Tag Archives: chkp

IBM To Acquire Resilient Systems, Undercut Cisco, Symantec, FireEye

Tech giant IBM ( IBM ) plans to undercut Cisco Systems ( CSCO ), Symantec ( SYMC ), FireEye ( FEYE ) and Rapid7 ( RPD ) by acquiring incident response firm Resilient Systems and partnering with endpoint security provider Carbon Black, the company announced Monday. The announcement comes a week after IBM unveiled a deeper tie to No. 1 cybersecurity pure-play  Check Point Software Technology ( CHKP ) to pool research and integrate systems. IBM stock was up 0.9% in morning trading on the stock market today . IBD’s 25-company Computer Software-Security industry group was down a fraction Monday as companies headed to the RSA Conference, a massive cybersecurity industry gathering that runs all week in San Francisco. Caleb Barlow, vice president of IBM Security, described the Resilient Systems acquisition as the cornerstone of a three-prong strategy to protect, defend and respond to cyberbreaches. Per IBM policy, he wouldn’t disclose the price tag for the privately held, 100-employee company. “This ultimately gives us the ability to expand from protecting and defending the enterprise to also being able to respond to a breach,” Barlow told IBD. “This combination of a new acquisition and the associated partnerships really make a move into the incident-response space.” Carbon Black Has Big Share Of Endpoint Security In conjunction with the acquisition, IBM will partner with endpoint security firm Carbon Black. Privately held Carbon Black owns 37% of the endpoint market, according to industry tracker IDC. Carbon Black’s platform will allow IBM analysts to conduct security forensics on compromised endpoint devices. Resilient Systems will be integrated into IBM’s incident-response platform, dubbed X-Force Incident Response Services. Via X-Force, IBM will counsel clients through all parts of a cyberbreach and on ways to avoid such breaches. Barlow likened the service to a fire drill. “Most companies don’t have good incident-response plans,” he said. “There’s a binder on the shelf for what to do in the case of a fire or what to do in the case of a flood, but not necessarily what to do in the case of a cyber incident.” That “binder” includes pertinent leadership, disclosure and public relations keys in case of a breach, he said. IBM’s move allows the company to “pivot” from protecting and defending to responding to a breach, he says. It’s all part of IBM’s push into the cybersecurity market. In 2015, IBM pulled in $2 billion in security revenue. That was up 12% but still accounted for only 2.4% of IBM’s total revenue of more than $81 billion, which fell 12%. But the dollar amount topped total sales for security pure-players Palo Alto Networks ( PANW ), Proofpoint ( PFPT ), Fortinet ( FTNT ) and FireEye. And IBM’s security business also outgrew Symantec and Check Point. The security unit was launched four years ago, Barlow says. Since then, it has added 7,300 employees — 1,000 last year alone — and operates in 133 countries globally. “Imagine if that were the conversation about a Silicon Valley startup,” he said.

Palo Alto Networks CEO: ‘We’re Taking Share From Everyone’

Investors heaved a collective sigh late Thursday, relieved that a slowdown in network security spending didn’t batter Palo Alto Networks ( PANW ), which delivered view-crushing fiscal Q2 earnings on its simplified platform approach. Midday on the stock market today , Palo Alto Networks stock was up 2%, near 143, after earlier rising as much as 9.7%. IBD’s 41-company Computer Software-Security industry group rose as much as 4% in early trading Friday. For its fiscal second quarter ended Jan. 31, Palo Alto reported 40 cents earnings per share ex items on $334.7 million in sales, up 110.5% and 54%, respectively, vs. the year-earlier quarter. Both metrics topped the consensus view for 39 cents and $318.3 million. Sales and EPS growth, however, decelerated for the second consecutive quarter. Billings Surge To Undercut EPS During Q2, Palo Alto reported record billings growth of 62% year over year to $459 million, vs. consensus expectation for $417 million, Needham analyst Scott Zeller wrote in a research report. Zeller maintained his buy rating but cut his price target on Palo Alto Networks stock to 171 from 202. Palo Alto Networks isn’t a “fad” in security, but the company will likely face some challenges in continuing billings acceleration, he wrote. Billings accelerated on 2,000 added customers and a 68% jump in subscription sales to $84.3 million. But Palo Alto Networks is a “victim of its own success,” Pacific Crest analyst Rob Owens wrote in a report. Palo Alto Networks cut its fiscal 2016 operating margin guidance to 18%-19% vs. earlier views for 22%-25%, noting commissions on subscription sales will impact sales-and-marketing expenses. Those expenses jumped by $16 million sequentially in Q2. “The upshot is strong free cash flow and free cash flow margin,” Owens wrote. The company expects 40% free cash flow margin in Q3, suggesting fiscal 2016 free cash flow should reach $730 million, according to Zeller. ‘Go-To’ Broad Purchase Current-quarter guidance for $335 million-$339 million in sales topped Wall Street views for $334.9 million. But the EPS outlook for 41-42 cents missed analysts’ consensus forecast for 45 cents. Sales and EPS would be up 44% and 80%, respectively, at the midpoints of Palo Alto Networks’ guidance and are expected to decelerate for the third consecutive quarter. Yet Palo Alto Networks’ Q2 sales increased by 50%-plus for the seventh consecutive quarter, and billings surged to the highest point in 11 straight quarters, amid concerns of a slowdown in security spending. A “paradigm shift” from legacy systems is buoying Palo Alto Networks, CEO Mark McLaughlin told analysts on the company’s earnings conference call late Thursday. He sees Palo Alto Networks taking share from Cisco Systems ( CSCO ), Check Point Software Technology ( CHKP ), Fortinet ( FTNT ) and Juniper Networks ( JNPR ). Some analysts tend to agree . “I think it’s very obvious we’re taking share from everyone in the space,” McLaughlin said. William Blair analyst Jonathan Ho sees Palo Alto Networks as on track to become the largest pure-play cybersecurity company. Currently, Check Point and Symantec ( SYMC ) have a narrow lead with $14.8 billion and $12.7 billion market values, respectively, to Palo Alto Networks’ $12.6 billion. Blair maintained his outperform rating on Palo Alto Networks stock. “Palo Alto continues to gain market share behind what we believe is flawless execution,” Piper Jaffray analyst Andrew Nowinski wrote in a report. Nowinski retained his overweight rating and 208 price target on Palo Alto Networks. The company’s platform vision is beginning to bear fruit, Zeller wrote. “Platform (is) an overused term, but it’s key to why we hear Palo Alto continues to grow 60%-plus (in billings) as others decelerate,” he wrote. “In an environment where there was much anxiousness about buying the point-solution of the moment, Palo Alto has crafted a position as the ‘go-to’ broad purchase for re-architecting security.” Image provided by Shutterstock .

IBM Cements Security Standing With Redoubled Check Point Alliance

Tech giant IBM ( IBM ) is solidifying its cybersecurity standing by deepening ties to No. 1 pure player Check Point Software Technology ( CHKP ) to pool research and integrate systems, the companies were scheduled to announce Thursday. It’s the most recent in a series of IBM moves to publicly step-up its cybersecurity initiatives. In 2015, IBM drew in $2 billion in cybersecurity sales , just 2.4% of total revenue. But that dollar mark easily topped total sales for Palo Alto Networks ( PANW ), Proofpoint ( PFPT ), Fortinet ( FTNT ) and FireEye ( FEYE ), and 12% year-over-year growth outstripped that of Symantec ( SYMC ) and Check Point. By combining forces, IBM and Check Point aim to thwart what the United Nations estimates is the $445 billion cybercrime underworld. Check Point’s and IBM Security’s researchers will be free to cross company borders to discuss threat data. And several Check Point applications will be folded into IBM technology, Check Point’s vice president of security services, Avi Rembaum, told IBD. The alliance redoubles an 18-year relationship between IBM and Check Point. IBM manages security offerings for clients across the globe, and those implementations sometimes include Check Point products. The two companies have partnered in that regard for the past 18 years. Thus, IBM is keenly apprised of Check Point’s software. Under the new accord, Check Point will further school IBM on its tech. “Tightening the relationship means we’ll be giving IBM very deep guidance around exactly what fields they should be looking for and how systems integrate,” Rembaum said. The new alliance centers on four main keys. Check Point and IBM will combine research forces to create “a gigantic pool of security researchers,” Rembaum said. Doing so will expand the potential threat intelligence-gathering net, but also lend credibility to potential discoveries. “When we conduct research, it’s nice to have another leading organization with which we can provide notes,” he said. “It’s helpful to have a pool of researchers to validate assumptions. . . . When two sources say it’s true, it makes it more relevant and more critical.” But what’s more compelling is the integrated threat-prevention and analytics technologies, Rembaum says. Check Point will fold its SmartConsole application into the IBM Security App Exchange for integration with IBM’s Security QRadar Intelligence Platform. Together, the systems can tackle the entire security gamut — analyzing, blocking and mitigating attacks. The integration also means that a customer can operate within an IBM space but still access Check Point functions, Rembaum said. IBM customers will also be allowed to manage Check Point Mobile Threat Prevention within IBM’s MaaS360 enterprise-mobility management system, a software used to remove malicious apps and do quick security rollouts. Mobile is “the most critical space” for customers to protect, he said. “(Smartphones) are an always-on and always-connected vehicle for employees,” he said. “And they operate outside the corporate security perimeter.” The expanded alliance also allows IBM to manage Check Point’s entire suite of products for clients, Rembaum said. Check Point will expand the number of tools IBM supports. “So IBM can be there in lockstep with us when we offer services,” he said.