Takeovers in the IT-Security Industry

I just sow a post by AV-Comparatives called  “AV-Comparatives Explains the Implications of Takeovers in the IT-Security Industry

The entire article is very interesting and it is worth reading. And it is also objective and valid as well! Great job, AV-Comparatives!

What made me write this post is the graphic at the end of the post (courtesy of AV-Comparatives):

 

I became immediately nostalgic  when I sow that it starts with 2003, the acquisition of GeCAD by Microsoft. I was there when this happened! For those who don’t know, I started my career in cybersecurity in 1999 at RAV Antivirus, produced until 2003 by GeCAD.

I was in the industry when all these M&A happened and I was actually working with some of them when they were acquired. I am still working with some of them. 😉

Of course, the most interesting one was Avira being acquired twice in 12 months. I was no longer working as an employee of Avira, but I was working with Avira in 2020, when it was first acquired.

I don’t know if these acquisitions are the only ones that happened in the AV industry, but this list it is for sure the most complete I have ever seen to date.

Good job, Av-Comparatives.

 


© Copyright Sorin Mustaca, All rights Reserved. Written For: Sorin Mustaca on Cybersecurity


Check www.endpoint-cybersecurity.com for seeing the consulting services we offer.

Visit www.itsecuritynews.info for latest security news in English
Besuchen Sie de.itsecuritynews.info für IT Sicherheits News auf Deutsch

About the Author

Sorin Mustaca
Sorin Mustaca, (ISC)2 CSSLP, CompTIA Security+ and Project+, is working since over 20 years in the IT Security industry and worked between 2003-2014 for Avira as Product Manager for the known products used by over 100 million users world-wide. Today he is CEO and owner of Endpoint Cybersecurity GmbH focusing on Cybersecurity, secure software development and security for IoT and Automotive. He is also running his personal blog Sorin Mustaca on Cybersecurity and is the author of the free eBook Improve your security .
%d bloggers like this:

By continuing to use the site, you agree to the use of cookies and to its Privacy Policy more information

The cookie settings on this website are set to "allow cookies" to give you the best browsing experience possible. If you continue to use this website without changing your cookie settings or you click "Accept" below then you are consenting to this.

Close