DATA SECURITY

HUB Security acquires the leading Cyber Security Comsec for NIS 70M

HUB Security | September 30, 2021

HUB Security acquires the leading Cyber Security Comsec for NIS 70M
HUB Security ("HUB" or the "Company"), announces today the acquisition of Comsec Global for NIS 70 million, of which HUB will pay NIS 40 million in cash and NIS 30 million in its own shares. The Shares consideration are under a share sale lock-up provision for a period of 6 months post closing of the transaction.

The main goal of the acquisition is to dramatically increase HUB Security's global sales and distribution infrastructure by over 40 countries, which will enable the Company to more than double its revenues and significantly accelerate penetration of HUB's unique cyber-security solutions in global enterprises.

HUB has developed a technology that can cause a paradigm shift in the Cyber Security market, HUB's solution was considered to be the Holy Grail long awaited by governments and enterprises worldwide. The combination between the two companies creates a unique entity that has a strong foundation of global cyber business coupled with an unparalleled growth potential that leverages upon a 40-country sales infrastructure. In our opinion, this is a classic case of 1+1 equals 10 and not two.

Mr. Rony Sternbach, Comsec Chairman and controlling shareholder.

Comsec is one of the leading companies in Israel's cybersecurity sector. Founded in 1987, the company was a pioneer in data security and now has an extensive customer base spanning over a thousand leading companies in 40 countries across five continents. It operates four consulting and distribution companies and has subsidiaries in the UK and the Netherlands.

The company offers a broad spectrum of services to its clients, providing comprehensive solutions in application security, security, and source code testing. These include application lifecycle development consulting, infrastructure security, and communication security. It further provides security auditing via several models; Threat Modeling, penetration tests, Black Box and comprehensive White Box audit Design Review, and more.

Comsec's annual sales turnover is approx NIS 120 million. Its customers include banking, insurance, hi-tech, communications, industrial, retail, large-scale infrastructures, and local and central government bodies and ministries. Comsec is a one-stop shop for all their cybersecurity needs.

HUB Security was established in 2017 by veterans of the IDF's 8200 and 81 intelligence units. The company specializes in protecting sensitive commercial information and has an advanced encrypted computing solution for companies and organizations aimed at preventing hostile intrusions and the theft of sensitive commercial information.

Hub offers cybersecurity solutions to, amongst others, the AI, Fintek, and critical infrastructure sectors. The company employs 400 employees, and its offices are located in Israel and the United States.

Spotlight

Are You Ready for a New WAN? Wide-area networks have more network connections. 82% of enterprises are adding more branch sites to their networks. 84% of enterprises are increasing the number of endpoints connecting to branch LAN/WLAN. Cloud & internet are driving architectural change. The evolving WAN is complex. Direct cloud connectivity = countless tunnels from branch LANs/WLANs to cloud providers.

Related News

DATA SECURITY

New White Paper to be Released by Bluefin and Alpine Security Consulting on Payment and Data Security

Alpine Security Consulting | July 12, 2021

A new white paperon “Formulating a Complete Payment Data and Security Approach, ”authored by Alpine Security Consulting, has releasedby the recognized leader inand tokenization and encryption technologies for payment and data security, Bluefin. The main points covered and discussed in the whitepaper are considerations when choosing a data protection approach, rules and regulations governing sensitive data and payment, Protected Health Information (PHI) and ACH account data, Personally Identifiable Information (PII), and how tokenization can be combined with encryption to provide a single solution for securing cardholder data (CHD). Topics covered in the white paper are: • Payment and Privacy Data – History and Trends • Data Breaches, the Pandemic Effect, and the Shift to Online Commerce • Protecting Privacy Data – HIPAA, GDPR, and Privacy Acts • Protecting Financial Data – PCI DSS and Nacha • Bluefin's Payment and Data Security Suite: PCI-validated P2PE and ShieldConex® Data Security • The Roles of Encryption, Tokenization and Authentication in Protecting Data Bluefin specializes in data security solutions and omnichannel payment. With the company’s PCI-validated point-to-point encryption (P2PE)solutions, it is specialized in protecting all data. It is for ShieldConex data security platform and point-of-sale (POS) payments for the encrypted tokenization of PHI,PII, ACH and CHD account data. About Bluefin For payment and data security, Bluefin is the renowned leader in antokenization and encryption technologies. Our security suite includes call center, mobile and unattended payments, PCI-validated point-to-point encryption (P2PE) for contactless face-to-face, and our ShieldConex® data security platform for the protection of Personal Health Information (PHI),Personal Health Information (PHI), personally Identifiable Information (PII), and payment data entered online. About Alpine Security Consulting Alpine was founded to fulfill a passion to help businesses. With an experience of over 20 years in security, technology, and compliance, Alpines skill set can support virtually any business learn how to control ground-breaking security technologies with the outcome of translating security savings into tangible business worth.

Read More

DATA SECURITY

Huawei and RCR Wireless Host a Fireside Chat on Zero-Trust Cybersecurity Strategy

Huawei | May 13, 2021

In collaboration with RCR Wireless, Huawei Technologies USA held a fireside chat with Andy Purdy, Chief Security Officer at Huawei Technologies USA, and Sean Kinney, Editor in Chief at RCR Wireless, to explore how organizations can understand and adopt zero-trust strategies. Purdy, a cybersecurity specialist, provides insights into accelerating the global adoption of standardized processes for ensuring the security of all telecom devices. He also discusses the wider implications of Huawei's inclusion on the US export controls list on the supply chain. While the list was established to protect national security, it has grown in scope and has had unexpected consequences for the global supply chain. The fireside chat, which can be seen here, goes into greater detail on the importance of reestablishing global trust and cooperation to maintain a regular supply chain. Zero-trust cybersecurity strategies can promote an environment for innovation while also protecting national security through an intervention based on facts, verification, transparency, and risk management. The zero-trust model, which is based on never trusting and always verifying, assists companies in minimizing damage and reducing the possibility of hackers trying to infiltrate their systems. Following SolarWinds and other cyberattacks, the cybersecurity community has recognized the crucial importance of transparency and accountability. Experts emphasize the growing importance of incentives to encourage companies to uphold secure cybersecurity practices, as well as the need to hold organizations accountable when they fail to do so. Are telecom operators building their networks following zero-trust principles? What will experts do to improve industry assurance, accountability, and transparency? What else will Huawei do to push for the global adoption of standardized processes for checking the security of all telecom equipment, not just Huawei's? And how has Huawei's inclusion on the U.S. Commerce Department's Bureau of Industry and Security entity list affected the company overall? Purdy and Kinney delve into these and other issues, including actionable insights into making cyberspace safer and more transparent by using zero-trust cybersecurity. About Huawei Huawei is a world leader in infrastructure and smart devices for information and communications technology (ICT). We are dedicated to bringing digital to every person, home, and enterprise through interconnected technologies across four key domains – telecom networks, IT, smart devices, and cloud services – for a fully connected, intelligent world. Huawei's whole product, solution, and service portfolio are both competitive and secure. We create long-term value for our customers by an open partnership with ecosystem partners, collaborating to empower people, enhance home life, and inspire innovation in organizations of all sizes. Huawei innovates to meet the needs of its customers. We make significant investments in basic research, focusing on technological breakthroughs that drive the world forward. We hire over 188,000 people and operate in over 170 countries and regions. Huawei, which was established in 1987, is a private company that is entirely owned by its employees.

Read More

Vectra expands intelligent cyberattack detection and response capabilities with CrowdStrike

prnewswire | October 15, 2020

Vectra AI, a leader in network detection and response (NDR), today announced expanded response capabilities for its flagship product, Cognito Detect™ using its Lockdown feature, made possible by integrating with CrowdStrike® Falcon Insight, CrowdStrike's industry-leading endpoint and detection and response solution.This deep product integration enables Vectra® to deliver well-coordinated, instantaneous responses to thwart cyberattacks directly at the device level. By blocking and isolating attackers, not resources, Lockdown gives customers the ability to significantly reduce cyberthreat actor dwell-time without disrupting business operations.

Read More

Spotlight

Are You Ready for a New WAN? Wide-area networks have more network connections. 82% of enterprises are adding more branch sites to their networks. 84% of enterprises are increasing the number of endpoints connecting to branch LAN/WLAN. Cloud & internet are driving architectural change. The evolving WAN is complex. Direct cloud connectivity = countless tunnels from branch LANs/WLANs to cloud providers.