Imperva goes on security buying spree


By Dylan Bushell-Embling
Monday, 10 February, 2014


Imperva goes on security buying spree

Imperva has announced plans to acquire two cloud security vendors and a mainframe database auditing software company.

Data security vendor Imperva has announced a series of new acquisitions to bolster its cloud and mainframe product portfolio.

The company has acquired cloud security gateway start-up Skyfence, entered an in-principal agreement to buy out the remainder of cloud-based web application security company Incapsula and picked up mainframe security software vendor Tomium Software.

Skyfence offers a cloud gateway with a dedicated security and compliance stack, while Incapsula’s key asset is an application-aware CDN platform with security, DDoS protection, load balancing and fail-over capabilities.

“Our acquisition strategy for Skyfence and Incapsula are very similar. We seeded Incapsula four years ago because we recognised that cloud delivery would change the web application security landscape,” Imperva CEO Shlomo Kramer said.

“In the case of Skyfence, we believe that software-as-a-service (SaaS) delivery models for internally facing corporate applications will substantially change the landscape for data centre security and compliance.”

Imperva had been licensing Tomium Software’s continuous mainframe database auditing software, but has now separately announced a deal to hire all key Tomium employees and bring the offering in house.

Tomium’s software will be integrated with Imperva’s SecureSphere security management and reporting platform.

Related Articles

The MediSecure breach thrusts the security spotlight back on service providers

Organisations have been confronting security risks in their supply chains for years, but a new...

Managing third-party cybersecurity risks in the supply chain

Third-party cybersecurity breaches occur when the victim's defences are compromised through a...

Countering MFA fatigue demands a rethink on user authentication

While MFA remains effective, highly motivated threat actors are using tactics that seek to...


  • All content Copyright © 2024 Westwick-Farrow Pty Ltd