Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Gemalto to Acquire SafeNet for $890 Million

European security firm Gemalto said on Friday that it has agreed to buy data protection firm SafeNet for $890 million in cash.

European security firm Gemalto said on Friday that it has agreed to buy data protection firm SafeNet for $890 million in cash.

Gemalto says the move will help expand its footprint in cloud data, software and transaction security, and adds core network data protection technologies to its authentication solutions.

News of the acquisition comes less than two months after SafeNet named Prakash Panjwani as the company’s new President and Chief Executive Officer. 

Headquartered in Belcamp, Maryland, SafeNet has over 1,500 employees and had revenues of $337 million and profit from operations of $35 million in 2013. The company predicted revenues of $370 million and profit from operations of $51 million for 2014.

SafeNet offers data protection solutions including encryption key management systems, encryption technologies for civilian applications, authentication servers and authentication as a service, and software license management and monetization solutions.

With more than 25,000 customers in over 100 countries, SafeNet says that its technology protects over 80% of the world’s intra-bank fund transfers.

According to Gemalto, SafeNet’s products complement Gemalto’s embedded software and portable secure elements and enhance Gemalto’s Identity and Access Management and Platforms & Services offerings—lines of business that accounted for €1,329 million and €715 million of the pro forma revenue in 2013 respectively.

“The opportunity to acquire SafeNet has come at exactly the right time, as we have just entered into our new multi-year development plan and there is a perfect fit between Gemalto’s ‘security at the edge’ and SafeNet’s ‘security at the core’ capabilities,” Olivier Piou, Gemalto CEO, said in a prepared statement. “This will enable us to further accelerate the deployment of strong security solutions in the Enterprise sector, and expand our technologies and growth opportunities in protecting online access. Overall, our global leadership in digital security will be reinforced.”

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.