Related Links

Related Stories

  • Compromised websites leading to banking malware
    M86 Security is warning that recent spam campaigns are luring victims to compromised websites that redirect to malicious Phoenix-hosting sites, which in turn seek to infect the visitor with the Cridex trojan.
  • M86’s new technology protects schools
    M86 Security has released a new version of its Web Filtering and Reporting Suite specifically aimed at schools. With pupils’ growing use of both personal and school-issued portable devices, it is becoming increasingly important that staff are aware of what’s going on in order to adequately discharge their ‘duty of care’ on school premises.
  • Layered security is best, but don’t overlook the obvious, says M86 Security
    E-mail and end users are overlooked too often in security strategies, with IT professionals tending to take their eye off the ball in these two areas, warns M86 Security.
  • Trustwave report reveals companies making same old mistakes
    Compliance and security service provider Trustwave has released its 2010 Global Security Report. The company has found that companies are still suffering from attacks using familiar exploit types that have been around for years. Organizations are implementing new technologies without securing existing ones, the report found.
  • Trustwave enters incident management business
    Security and PCI compliance tools vendor Trustwave has launched an Incident Readiness Service to prepare and help protect organizations from security incidents, and help test incident response plans.

Top 5 Stories


Trustwave to acquire M86 Security

07 March 2012

Trustwave, a Chicago-based security company with offices around the world, has signed a definitive agreement to acquire M86 Security, which is based in Irvine California and has international headquarters in London and R&D in California, Israel and New Zealand.

Both companies have a history of growth, or at least expansion, through acquisition. M86 grew from the combination of 8e6, Marshall, Finjan and Avinti. Trustwave’s acquisitions have included Vericept, Mirage Networks, Breach Security, BitArmor, ControlPath, and Intellitactics. On the surface, both companies will benefit from little overlap between them, but will suffer from the perennial difficulty of integrating different capabilities and cultures.

This doesn’t worry John Vigouroux, Chief Executive Officer at M86. “Trustwave has a tremendously successful track record of not only finding, acquiring and integrating security companies but also continuing to innovate their products and technologies,” he said at the announcement. “Customers and partners have a lot to look forward to as the combination of Trustwave and M86 Security gives them access to a broader, unified security portfolio powered by the industry’s most advanced threat technology intelligence.”

There is certainly great potential in this merger. M86 has three primary product ranges: a web gateway, an email gateway, and a web filtering and reporting suite. These will be integrated into Trustwave’s existing portfolio. The M86 Security Labs’ research capabilities will be merged with Trustwave’s own SpiderLabs. SpiderLabs looks inward at corporate data, analyzing the vulnerabilities that could be used by attackers. M86 Labs researches threats on the wider internet before they can be targeted at the vulnerabilities. In theory, combining the two will provide a more overall, rounded security stance.

“By acquiring M86 Security, Trustwave is adding web security to one of the industry’s most comprehensive security product portfolios – including our compliance, application, network and data security solutions,” Robert J. McCullen, Chairman, Chief Executive Officer and President, Trustwave. However, the new business will need to do better than Trustwave’s 2010 performance. Despite continued growth over the last few years, Trustwave made a net loss of $4.6m in 2010. 

Special note: at the time of writing this report, the M86 website is unavailable. Infosecurity has been told that has been caused by a server migration issue and has nothing to do with the acquisition.

This article is featured in:
Compliance and Policy  •  Industry News  •  Internet and Network Security  •  Malware and Hardware Security


Comment on this article

You must be registered and logged in to leave a comment about this article.

We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×