Sunbelt Software Bought By GFI For An Undisclosed Sum


Looks like this is the way business is heading, especially in the software sector. As led by the giants Microsoft, acquisition is the way to get new and innovative software without having to produce it yourself!

Sunbelt Blog is one of the few we actually link to in the sidebar and also read regularly.

They always have some interesting and generally fairly technical analysis of malware attacks and other intrusions.

Mail security and software utilties company GFI Software has bought independent US antivirus company Sunbelt Software for an undisclosed sum.

GFI already offers a range of security products that use third-party antivirus engines from companies such as Kaspersky and BitDefender to make up the scanning element of its mostly SME-oriented products such as the GFI MailDefense suite. The Sunbelt Software buy gives the company access to an antivirus engine of its own for the first time.

GFI will now integrate Sunbelt’s heavily revised ‘Vipre’ detection technology across the range of its own products. The software has a good reputation for innovation and was rewritten from the ground up just over a year ago.

“We were impressed by the high quality and innovative technology that underlies Sunbelt’s Vipre line of products and immediately saw strong synergies between the two companies,” said GFI CEO, Walter Scott.

Both GFI and Sunbelt have some great software and services so I’d say this is a good integration for the industry. Plus it will give Sunbelt a lot more resources to develop it’s Vipre product and can probably make some improvements to GFI LANGuard too.

GFI will also get its hands on a malware detection engine that is already licensed to third-parties, generating standalone revenue of its own. Increasingly, merely selling antivirus and anti-malware is only one part of a business that depends on third-party licensing to stay afloat.

Sunbelt also has a distribution business, which is not part of the sale and will remain a separate entity, GFI said.

Smaller, independent antivirus companies selling out has been a steady trend, and is set to continue. The cash needed to keep development and marketing on track is getting harder to sustain at a time when free antivirus from Microsoft and others is taking away sales.

And the article raises an important point too, with Microsoft pushing out more and more free anti-virus and anti-malware solutions plus a lot of other free software becoming more visible (products like Avast and Avira are free for home use) it’s making it harder for anti-virus software developers to make a living.

That’s why being acquired by a larger company with a wider range of products and services can help a lot.

Source: Network World

Posted in: Malware

, ,


Latest Posts:


CFRipper - CloudFormation Security Scanning & Audit Tool CFRipper – CloudFormation Security Scanning & Audit Tool
CFRipper is a Python-based Library and CLI security analyzer that functions as an AWS CloudFormation security scanning and audit tool
CredNinja - Test Credential Validity of Dumped Credentials or Hashes CredNinja – Test Credential Validity of Dumped Credentials or Hashes
CredNinja is a tool to quickly test credential validity of dumped credentials (or hashes) across an entire network or domain very efficiently.
assetfinder - Find Related Domains and Subdomains assetfinder – Find Related Domains and Subdomains
assetfinder is a Go-based tool to find related domains and subdomains that are related to a given domain from a variety of sources including Facebook and more.
Karkinos - Beginner Friendly Penetration Testing Tool Karkinos – Beginner Friendly Penetration Testing Tool
Karkinos is a light-weight Beginner Friendly Penetration Testing Tool, which is basically a 'Swiss Army Knife' for pen-testing and/or hacking CTF's.
Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.


One Response to Sunbelt Software Bought By GFI For An Undisclosed Sum

  1. droope July 17, 2010 at 7:38 pm #

    interesting. ¡Thanks!