Wednesday, May 29 2024

AT&T completes its AlienVault acquisition. Claroty secures $400 million and acquires Medigate. Avast interested in self-sovereign identity tech. Stanley Black & Decker sells its security arm at $3.2 billion.


Claroty raises $400 million in Series E funding and agrees to acquisition of healthcare IoT security company Medigate. The Series E funding was co-led by new investor SoftBank Vision Fund 2, as well as existing investors Bessemer Venture Partners and Schneider Electric. Existing investors ISTARI, Team8, and Standard Investments also participated.

Kasada, a security company geared towards defending against advanced bot attacks, announces $23 million in Series C funding, bringing total investment in the company to $39 million. StepStone Group led the funding round, with participation from existing investors Ten Eleven Ventures, Main Sequence Ventures, Reinventure, Our Innovation Fund, and Turnbull & Partners.

LogDNA completes Series D funding at $50 million led by cybersecurity investment and advisory firm NightDragon.  LogDNA’s observability data platform works to manage customers’ observability data in real time and necessary scale, and delivers a secure data pipeline to aid developers and engineers.

Torq announced $50 million Series B funding led by Insight Partners with participation from SentinelOne, GGV Capital, and Bessemer Venture Partners. With this new funding, Torq intends to accelerate its go-to-market delivery and turning security operations into automation-driven processes.

Adlumin secures $25 million Series B round led by SYN Ventures and First In Ventures with investments from the Independent Community Bankers of America, BankTech Ventures, Leawood Venture Capital and others. With Adlumin focusing on its managed security services automation platform, its technology seeks to enhance the efficacy of a customers’ existing security stack by unifying data streams on-premises and in the cloud.

Cybersecurity software company Zorus, Inc., announces close of Series A investment round led by Asymmetric Capital Partners with additional capital coming from Innospark Ventures and existing seed investor General Catalyst. Zorus will utilize the $9 million in additional funding to introduce new services to its cyber security suite. Zorus plans to add detection and response security solutions to its filtering engine.

Email security provider IronScales raised $64 million in a Series C funding round led by PSG with participation from existing investors K1 Investment Management and Jump Capital. The platform works to continuously detect and remediate threats, such as business email compromise, credential harvesting and account takeover in companies’ mailboxes.


Learn about the top security ventures and merger trends in our cybersecurity investment report.


Mergers and Acquisitions

Cerberus Cyber Sentinel Corporation, a cybersecurity consulting and managed services firm based in Scottsdale, Ariz., announces acquisition of Arkavia Networks SPA, a cybersecurity services provider based in Chile. Under terms of the agreement, Arkavia will become a wholly owned subsidiary of Cerberus Sentinel and will serve as the South American headquarters for the company located in Santiago, Chile. David Alfaro Medina, CEO of Arkavia, will continue to manage his existing team.

AT&T announces plan to acquire AlienVault, a privately held company based in San Mateo, Calif. The agreement has been approved by both companies. The acquisition of AlienVault will enable AT&T to expand its security solutions portfolio and offerings to millions of small and medium-sized businesses. AT&T’s acquisition of AlienVault’s technology and human capital is focused on accelerating its goal to assist organizations of all sizes with cybersecurity solutions.

Mimecast Limited, an email security and cyber defense company, announces that it has entered into a definitive agreement whereby funds advised by Permira will acquire the company. Under the terms of the agreement, Permira will acquire all outstanding ordinary shares of Mimecast for $80.00 per share in an all-cash transaction that values Mimecast at an equity value of approximately $5.8 billion.

With a focus on digital security and privacy, Avast announces its acquisition of Evernym; the US based outfit who, along with contributions from others working in the industry standards community, cut its teeth with the development of self-sovereign identity tech. Avast focuses on products and services based on decentralized digital credentials.  The acquisition is expected to close in mid-December and the general availability of the products based on the Evernym technology is slated to follow in 2022.

Atos announces agreement to acquire Cloudreach, a multi-cloud services company with a focus in cloud application development and cloud migration. Cloudreach employs more than 600 employees in cloud platforms, applications, and security and is expected to realize revenue at €100 million in calendar year 2021. The closing of this transaction is subject to regulatory approvals and expected early Q1 2022.

Stanley Black & Decker has agreed to a majority sale of its security assets to Securitas AB for $3.2 billion. The proposed transaction includes Stanley Black & Decker’s Commercial Electronic and Healthcare Security business lines.  The businesses carry 2021 forecasted revenues of approximately $1.7 billion with an adjusted EBITDA margin in the low double-digits, implying a purchase price multiple of approximately 16 trailing adjusted EBITDA.

Read more cybersecurity M&A and funding updates from SecureDisruptions here.


Report on Cybersecurity VC and Merger Activity in H1 2021


Cyber Deals: PlainID, Noname Security, UncommonX, Entegra

Check Also


Don’t Miss

Best Cloud Security Posture Management (CSPM) Software

Ellie Buscemi

What is Cloud Security Posture Management and how does it work? Cloud Security Posture Management (CSPM) is a product, service or platform that allows a business to protect their cloud infrastructure through the prevention, detection and response of cyber risks. A CSPM offering uses known and effective frameworks, regulatory standards and company policies to confirm […]

Best Privileged Access Management (PAM) Products

Lara Oporto

What is Privileged Access Management and how does it work? Privileged Access Management (PAM) products stand as a crucial fortress in fortifying your company’s digital landscape. Functioning as a meticulous guardian, PAM offerings orchestrate the establishment of access protocols, meticulously determining who holds privileged access to critical data and the specific circumstances under which such […]

Best Automated Moving Target Defense (AMTD) Offerings

Ellie Buscemi

What is Automated Moving Target Defense and how does it work? Automated Moving Target Defense (AMTD) is a recent innovation in cybersecurity that focuses on flexibility, deception and attack prevention. AMTD has four main components: it provides proactive cyber defense mechanisms, contains automation to change the attack surface, utilizes deception technology and can execute preplanned […]

Third-Party Risk Management Solutions

Lara Oporto

What is Third-Party Risk Management? Third-Party Risk Management (TPRM) software assists organizations in managing risks associated with their relationships with suppliers, vendors and service providers. The products offer a range of features to automate and streamline various aspects of third-party risk management. They typically include tools for risk assessment, due diligence, contract management and ongoing […]

Best Industrial Internet of Things (IIoT) Platforms

Lara Oporto

Industrial Internet of Things (IIoT) offerings are technological solutions empowering businesses to connect, manage and analyze data from a multitude of devices and systems within industrial settings, such as manufacturing, energy, transportation, logistics and healthcare. What are Industrial Internet of Things (IIoT) platforms and how do they work? Industrial Internet of Things (IIoT) platforms are […]

The words Endpoint Detection and Response (EDR) on a green background with lines on the right side of the image

Best Endpoint Detection & Response Platforms

Lara Oporto

Endpoint Detection & Response platforms continuously monitor endpoints for signs of malicious activities, such as unauthorized access or unusual behavior, enabling rapid detection and response to potential cyber threats to safeguard organizational assets. What is Endpoint Detection and Response and how does it work? Endpoint Detection and Response (EDR) is a cornerstone in modern cybersecurity […]