Logo Header Menu

BlackBerry completes acquisition of Cylance for AI cyber security ambitions

Blackberry is now a billion-dollar cyber security firm with a technology portfolio that enterprises need to intelligently connect, protect and help build secure endpoints BlackBerry completes acquisition of Cylance image

BlackBerry has completed its previously-announced acquisition of Cylance for $1.4bn, the privately-held artificial intelligence and cyber security company based in Irvine, California.

“Today, BlackBerry took a giant step forward toward our goal of being the world’s largest and most trusted AI cyber security company,” said John Chen, executive chairman and CEO, BlackBerry. “Securing endpoints and the data that flows between them is absolutely critical in today’s hyperconnected world. By adding Cylance’s technology to our arsenal of cyber security solutions we will help enterprises intelligently connect, protect and build secure endpoints that users can trust.”

5 cyber security startups next in line for the Unicorn Crown

Following the warning from MPs that the UK is ‘wholly’ unprepared to stop a devastating cyber attack, Information Age looks at the top cyber security start-ups. Read here

A strategic addition

Cylance’s machine learning and artificial intelligence technology represents a strategic addition to BlackBerry’s end-to-end secure communications portfolio.

According to the announcement; ‘Cylance’s embeddable AI technology will accelerate the development of BlackBerry Spark, the secure communications platform for the Internet of Things (IoT).’

As the president of BlackBerry Cylance, Stuart McClure will continue to apply his visionary math-based approach to threat detection, prevention, and response. On top of this, he will lead the business’ large team of highly-skilled engineers and data scientists that deliver products and services for more than 4,000 companies around the world.

IBM acquires Red Hat in $34BN deal: A game changer?

The merger between IBM and Red Hat is like David to the Amazon/Alphabet/Microsoft Goliaths, can it make the sling shot? Read here

Customer and analyst reaction

“BlackBerry for the enterprise has proven over and over that it works; Cylance for the enterprise has proven over and over that it works. It’s been clear for a while now that mobile devices are the evolving attack vector that enterprises are not ready to defend, so a combination of mobile experts and AI security experts could be just what we’ve been looking for,” said Daniel Shuler, chief information security officer of Phoenix Children’s Hospital.

“Given the increasing threat landscape and our exploding reliance on connected IoT devices the potential for a digital catastrophe due to an intentional or accidental breach has never been higher and it is growing at an alarming rate. BlackBerry has been the leading independent vendor focused on securing these devices and their now approved acquisition of Cylance makes this a critical game changing moment for the company and the IoT industry. In today’s hostile world, security isn’t an option, it is a requirement,” commented Rob Enderle, owner, Enderle Group.

“In this deal BlackBerry obtains advanced security technology that it can deploy within its existing platforms while also providing a complementary fit in terms of market vision and customer focus,” explained Brian Partridge, research vice president at 451 Research.

Financial information regarding BlackBerry Cylance will be made available during the company’s fourth quarter earnings call in March 2019

Latest news

divider
Automation
RPA software market grew 63.1% in 2018, says Gartner

RPA software market grew 63.1% in 2018, says Gartner

24 June 2019 / RPA software revenue grew 63.1% in 2018 to $846 million, making it the fastest-growing segment [...]

divider
Cyber Innovation
Tech Nation’s cyber security cohort: Red Sift’s company profile

Tech Nation’s cyber security cohort: Red Sift’s company profile

24 June 2019 / Information Age has partnered with Tech Nation to help explore 20 of the UK’s leading cyber security [...]

divider
IoT and M2M
Enterprise IoT and data breaches: what you need to know

Enterprise IoT and data breaches: what you need to know

24 June 2019 / Enterprise Internet of Things (IoT) devices can make company operations more efficient and productive, especially [...]

divider
Cyber Innovation
Democratising technology for cyber security and the power of AI

Democratising technology for cyber security and the power of AI

24 June 2019 / Democratising technology for cyber security — sounds like a nice idea. And, it’s entirely necessary. [...]

divider
News
Deploying automation: the success rate is high, but obstacles include resistance to change

Deploying automation: the success rate is high, but obstacles include resistance to change

21 June 2019 / ‘Resistance is useless’ said the Vogon guard in Douglas Adams’ Hitch Hikers Guide to the [...]

divider
News
UK’s digital technology industry is 25% larger than previously thought

UK’s digital technology industry is 25% larger than previously thought

21 June 2019 / Companies previously classified as, for example, manufacturing are now also embracing new technologies such as [...]

divider
Automation
Best and worst use cases of robotic process automation and its outlook for the future

Best and worst use cases of robotic process automation and its outlook for the future

21 June 2019 / Over the last year, organisational understanding of robotic process automation (RPA) has come a long [...]

divider
Cybersecurity
Strangers in your inbox: safeguarding against business email compromise

Strangers in your inbox: safeguarding against business email compromise

21 June 2019 / It’s hard to think of a business that doesn’t depend on email as an essential [...]

divider
Consumer Electronics & Mobile
Is Huawei really a threat to an organisation’s mobile security?

Is Huawei really a threat to an organisation’s mobile security?

21 June 2019 / Is Huawei really a threat to organisations’ mobile security? Ever since the US government cited [...]

Do NOT follow this link or you will be banned from the site!

Pin It on Pinterest