IBM Acquires Dutch Security Software VendorIBM Acquires Dutch Security Software Vendor
Consul's software lineup includes a range of modules that help companies monitor system access, automate compliance reporting, secure mainframe computers, and catch unauthorized database usage.
December 5, 2006
Continuing a spate of acquisitions to fill out its portfolio of IT management software, IBM on Tuesday disclosed plans to acquire Consul Risk Management, a Dutch maker of security and compliance products.
Financial terms of the agreement weren't disclosed. Consul's software lineup includes a range of modules that help companies monitor system access, automate compliance reporting, secure mainframe computers, and catch unauthorized database usage. The company's customers include Fidelity Information Services, Ford Motor Co., and the Philadelphia Stock Exchange. Consul's products also help companies keep an eye on their own IT workers, who often have access to sensitive corporate information. Under one scenario, Consul's technology could notify management at an online retailer if an unusually high number of customer records were internally accessed during database maintenance. According to a recent survey by the Secret Service and CERT Coordination Center/SEI, 86% of internal computer security incidents are perpetrated by technical workers. IBM says it will add Consul's products to its Tivoli line of IT management software. The products will join a host of other new technologies from software companies that IBM has acquired in recent weeks. Last week, IBM disclosed plans to acquire Vallent, a maker of network monitoring tools for wireless service providers. Terms of that deal weren't disclosed. IBM's third-quarter software acquisitions included Webify, Rembo Technology, Unicom Solutions, and BuildForge. IBM says it expects its acquisition of Consul to close in the first quarter of 2007, pending regulatory approvals.
About the Author(s)
You May Also Like
Oct 2023 Threat Horizons Report
Choice Hotels Goes 'Lights Out' with Remote Power Management and Server Access from Raritan
Checklist: Top 6 Considerations to Optimize Your Digital Acceleration Security Spend
The New Frontier of Cyber Security: Securing the Network Edge
Top Six Recommendations to Improve User Productivity with a Hybrid Architecture