Juniper Networks announced it has acquired Altor Networks, a leading provider of virtualization security technology that enables organizations to secure the virtualized world. This acquisition will allow Juniper to extend its market-leading security position by delivering an integrated, highly-scalable security architecture that protects physical and virtual systems. Under the terms of the agreement, Juniper acquired Altor for a cash purchase price of approximately $95 million, net of Altor shares already owned by Juniper.
The acquisition builds on Juniper’s existing technology partnership with Altor and will extend Juniper’s leadership in security for both the enterprise and service provider virtualization markets. As organizations rely more on virtual servers for critical applications, concern around server security in the cloud has increased. Altor has developed some of the industry’s most advanced capabilities to address this challenge, including a high-performance hypervisor-based firewall, on-board intrusion detection, complete network visibility and monitoring and comprehensive reporting for compliance. Altor’s solution enables security visibility, compliance and control over the entire virtual machine infrastructure, giving security teams’ visibility to understand the applications, services and traffic being sent between virtual machines.
Check out details.
The acquisition builds on Juniper’s existing technology partnership with Altor and will extend Juniper’s leadership in security for both the enterprise and service provider virtualization markets. As organizations rely more on virtual servers for critical applications, concern around server security in the cloud has increased. Altor has developed some of the industry’s most advanced capabilities to address this challenge, including a high-performance hypervisor-based firewall, on-board intrusion detection, complete network visibility and monitoring and comprehensive reporting for compliance. Altor’s solution enables security visibility, compliance and control over the entire virtual machine infrastructure, giving security teams’ visibility to understand the applications, services and traffic being sent between virtual machines.
Check out details.
Comments