Security Experts:

Connect with us

Hi, what are you looking for?


Cloud Security

Sophos Acquires Cloud Security Firm Avid Secure

Network and endpoint security firm Sophos on Tuesday announced the acquisition of Avid Secure, a San Francisco-based company specializing in protecting public cloud environments.

Network and endpoint security firm Sophos on Tuesday announced the acquisition of Avid Secure, a San Francisco-based company specializing in protecting public cloud environments.

Avid was only founded in August 2017 by Ganesh Krishnan, Nikhil Gupta, Deepak Yadav, and Praneet Khare. They previously worked as security practitioners and leaders at organizations such as Yahoo, McAfee, LinkedIn, VMware, ForeScout, Cisco and Atlassian.

Sophos acquires Avid SecureAvid provides solutions that combine AI and automation to help organizations simplify security, governance and compliance in their cloud environments.

“The accelerated adoption of public cloud environments is presenting new data security challenges to organizations. With the cloud workload protection and the cloud security posture management software from Avid Secure, Sophos will expand its current capabilities in cloud security and drive leadership in this growing space,” said Dan Schiappa, senior vice president and general manager of Products at Sophos.

“We welcome the Avid Secure team to Sophos and are excited to bring their transformational technology into our portfolio, strengthening our ability to offer the best protection for our customers’ data on endpoints and networks, wherever their services are hosted,” Schiappa added.

Financial terms of the deal have not been disclosed.

Sophos has acquired a significant number of companies, including ActiveState, Utimaco (for $314 million), Astaro, DIALOGSCyberoam, Mojave Networks, Surfright (for nearly $32 million), Barricade IO, and Invincea (for $120 million).

Related: Palo Alto Networks to Acquire CIA-Backed Cloud Security Firm for $300 Million

Related: Check Point Acquires Dome9 for $175 Million

Related: Palo Alto Networks to Acquire Cloud Security Firm RedLock for $173 Million

Written By

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join this webinar to learn best practices that organizations can use to improve both their resilience to new threats and their response times to incidents.


Join this live webinar as we explore the potential security threats that can arise when third parties are granted access to a sensitive data or systems.


Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...

Cybersecurity Funding

SecurityWeek investigates how political/economic conditions will affect venture capital funding for cybersecurity firms during 2023.

Cloud Security

Microsoft and Proofpoint are warning organizations that use cloud services about a recent consent phishing attack that abused Microsoft’s ‘verified publisher’ status.


More than 450 cybersecurity-related mergers and acquisitions were announced in 2022, according to an analysis conducted by SecurityWeek


Twenty-one cybersecurity-related M&A deals were announced in December 2022.


Forty cybersecurity-related M&A deals were announced in January 2023.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.