Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

OpenText to Acquire Data Protection Firm Carbonite

Enterprise information management (EIM) firm OpenText this week announced it has entered a definitive agreement to acquire data protection and cybersecurity provider Carbonite, Inc.

Enterprise information management (EIM) firm OpenText this week announced it has entered a definitive agreement to acquire data protection and cybersecurity provider Carbonite, Inc.

Canada-based OpenText aims to help organizations accelerate growth, lower costs, and reduce security risks through business insight, both on premises and in the cloud. The company operates in 40 countries.

Founded in 2005, Carbonite provides a cloud-based subscription data protection, backup, and recovery solution for both businesses and consumers. With support for Windows and macOS, the solution allows users to back up documents, emails, music, photos, and settings.

In February this year, Carbonite acquired cybersecurity company Webroot for roughly $618.5 million in cash.

As part of the newly announced transaction, which is subject to customary closing conditions, OpenText has agreed to pay $23.00 per Carbonite share in cash, for a total purchase price of roughly $1.42 billion, including cash and debt.

Through this acquisition, OpenText aims to extend its security offerings in data loss prevention, digital forensics, and endpoint detection and response by adding Carbonite’s data protection and endpoint security solutions.

“We are excited by the opportunity to bring forth exceptional leadership in operational execution and integration capabilities to Carbonite. Once integrated, we expect to increase our annual recurring revenues, deliver strong cloud growth, and expand cloud margins and adjusted EBITDA,” OpenText EVP & CFO, Madhu Ranganathan, commented.

OpenText will commence the tender offer for all shares of Carbonite common stock within 10 business days and expects to close the transaction within 90 days.

Advertisement. Scroll to continue reading.

Carbonite had J.P. Morgan Securities as financial advisor, and Skadden, Arps, Slate, Meagher & Flom as legal advisor.

Related: Carbonite to Acquire Webroot for $618 Million in Cash

Related: Online Backup Firm Carbonite Hit by Password Reuse Attack

Related: HP Acquires Endpoint Security Company Bromium

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Understand how to go beyond effectively communicating new security strategies and recommendations.

Register

Join us for an in depth exploration of the critical nature of software and vendor supply chain security issues with a focus on understanding how attacks against identity infrastructure come with major cascading effects.

Register

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.