Microsoft acquires Sybari

Posted by   Virus Bulletin on   Feb 8, 2005

Microsoft announces another AV acquisition

Microsoft has announced that it has signed definitive agreements to acquire AV and security provider Sybari Software Inc.

Microsoft says it plans to use this acquisition to further provide its enterprise customers with new solutions to help protect them from malicious software.

Microsoft has been using Sybari products to protect its own enterprise communication and collaboration infrastructure for the last eight months. The company says that it is partly due to the success it has had in deploying Sybari's solution that it intends to acquire the privately-held company (which only last month set the terms of its planned initial public offering (IPO) in a filing with the Securities and Exchange Commission).

Microsoft Chief Information Officer Ron Markezich said: 'We think that Sybari offers strong technologies and approaches that we can offer to help protect our customers from the threats of malicious software. There's no single answer to the problem of greater security, so Microsoft has been engaged in helping customers secure their environments by providing guidance, taking a leadership role in the industry and making investments in technology.'

Back in June 2003 Microsoft purchased Romanian anti-virus firm GeCAD - since when the AV industry has been waiting to see what Microsoft's second attempt at entering the anti-virus field will bring.

Despite last month's confirmation of the company's intentions to sell its own anti-virus product Markezich made no specific mention of such plans when explaining its latest acquisition: 'Our acquisition of GeCAD helped us to deliver cleaner tools to help customers recover after the Blaster, MyDoom, Sasser and Download.Ject infections. It also helped us to provide the Microsoft Malicious Software Removal Tool to more than 133 million PCs. In December, we acquired GIANT Software Company to help give customers relief against spyware ... Our acquisition of Sybari is consistent with this approach. It provides us with additional technology to help address customer concerns regarding security.'



Posted on 8 February 2005 by Virus Bulletin

 Tags

twitter.png
fb.png
linkedin.png
hackernews.png
reddit.png

 

Latest posts:

In memoriam: Prof. Ross Anderson

We were very sorry to learn of the passing of Professor Ross Anderson a few days ago.

In memoriam: Dr Alan Solomon

We were very sorry to learn of the passing of industry pioneer Dr Alan Solomon earlier this week.

New paper: Nexus Android banking botnet – compromising C&C panels and dissecting mobile AppInjects

In a new paper, researchers Aditya K Sood and Rohit Bansal provide details of a security vulnerability in the Nexus Android botnet C&C panel that was exploited in order to gather threat intelligence, and present a model of mobile AppInjects.

New paper: Collector-stealer: a Russian origin credential and information extractor

In a new paper, F5 researchers Aditya K Sood and Rohit Chaturvedi present a 360 analysis of Collector-stealer, a Russian-origin credential and information extractor.

VB2021 localhost videos available on YouTube

VB has made all VB2021 localhost presentations available on the VB YouTube channel, so you can now watch - and share - any part of the conference freely and without registration.

We have placed cookies on your device in order to improve the functionality of this site, as outlined in our cookies policy. However, you may delete and block all cookies from this site and your use of the site will be unaffected. By continuing to browse this site, you are agreeing to Virus Bulletin's use of data as outlined in our privacy policy.