Intel Acquires Security Specialist McAfee For $7.68bn


We’ve seen a trend in recent years, especially in the technology sector of acquisitions and consolidations. It’s been something Microsoft has been doing for a long time, acquiring smaller niche companies to improve/supplement their existing product lines.

In recent years the trends has shifted towards web services and of course security, many smaller security companies have been acquired, most recently would be the Sunbelt acquisition by GFI.

Back in 2007 Google Acquired Web Security Startup GreenBorder. There have been many others of course, a lot of which we haven’t covered as they are more business related than anything else.

Bruce Schneier has also been talking about these kind of acquisitions for over two years.

There has been a pretty unanimous WTF from the tech community as Intel isn’t even a software provider, they are a hardware manufacturer…and yes they’ve had some flaws in their products but does that justify spending almost $8 Billion USD to acquire a security company?

And well McAfee isn’t exactly highly thought of within the security community.

Both boards of directors have approved the deal, which is still subject to McAfee shareholder approval and regulatory approval.

Intel said the deal signalled its decision to put security on par with energy-efficient performance and internet connectivity as a strategic focus area.

“Today’s security approach does not fully address the billions of new Internet-ready devices connecting, including mobile and wireless devices, TVs, cars, medical devices and ATM machines as well as the accompanying surge in cyber threats,”

The details can be seen on Market Watch here.

And well McAfee don’t even provide hardware security functions, which is I assume what Intel is looking for. Who knows, this may just be a capital investment strategy from Intel and not particularly related to what McAfee produces.

Intel of course can benefit from the security knowledge McAfee has and integrate that into their hardware – but that is going to take some time.

Several security analysts have given their opinions of what this could mean and how it could effect Intel, McAfee and the industry in general.

Source: The Register

Posted in: Legal Issues

, ,


Latest Posts:


Aclpwn.Py - Exploit ACL Based Privilege Escalation Paths in Active Directory Aclpwn.Py – Exploit ACL Based Privilege Escalation Paths in Active Directory
Aclpwn.py is a tool that interacts with BloodHound< to identify and exploit ACL based privilege escalation paths.
Vulhub - Pre-Built Vulnerable Docker Environments For Learning To Hack Vulhub – Pre-Built Vulnerable Docker Environments For Learning To Hack
Vulhub is an open-source collection of pre-built vulnerable docker environments for learning to hack. No pre-existing knowledge of docker is required, just execute two simple commands.
LibInjection - Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) LibInjection – Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS)
LibInjection is a C library to Detect SQL Injection (SQLi) and Cross-Site Scripting (XSS) through lexical analysis of real-world Attacks.
Grype - Vulnerability Scanner For Container Images & Filesystems Grype – Vulnerability Scanner For Container Images & Filesystems
Grype is a vulnerability scanner for container images and filesystems with an easy to install binary that supports the packages for most major *nix based OS.
APT-Hunter - Threat Hunting Tool via Windows Event Log APT-Hunter – Threat Hunting Tool via Windows Event Log
APT-Hunter is a threat hunting tool for windows event logs made from the perspective of the purple team mindset to provide detection for APT movements hidden in the sea of windows event logs.
GitLab Watchman - Audit Gitlab For Sensitive Data & Credentials GitLab Watchman – Audit Gitlab For Sensitive Data & Credentials
GitLab Watchman is an app that uses the GitLab API to audit GitLab for sensitive data and credentials exposed internally, this includes code, commits, wikis etc


Comments are closed.