Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Perimeter

End of the Road for Kasten Chase

Encryption specialist, beset by financial problems, discontinues operations

Publicly traded storage security vendor Kasten Chase has discontinued operations and filed for bankruptcy after failing to find a buyer or partner to pull it out of its financial hole. (See Kasten Chase Goes Under.)

According to a statement released yesterday, the firm was engaged in discussions with "a number of parties over many months" in an effort to resolve its financial problems. Earlier this year, for example, the vendor announced a net loss of $8.3 million for 2005 and signed a $1.5 million credit note to continue its operations. (See Kasten Chase Reports Financials.)

Specifically, Kasten Chase was looking for a potential buyer or a reseller agreement "with an established storage vendor," according to the company's statement, but execs confirmed that the firm was unable to clinch a deal in time.

Analysts were not exactly stunned by the news. "Kasten Chase had a unique encryption solution for MVS mainframe environments, but it's really about access to markets, access to channels, and access to customers," says Robert Amatruda, research manager at IDC.

"I wasn't surprised that it happened," adds Jon Oltisk, senior analyst at the Enterprise Strategy Group. "The company struggled financially, they were looking for partners, and I think that the clock just ran out."

Greg Schulz, senior analyst at the StorageIO Group, however, was slightly more taken aback. "I thought that they had good technology -- I am surprised that they are not able to hang on in there and make a go of it," he told Byte and Switch.

But, all the analysts agree on one thing: The marketplace for encryption and key management products for data storage is a difficult one. "It's a rough market, it's still in its infancy," explains Schulz, adding that a lot of the security vendors in this space are still doing, "early missionary work."

Despite a spate of headline-grabbing incidents involving lost tape, many users are still taking a lax approach to tape security, with the technology perceived in some quarters as low priority. (See Tape Security Trips Up Users, A Tale of Lost Tapes, and Iron Mountain Keeps Truckin'.)

Against this backdrop, Kasten Chase also faced stiff competition from the likes of Neoscale and Decru, which was snapped up by Network Appliance for $272 million last year. (See NeoScale Shows Off at SNW and NetApp Buys Decru.) "In an early market like this, it really comes down to relationships -- Decru being acquired by NetApp really helped them," notes Schulz.

Now, however, it will be interesting to see who picks up Kasten Chase's assets and its intellectual property. The vendor specialized in mainframe security, recently announcing a partnership with mainframe connectivity vendor Optica Technologies. (See Kasten Chase, Optica Team Up, and Review: Tape Encryption Devices.)

When Byte and Switch called Toronto-based Kasten Chase earlier today, a recorded message said that the firm's office was closed and that Ernst & Young is now acting as the trustee, "for the benefit of creditors."

— James Rogers, Senior Editor, Byte and Switch. Special to Dark Reading

Organizations mentioned in this article:

  • Decru Inc.
  • Ernst & Young International
  • The Enterprise Strategy Group (ESG)
  • IDC
  • Kasten Chase Applied Research Ltd.
  • NeoScale Systems Inc.
  • Network Appliance Inc. (Nasdaq: NTAP)
  • The StorageIO Group

     

    Recommended Reading:

    Comment  | 
    Print  | 
    More Insights
  • Comments
    Newest First  |  Oldest First  |  Threaded View
    COVID-19: Latest Security News & Commentary
    Dark Reading Staff 7/6/2020
    Russian Cyber Gang 'Cosmic Lynx' Focuses on Email Fraud
    Kelly Sheridan, Staff Editor, Dark Reading,  7/7/2020
    Another COVID-19 Side Effect: Rising Nation-State Cyber Activity
    Stephen Ward, VP, ThreatConnect,  7/1/2020
    Register for Dark Reading Newsletters
    White Papers
    Video
    Cartoon
    Current Issue
    Special Report: Computing's New Normal, a Dark Reading Perspective
    This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
    Flash Poll
    The Threat from the Internetand What Your Organization Can Do About It
    The Threat from the Internetand What Your Organization Can Do About It
    This report describes some of the latest attacks and threats emanating from the Internet, as well as advice and tips on how your organization can mitigate those threats before they affect your business. Download it today!
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2020-15600
    PUBLISHED: 2020-07-07
    An issue was discovered in CMSUno before 1.6.1. uno.php allows CSRF to change the admin password.
    CVE-2020-15599
    PUBLISHED: 2020-07-07
    Victor CMS through 2019-02-28 allows XSS via the register.php user_firstname or user_lastname field.
    CVE-2020-8916
    PUBLISHED: 2020-07-07
    A memory leak in Openthread's wpantund versions up to commit 0e5d1601febb869f583e944785e5685c6c747be7, when used in an environment where wpanctl is directly interfacing with the control driver (eg: debug environments) can allow an attacker to crash the service (DoS). We recommend updating, or to res...
    CVE-2020-12821
    PUBLISHED: 2020-07-07
    Gossipsub 1.0 does not properly resist invalid message spam, such as an eclipse attack or a sybil attack.
    CVE-2020-15008
    PUBLISHED: 2020-07-07
    A SQLi exists in the probe code of all Connectwise Automate versions before 2020.7 or 2019.12. A SQL Injection in the probe implementation to save data to a custom table exists due to inadequate server side validation. As the code creates dynamic SQL for the insert statement and utilizes the user su...