Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Dell Completes Acquisition of SonicWALL

Dell today announced that it has completed its acquisition of IT security vendor SonicWALL, adding several components to the company’s security software and services portfolio.

In a deal that was announced on March 13 of this year, while the terms were not publicly disclosed, Dell reportedly paid $1.2 billion to acquired SonicWALL.

Dell today announced that it has completed its acquisition of IT security vendor SonicWALL, adding several components to the company’s security software and services portfolio.

In a deal that was announced on March 13 of this year, while the terms were not publicly disclosed, Dell reportedly paid $1.2 billion to acquired SonicWALL.

In June 2010, an investor group led by Thoma Bravo, LLC and the Ontario Teachers’ Pension Plan Teachers’ Private Capital made a move to acquire SonicWALL and take the company private a transaction valued at approximately $717 million.

“The acquisition of SonicWALL gives Dell immediate access to network security and secure remote access solutions that align well with Dell’s strategic objectives in both the SMB and enterprise markets. This will allow Dell to significantly expand its concept of secure networking and offering its customers solutions to cover a broad range of deployment scenarios,” said Scott Crawford, research director at Enterprise Management Associates. “

Dell says that customers and channel partners will benefit from its expanded security solutions portfolio, which now includes security services, cloud security solutions, data encryption solutions and vulnerability and patch management.

“Customers who are looking for simplified and comprehensive security solutions will benefit from the addition of SonicWALL to our software portfolio,” said John Swainson, president, Dell Software Group. “The combination of SonicWALL with Dell’s existing security offerings and broad market reach will help customers securely manage their data, securely manage consumer devices being brought into their enterprise, and securely expand their applications to the cloud.”

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

2022 Cybersecurity Year in Review: Top news headlines and trends that impacted the security ecosystem