Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Data Protection

Thales Group to Acquire Vormetric for $400 Million

Thales Group, parent of Thales e-Security, a provider of data protection solutions to the financial services, high tech manufacturing, government and technology sectors, announced on Monday that it has signed a definitive agreement to acquire data protection firm Vormetric for $400 million.

Thales Group, parent of Thales e-Security, a provider of data protection solutions to the financial services, high tech manufacturing, government and technology sectors, announced on Monday that it has signed a definitive agreement to acquire data protection firm Vormetric for $400 million.

Vormetric offers encryption, key management, access policy, and privileged user control to help customers protect sensitive information.

Vormetric’s data protection offerings will combine with Thales e-Security solutions, such as its hardware security modules (HSMs), which protect critical networks and data of 19 of the 20 largest banks in the world and many technology companies, the company said.

“The acquisition of Vormetric is a great opportunity to accelerate the growth of our cybersecurity activities,” Patrice Caine, Chairman and CEO of Thales, said in a statement.

“The opportunity to join Thales has come at a time when the world is focused on data to enable business due to the explosive growth of mobile, cloud and social media. Jointly we are in a unique position to offer leading security solutions to protect data, while broadening the support to our customers and partners globally,” added Alan Kessler, President and CEO of Vormetric.

San Jose, Calif.-based Vormetric has approximately 200 employees, more than 1,500 customers, and company revenues on pace to reach $75 million for the current fiscal year.

The transaction is subject to customary closing conditions and expected to close during the first quarter of 2016.

*Updated to reflect acquiring party as Thales Group, parent of Thales e-Security.

Advertisement. Scroll to continue reading.
Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Bill Dunnion has joined telecommunications giant Mitel as Chief Information Security Officer.

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Data Protection

The cryptopocalypse is the point at which quantum computing becomes powerful enough to use Shor’s algorithm to crack PKI encryption.

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

Artificial Intelligence

The CRYSTALS-Kyber public-key encryption and key encapsulation mechanism recommended by NIST for post-quantum cryptography has been broken using AI combined with side channel attacks.

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.