Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Cloud Security

Alert Logic to be Acquired by Private Equity Firm

Alert Logic, a Houston, Texas-based provider of Security-as-a-Service solutions for cloud environments, announced on Tuesday that it has agreed to be acquired by private equity firm Welsh, Carson, Anderson & Stowe. The transaction will put a majority of company shares in the hands of the private equity investors and Alert Logic’s executive management.

Alert Logic, a Houston, Texas-based provider of Security-as-a-Service solutions for cloud environments, announced on Tuesday that it has agreed to be acquired by private equity firm Welsh, Carson, Anderson & Stowe. The transaction will put a majority of company shares in the hands of the private equity investors and Alert Logic’s executive management.

Alert Logic offers Security-as-a-Service solutions for customers of hosting and cloud service providers, and says more than half of the largest managed hosting and cloud service providers use its technology to secure their customer environments. Overall, the company counts  more than 2,200 customers that use its products.

Alert Logic recently announced that it had $10.1 million in revenue for the fiscal quarter ending June 30, 2013, and that the company is currently operating at an annual revenue run-rate of more than $43 million.

The company has received several rounds of venture capital funding over the years, including a Series E investment of $12.6 million in April 2011, and a $12.2 million round in June 2012. 

Alert Logic’s existing management team will continue to operate the business which will receive additional growth capital from Welsh Carson in connection with the transaction.

The terms of the transaction were not disclosed, and the transaction is expected to close by the end of August. Shareholders cashing out on the acquisition include Updata Partners, Covera Ventures, Mercury Fund, OCA Ventures, Access Venture Partners, and Industry Ventures.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Conversations

SecurityWeek talks to Billy Spears, CISO at Teradata (a multi-cloud analytics provider), and Lea Kissner, CISO at cloud security firm Lacework.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Cloud Security

Cloud security researcher warns that stolen Microsoft signing key was more powerful and not limited to Outlook.com and Exchange Online.