{"id":44301,"date":"2019-06-12T00:00:00","date_gmt":"2019-06-11T22:00:00","guid":{"rendered":"https:\/\/techma.bakertilly.es\/la-ultima-compra-de-empresas-de-ciberseguridad-de-fireeye\/"},"modified":"2025-03-12T11:46:20","modified_gmt":"2025-03-12T10:46:20","slug":"ultima-compra-empresas-ciberseguridad-de-fireeye","status":"publish","type":"post","link":"https:\/\/techma.bakertilly.es\/en\/ultima-compra-empresas-ciberseguridad-de-fireeye\/","title":{"rendered":"Cybersecurity : FireEye's latest corporate buyout"},"content":{"rendered":"<p style=\"text-align: justify;\">We analyse the latest <a href=\"https:\/\/techma.bakertilly.es\/en\/merger-and-acquisition-m-a\/\" target=\"_blank\">mergers and acquisitions<\/a> into the <a href=\"https:\/\/techma.bakertilly.es\/en\/reports\/report-ciberseguridad-2022-bs-a3\/\">cybersecurity industry<\/a>. This is a market that is constantly growing and that will continue to grow the greater the penetration of technological devices, which seems to be immovable.<\/p>\n<p style=\"text-align: justify;\">The pervasiveness of the internet, both in our private and professional lives, is completely affecting the way we function.<\/p>\n<p style=\"text-align: justify;\">In the past, important information was archived and even armoured vans were available in case they were needed. Today, however, almost all information is stored directly in a technological format.<\/p>\n<p style=\"text-align: justify;\">This change has led to an increasing number of attacks on the security of technological devices in an attempt to gain access to this information, a phenomenon that tends to become more professional and to set more ambitious goals.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Adquisiciones_en_empresas_de_ciberseguridad\"><\/span>Acquisitions in cybersecurity companies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">One of the companies dedicated to the protection of online security is <a href=\"https:\/\/www.fireeye.com\/\" target=\"_blank\" rel=\"noopener\">FireEye<\/a>an American company dedicated to the <strong>cybersecurity and secure information storage using artificial intelligence<\/strong>.<\/p>\n<p style=\"text-align: justify;\">This company has grown inorganically with more than 7 <a href=\"https:\/\/techma.bakertilly.es\/en\/merger-and-acquisition-m-a\/\" target=\"_blank\">mergers and acquisitions<\/a> in recent years. The latest are as follows:<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"The_Email_Laundry\"><\/span><strong>The Email Laundry<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">It is a company dedicated to the <strong>email security<\/strong>and which has been able to win international awards due to the frontline security it offers its customers in both opening and shipping security.<\/p>\n<p style=\"text-align: justify;\">The Email Laundry offers an easy-to-access cloud platform that allows you to maintain a network of emails protected from malware.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"X15_Software\"><\/span><strong>X15 Software<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">X15 Software is a company dedicated to the <strong>cyber protection of access to platforms<\/strong>. It takes care of the security of profile data, helping to control such protection through the use of advanced analytics. In addition, it has a pioneering operational intelligence platform, with which it is able to correlate access device information with common patterns to be able to find anomalies.<\/p>\n<h2 style=\"text-align: justify;\"><span class=\"ez-toc-section\" id=\"Invotas\"><\/span><strong>Invotas<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"text-align: justify;\">It is a cyber security company. <strong>leader in the automation of verification processes and customised solutions for each client<\/strong>The firm's solutions are therefore not homogeneous, and allow a degree of adaptability to the processes of each company that is not found in the market.<\/p>\n<p style=\"text-align: justify;\">To this end, Invotas works closely with customers to be able to build and execute a digital library of approved courses of action, enabling them to transform their responses and create an iterative process that drives continuous improvement in cyber security.<\/p>\n<p style=\"text-align: justify;\">Due to the increasing complexity of cyber attacks, the company is committed to automation and real-time information gathering in order to be able to anticipate upcoming attacks by regularly updating internal defence systems.<\/p>","protected":false},"excerpt":{"rendered":"<p>We take a look at the latest acquisitions in the cybersecurity sector. This is a market that is growing and will continue to grow as the penetration of technological devices increases, which seems to be immovable.<\/p>","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1751],"tags":[152,155,153],"sectores":[2211],"tipo-contenido":[2260],"class_list":["post-44301","post","type-post","status-publish","format-standard","hentry","category-adquisiciones-mas-relevantes","tag-compra-de-empresas","tag-corporate-finance-spain","tag-global-corporate-finance","sectores-digital-services","tipo-contenido-noticias"],"acf":[],"_links":{"self":[{"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/posts\/44301","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/comments?post=44301"}],"version-history":[{"count":0,"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/posts\/44301\/revisions"}],"wp:attachment":[{"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/media?parent=44301"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/categories?post=44301"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/tags?post=44301"},{"taxonomy":"sectores","embeddable":true,"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/sectores?post=44301"},{"taxonomy":"tipo-contenido","embeddable":true,"href":"https:\/\/techma.bakertilly.es\/en\/wp-json\/wp\/v2\/tipo-contenido?post=44301"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}