Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Management & Strategy

Trend Micro Completes Acquisition of HP’s TippingPoint

It’s a done deal. Trend Micro said on Wednesday that it has completed its $300 million acquisition of the TippingPoint network security portfolio from Hewlett Packard Enterprise (HPE). 

It’s a done deal. Trend Micro said on Wednesday that it has completed its $300 million acquisition of the TippingPoint network security portfolio from Hewlett Packard Enterprise (HPE). 

Under the terms of the agreement, which was first announced in October 2015, Trend Micro has acquired the security technology, intellectual property, personnel, and enterprise customers connected to TippingPoint products.

Trend Micro TippingPoint now includes the threat intelligence from Digital Vaccine Labs (DVLabs), as well as the the Zero Day Initiative (ZDI), the bounty program that rewards independent security researchers to identify previously unknown (zero-day) vulnerabilities in software.

While TippingPoint products, which include intrusion prevention systems (IPS) and integrated network security solutions, have been challenged by fierce competition in the network security space, Trend Micro said it would combine the capabilities of TippingPoint technology with its network defense business unit for enhanced protection.

“We are very excited to see this agreement come to fruition as it demonstrates our ongoing commitment to enterprise security,” said Eva Chen, CEO of Trend Micro.

Trend Micro and ZDI are also the co-sponsors of Pwn2Own, a hacking competition that gathers security researchers to identify vulnerabilities in popular software platforms. As usual, Pwn2Own 2016 will take place alongside the CanSecWest conference in Vancouver, Canada. The competition, scheduled for March 16-17, invites researchers to hack Google Chrome, Microsoft Edge, Adobe Flash, Apple Safari and, for the first time, VMware Workstation

HP got its hands on the TippingPoint product line through its $2.7 billion acquisition of 3Com Corporation back in 2010. 3Com originally paid $430 million in stock to acquire TippingPoint Technologies in 2004.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Application Security

Cycode, a startup that provides solutions for protecting software source code, emerged from stealth mode on Tuesday with $4.6 million in seed funding.

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

CISO Strategy

SecurityWeek spoke with more than 300 cybersecurity experts to see what is bubbling beneath the surface, and examine how those evolving threats will present...

CISO Conversations

Joanna Burkey, CISO at HP, and Kevin Cross, CISO at Dell, discuss how the role of a CISO is different for a multinational corporation...

CISO Conversations

In this issue of CISO Conversations we talk to two CISOs about solving the CISO/CIO conflict by combining the roles under one person.

CISO Strategy

Security professionals understand the need for resilience in their company’s security posture, but often fail to build their own psychological resilience to stress.

Management & Strategy

SecurityWeek examines how a layoff-induced influx of experienced professionals into the job seeker market is affecting or might affect, the skills gap and recruitment...