NETGEAR Buying CP Secure

Photo of author

Tim Higgins

Founded in 2002 and with an established engineering center in Nanjing, China, CP Secure is a leading provider of integrated security solutions. CP Secure has patent-pending stream-based scanning technology that provides real-time scanning of high-volume web and email traffic without degrading network performance.

NETGEAR will pay $14.0 million in cash for CP Secure’s assets. CP Secure will also receive a total additional payout of up to $3.5 million in cash following closure of the acquisition if it achieves certain specified objectives.

The acquisition is subject to various standard closing conditions and is expected to close in the fourth quarter. Following completion of the transaction, CP Secure’s Chief Executive Officer, Shuang Ji, will become NETGEAR’s Vice President of Engineering for security products.

The deal will give NETGEAR CP’s assets that include over 40 engineers, pending patents, proprietary technologies, customer base, current products, and products in development.

NETGEAR said it intends to release a full line of NETGEAR ProSecure security appliances for web, email and unified threat management incorporating CP Secure’s platform within the next 12 months.

Related posts

D-Link adds Security Service to more routers

D-Link today said its SECURESPOT 2.0 Internet Security and Parental Control Services has been added to two more of its draft 802.11n routers.

Iomega, Postini announce SMB email security partnership

Iomega today announced a partnership with Postini to offer managed email security and spam defense solutions to small and mid-sized businesses.

Under the agreement, Iomega is now delivering Postini's security and compliance solutions to SMBs in the United States and in international markets. Beginning next month, distributor Tech Data will offer its customers the new Iomega OfficeScreen Managed Email Security and Spam Defense - Powered by Postini.

New Windows exploit could disable firewall

Security researchers have discovered a new Windows flaw that could allow hackers to crash the built-in firewall. By sending malformed DNS packets to vulnerable machines, hackers could disable and eventually bypass the operating system firewall. So far only Windows XP computers with the Internet Connection Sharing (ICS) service turned on are affected by the attack.

Full Story on TG Daily