This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.
Microsoft Acquires Israeli Cloud Security Firm Adallom
Microsoft is dropping $320 million to purchase Adallom, a cloud security specialist that has offices in Tel Aviv and Palo Alto.
9 Spectacular Cloud Computing Fails
(Click image for larger view and slideshow.)
Microsoft's acquisition spree continues with the reported purchase of Israeli cloud access security specialist Adallom, according to reports in The Wall Street Journal and Israeli business publication Globes.
While neither company has commented on the supposed acquisition, the Journal quoted two sources familiar with the situation acknowledging Microsoft had signed a letter of intent for $320 million to purchase the company, making it Microsoft's largest-ever acquisition in Israel.
"According to the people familiar with the matter, Adallom, which employs 90 people world-wide, will continue to operate from Israel, building up Microsoft's cybersecurity-focused operations in the country," the Journal article stated.
In July, Adallom announced additional integration with security specialist Check Point's Threat Emulation sandboxing capabilities to detect new exploits, zero-day vulnerabilities, and targeted advanced persistent threats in any content stored in cloud applications.
The company has also partnered with popular Web-based file-sharing service Dropbox for its business application, which allows Dropbox administrators to govern application usage, address compliance mandates, enable data security, and protect users from threats in real-time.
The July 20 acquisition of Adallom is the latest in a string of purchases of Israeli tech companies by Microsoft over the course of the last several months. Many of these buys have focused on enhancing the security of Microsoft's products, especially cloud-based technologies.
These acquisitions began with security specialist Aorato in 2014.
Aorato's technology uses machine learning to detect suspicious activity on a company's network by understanding what normal behavior is, and then identifying anomalies so that a company can see suspicious behavior and take appropriate measures to help protect it.
The key to Aorato's approach is the Organizational Security Graph, a view of all of the people and machines accessing an organization's Windows Server Active Directory (AD).
The platform is used by a wide variety of organizations to store user identities and administer access to critical business applications and systems.
Equivio's products apply machine learning to help business sift through data, enabling users to explore large, unstructured sets of data and quickly find what is relevant.
The company's software uses advanced text analytics to perform multidimensional analyses of data collections, intelligently sorting documents into themes, grouping near-duplicates, and isolating unique data.
This fear runs so deep that consumers are less concerned about having their e-mail hacked (62%) or their home robbed (59%).
Nathan Eddy is a freelance writer for InformationWeek. He has written for Popular Mechanics, Sales & Marketing Management Magazine, FierceMarkets, and CRN, among others. In 2012 he made his first documentary film, The Absent Column. He currently lives in Berlin. View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
The State of IT & Cybersecurity Operations 2020Download this report from InformationWeek, in partnership with Dark Reading, to learn more about how today's IT operations teams work with cybersecurity operations, what technologies they are using, and how they communicate and share responsibility--or create risk by failing to do so. Get it now!