Microsoft Acquires Israeli Cloud Security Firm Adallom
Microsoft is dropping $320 million to purchase Adallom, a cloud security specialist that has offices in Tel Aviv and Palo Alto.
9 Spectacular Cloud Computing Fails
(Click image for larger view and slideshow.)
Microsoft's acquisition spree continues with the reported purchase of Israeli cloud access security specialist Adallom, according to reports in The Wall Street Journal and Israeli business publication Globes.
While neither company has commented on the supposed acquisition, the Journal quoted two sources familiar with the situation acknowledging Microsoft had signed a letter of intent for $320 million to purchase the company, making it Microsoft's largest-ever acquisition in Israel.
"According to the people familiar with the matter, Adallom, which employs 90 people world-wide, will continue to operate from Israel, building up Microsoft's cybersecurity-focused operations in the country," the Journal article stated.
In July, Adallom announced additional integration with security specialist Check Point's Threat Emulation sandboxing capabilities to detect new exploits, zero-day vulnerabilities, and targeted advanced persistent threats in any content stored in cloud applications.
The company has also partnered with popular Web-based file-sharing service Dropbox for its business application, which allows Dropbox administrators to govern application usage, address compliance mandates, enable data security, and protect users from threats in real-time.
The July 20 acquisition of Adallom is the latest in a string of purchases of Israeli tech companies by Microsoft over the course of the last several months. Many of these buys have focused on enhancing the security of Microsoft's products, especially cloud-based technologies.
These acquisitions began with security specialist Aorato in 2014.
Aorato's technology uses machine learning to detect suspicious activity on a company's network by understanding what normal behavior is, and then identifying anomalies so that a company can see suspicious behavior and take appropriate measures to help protect it.
The key to Aorato's approach is the Organizational Security Graph, a view of all of the people and machines accessing an organization's Windows Server Active Directory (AD).
The platform is used by a wide variety of organizations to store user identities and administer access to critical business applications and systems.
Equivio's products apply machine learning to help business sift through data, enabling users to explore large, unstructured sets of data and quickly find what is relevant.
The company's software uses advanced text analytics to perform multidimensional analyses of data collections, intelligently sorting documents into themes, grouping near-duplicates, and isolating unique data.
This fear runs so deep that consumers are less concerned about having their e-mail hacked (62%) or their home robbed (59%).
Nathan Eddy is a freelance writer for InformationWeek. He has written for Popular Mechanics, Sales & Marketing Management Magazine, FierceMarkets, and CRN, among others. In 2012 he made his first documentary film, The Absent Column. He currently lives in Berlin. View Full Bio
We welcome your comments on this topic on our social media channels, or [contact us directly] with questions about the site.
2017 State of IT ReportIn today's technology-driven world, "innovation" has become a basic expectation. IT leaders are tasked with making technical magic, improving customer experience, and boosting the bottom line -- yet often without any increase to the IT budget. How are organizations striking the balance between new initiatives and cost control? Download our report to learn about the biggest challenges and how savvy IT executives are overcoming them.
Digital Transformation Myths & TruthsTransformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.