Homepage Rankings and Research Companies Channelcast Marketing Matters CRNtv Events WOTC Avaya Newsroom Experiences That Matter Cisco Partner Summit Digital 2020 Cyber Resilience Zone HPE Zone The Business Continuity Center Enterprise Tech Provider Masergy Zenith Partner Program Newsroom HP Reinvent Digital Newsroom Hitachi Vantara Digital Newsroom IBM Newsroom Juniper Newsroom Intel Partner Connect 2021 NetApp Digital Newsroom The IoT Integrator Intel Tech Provider Zone NetApp Data Fabric WatchGuard Digital Newsroom

10 Things To Know About The $1.2B FireEye-Mandiant Split

From who will lead FireEye and Mandiant going forward to how FireEye’s products fit into Symphony Technology Group’s fast-growing cybersecurity portfolio and why the separation is expected to reduce channel conflict, here are 10 key things to know.

Back 1   2   3   ... 11 Next

9. Split Largely Undoes FireEye’s 2013 Mandiant Acquisition

STG’s proposed transaction largely undoes FireEye’s $1 billion acquisition of Mandiant in December 2013, which brought together FireEye’s signatureless web, email, data center and mobile security platform with Mandiant’s endpoint security and incident response. Mandia founded Mandiant in 2004, and served as FireEye’s COO for two and a half years after the deal before becoming CEO in June 2016.

However, not everything that was developed by Mandiant will remain with Mandiant once the separation is complete. Specifically, the company’s endpoint security technology and Helix cloud security information and event management (SIEM) platform will move over to STG as part of FireEye even though the capabilities were originally developed by Mandiant, according to Mandia.

While Mandiant’s services work is strategically important, Mandia said more than half of the company’s revenue came from products and subscriptions even back when it was acquired by FireEye. Mandia said he sees a future where the services component is only 15 percent to 25 percent of Mandiant, but it will remain vital to helping the company understand emerging threats.

Back 1   2   3   ... 11 Next

sponsored resources