Integer overflow vulnerability exists in the batchTransfer function of a smart contract implementation for CryptoBotsBattle (CBTB), an Ethereum token. This vulnerability could be used by an attacker to create an arbitrary amount of tokens for any user.