Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Autonomy Scoops up Digital Assets from Iron Mountain

Autonomy Corporation, with dual headquarters in Cambridge, England and San Francisco, California, announced that it would acquire certain assets from Iron Mountain’s digital division including archiving, eDiscovery, and online backup for $380 million in cash.

The acquisition of assets will bring over six petabytes of data under management and more than 6,000 customers to Autonomy’s customer base, bringing its private cloud data to over 25 petabytes and total customer base to over 25,000.

Autonomy Corporation, with dual headquarters in Cambridge, England and San Francisco, California, announced that it would acquire certain assets from Iron Mountain’s digital division including archiving, eDiscovery, and online backup for $380 million in cash.

The acquisition of assets will bring over six petabytes of data under management and more than 6,000 customers to Autonomy’s customer base, bringing its private cloud data to over 25 petabytes and total customer base to over 25,000.

Iron Mountain launched its digital business 10 years ago but recently had problems with managing the business in a rapidly changing environment with increased competition. Last fall the company conducted a strategic review of its digital business and concluded that it couldn’t continue investing in technology development and meet its return requirements, resulting in its decision to shut down some and sell key assets. Iron Mountain recently replaced its CEO, Bob Brennan, who stepped down and also resigned as a director of the company. Richard Reese replaced Brennan as Chief Executive Officer.

The deal will not include the technology escrow service and a medical records archive service and other smaller operations which were recently shut down by Iron Mountain.

The acquisition brings Autonomy solid assets at a somewhat attractive valuation, while letting current Iron Mountain Digital customers to be supported without disruption.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.