Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Application Security

Sophos Acquires Capsule8 to Beef up Linux Protection

British anti-malware powerhouse Sophos has acquired Capsule8 to beef up the Linux protection capabilities to its endpoint detection and response product stack.

Financial terms of the deal were not disclosed. 

British anti-malware powerhouse Sophos has acquired Capsule8 to beef up the Linux protection capabilities to its endpoint detection and response product stack.

Financial terms of the deal were not disclosed. 

Capsule8, based in New York, raised $30 million in venture capital investments since launching in 2016.  Capsule8’s investors include Intel Capital, Rain Capital, ClearSky and Bessemer Venture Partners.

For Sophos, the Capsule8 technology adds runtime visibility, detection and response for Linux production servers and containers covering both on-premises and cloud workloads.

“Comprehensive server protection is a crucial component of any effective cybersecurity strategy. This deal expands our portfolio of Detection and Response Solutions and Services for underprotected server and cloud environments,” said Dan Schiappa, chief product officer at Sophos.

[ Related: Thoma Bravo to Acquire Sophos for $3.9 Billion ]

Schiappa said the plan is to integrate the Capsule8’s capabilities and technologies into multiple Sophos product lines, including  Extended Detection and Response (XDR) solutions, Intercept X server protection products, and Sophos Managed Threat Response (MTR) and Rapid Response services.

In practice, the Capsule8 acquisition gives Sophos new Linux telemetry and event information, beefing up the company’s data lake with additional context for advanced threat hunting and security operations.

Advertisement. Scroll to continue reading.

Sophos, acquired in 2019 by private equity firm Thoma Bravo in a $3.9 billion deal, has been aggressive on the acquisition front, purchasing several startups including Invincea, Avid Secure and Cyberoam Technologies.

Related: The Battle to Control Enterprise Data Lakes

Related: Sophos to Acquire Invincea for up to $120 Million

Related: Sophos Acquires Network Security Firm Cyberoam Technologies

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

Shaun Khalfan has joined payments giant PayPal as SVP, CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Cybercrime

A recently disclosed vBulletin vulnerability, which had a zero-day status for roughly two days last week, was exploited in a hacker attack targeting the...

Cybercrime

The changing nature of what we still generally call ransomware will continue through 2023, driven by three primary conditions.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...