Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

BreakingPoint Systems to Be Acquired for $160 Million in Cash

Ixia To Acquire BreakingPoint Systems for $160 Million in Cash Deal

Ixia To Acquire BreakingPoint Systems for $160 Million in Cash Deal

BreakingPoint Systems, a provider of technology that helps test IT infrastructure to massive scales and simulate cyberwar conditions is set to be acquired by Ixia (NASDAQ:XXIA), a provider of converged IP and wireless network test and visibility solutions, for approximately $160 million in cash.

BreakingPoint Systems

The acquisition of BreakingPoint enables Calabasas, California-based Ixia to provide an end-to-end solution that monitors, tests, and optimizes converged networks.

BreakingPoint’s solutions provide insight into the resiliency of an organization’s IT infrastructure under various conditions and malicious attacks and help battle-test wired and wireless infrastructures, deploy compact cyber ranges, and optimize network and data center systems.

“As a leader in cyber security research, BreakingPoint has built a library of more than 34,000 attacks, exploits, malware, and more,” said Dennis Cox, co-founder and Chief Technology Officer of BreakingPoint in a statement. “Joining forces with Ixia creates a powerful platform in security and application testing – one with an extensive global sales reach into enterprises, service providers, and government agencies.”

The transaction expected to close in the third quarter of 2012 and is subject to adjustment based on BreakingPoint’s net working capital and cash at closing.

BreakingPoint experienced revenue growth over 40 percent in 2011, totaling $33.5 million for the year, with a gross margin of 87 percent. Ixia expects BreakingPoint’s revenue to again grow by more than 40 percent in 2012.

Related ReadingBreakingPoint Provides War Game Training Using its Network-Crushing Device

Advertisement. Scroll to continue reading.

Related Reading: BreakingPoint FireStorm ONE Enables Massive-Scale Security Testing On-the-Go

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem