Welcome!

Containers Expo Blog Authors: Liz McMillan, Elizabeth White, Rene Buest, XebiaLabs Blog, Janakiram MSV

Related Topics: Containers Expo Blog

Containers Expo Blog: Article

Will Google Destroy Symantec & McAfee?

Think Symantec & McAfee Are Feeling a Bit, Well, Insecure?

Gee, and Symantec and McAfee felt squeezed when Microsoft wandered into their space. Now Google has a toehold too. Talk about being between a rock and a hard place.

On May 11 Google quietly bought an outfit, a Mountain View neighbor actually, called GreenBorder Technologies Inc, and never said a word about it.

The acquisition is provocative because GreenBorder is in the Internet security business, a space new to the omnivorous Google, and nobody knows how Google is going to use this widgetry; and not knowing, when you think about it, is scarier for McAfee and Symantec than knowing.

Given the dismal state of security - and the increasing hostility of the Internet, even if GreenBorder is only half the end-all it's cracked up to be - and depending on how it's packaged - Google could have trouble stopping people from throwing money at it.

What price your security?

Anyway, the acquisition only came to light after the Google Operating System blog - which is not a Google property - stumbled over a terse "we've been bought" notice on GreenBorder's web site Monday and spread the word.

Apparently the company got frustrated waiting for Google to trumpet its acquisition but Google must have been distracted. Google is, by report, supposed to make 130 acquisitions this year.

And, see, up against the $1.65 billion Google agreed to pay for YouTube and the $3.1 billion it's arranged to pay for DoubleClick, GreenBorder looks like a poor relation.

There's been no indication of the purchase price, but reportedly Google paid less than the roundabout $20 million that the VCs pumped into the company since it got started in 2001, maybe it wrote a check for $12 million give or take. Texas Pacific Group Ventures, Sevin Rosen and Labrador Ventures backed it and maybe got 50 cents on the dollar.

According to the company's former director of security Bill Stout, GreenBorder was in the market for a $12 million D round (but would have taken six) late last year. It couldn't get it, started looking for a buyer after the holidays, and opened negotiations with Google four months before the deal closed, closure taking so long because, well, Google had other fish to fry.

Supposedly there had been some talk about it being a subsidiary, but that didn't happen. Google wanted the technology and the patents and the core developers. It reportedly hired six GreenBorder people who it can add to the three or four Windows kernel whizzes that Google poached off of GreenBorder a couple of years ago.

What GreenBorder does reportedly takes a lot of Windows savvy.

In typical Google fashion, GreenBorder has stopped taking any more users for the foreseeable future; only comme-si-comme-ca support is available for existing users through the end of their current subscriptions.

GreenBorder is called GreenBorder because of the green cordon it throws around users when they surf the web, download or use e-mail, it's GreenBorder's way of indicating to the user that he's protected from all manner of nasty spyware and nastier viruses and trojans. The user is actually behind a virtual session of his browser - a so-called sandbox - that's discarded along with any malicious code he picked up when the browser closes.

This sandbox is a form of virtualization that doesn't depend on the traditional, largely failed, rushing-to-catch-up-with-the-bad-guys signature recognition used by Symantec and McAfee and so doesn't have to be constantly updated as new malware is created (making it cheaper for Google to maintain in the process when you think about it).

Given its clout, Google could be the making of the desktop sandbox security market, Stout says, creating a real problem for the signature firms.

When it got started, GreenBorder wanted to be all things to all people, Stout said. It went through some false starts and CEOs until it lighted on what it's doing a couple of years ago - which probably explains the VCs' impatience - a six-year-old start-up is kinda shop-worn - at least the bloom is off the rose.

Anyway it applied its widgetry (a combination of cutting down the C++ code and redirecting it) to XP and Windows 2000 and to Internet Explorer 6 and 7 and then to Firefox 1.5 and 2.0.

It's been selling a corporate version, GreenBorder Pro, only a little while; it would have liked to have gotten $3,000 for a server and $50 for a client, but generally settled for half that, Stout said. A consumer version, added last year, has been free - a price point that was supposed to change eventually to an annual fee. The consumer model got it a bit of traction.

Google's own anti-malware team recently posted a white paper called "The Ghost in the Browser" and reported finding that one in 12 web sites are malicious. Google has a vested interest in seeing people aren't put off from searching, inhibited by fears of identity theft.

It wants them to be as dogged as John Wayne in that aptly named film, "The Searchers."

Google could deploy GreenBorder as a standalone product or as a way to protect corporate data or as part of its Google Desktop or for its newfangled venture offline Google Gears or as part of its nascent productivity suite - the betting seems to be running in favor of the later.

It will probably have to rewrite the code, which is kind of old. GreenBorder is already compatible with other anti-viruses, which users would still need. (You know how many ways there are to penetrate your computer?) It can currently protect the OS from applications and has figured out, but hasn't implemented, the reverse.

There are a couple of other companies that do what GreenBorder does, but they're not American and reportedly don't have GreenBorder's kernel knowledge, Stout said.

More Stories By Virtualization News

SYS-CON's Virtualization News Desk trawls the news sources of the world for the latest details of virtualization technologies, products, and market trends, and provides breaking news updates from the Virtualization Conference & Expo.

Comments (2) View Comments

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


Most Recent Comments
ajojddy 06/03/07 11:51:47 PM EDT

very helpful advice, thx a lot.
-----------------------------------------
Shareware

http://www.mostshareware.org

Virtualization News 06/02/07 06:35:56 PM EDT

Gee, and Symantec and McAfee felt squeezed when Microsoft wandered into their space. Now Google has a toehold too. Talk about being between a rock and a hard place. On May 11 Google quietly bought an outfit, a Mountain View neighbor actually, called GreenBorder Technologies Inc, and never said a word about it. The acquisition is provocative because GreenBorder is in the Internet security business, a space new to the omnivorous Google, and nobody knows how Google is going to use this widgetry; and not knowing, when you think about it, is scarier for McAfee and Symantec than knowing.

@ThingsExpo Stories
The security needs of IoT environments require a strong, proven approach to maintain security, trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vic...
SYS-CON Events announced today that delaPlex will exhibit at SYS-CON's @CloudExpo, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. delaPlex pioneered Software Development as a Service (SDaaS), which provides scalable resources to build, test, and deploy software. It’s a fast and more reliable way to develop a new product or expand your in-house team.
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, discussed the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that CA Technologies has been named “Platinum Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. CA Technologies helps customers succeed in a future where every business – from apparel to energy – is being rewritten by software. From ...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settle...
The best way to leverage your Cloud Expo presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering Cloud Expo and @ThingsExpo will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at Cloud Expo. Product announcements during our show provide your company with the most reach through our targeted audiences.
In his keynote at @ThingsExpo, Chris Matthieu, Director of IoT Engineering at Citrix and co-founder and CTO of Octoblu, focused on building an IoT platform and company. He provided a behind-the-scenes look at Octoblu’s platform, business, and pivots along the way (including the Citrix acquisition of Octoblu).
SYS-CON Events announced today that Outlyer, a monitoring service for DevOps and operations teams, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Outlyer is a monitoring service for DevOps and Operations teams running Cloud, SaaS, Microservices and IoT deployments. Designed for today's dynamic environments that need beyond cloud-scale monitoring, we make monitoring effortless so you...
20th Cloud Expo, taking place June 6-8, 2017, at the Javits Center in New York City, NY, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy.
With major technology companies and startups seriously embracing Cloud strategies, now is the perfect time to attend @CloudExpo | @ThingsExpo, June 6-8, 2017, at the Javits Center in New York City, NY and October 31 - November 2, 2017, Santa Clara Convention Center, CA. Learn what is going on, contribute to the discussions, and ensure that your enterprise is on the right path to Digital Transformation.
Have you ever noticed how some IT people seem to lead successful, rewarding, and satisfying lives and careers, while others struggle? IT author and speaker Don Crawley uncovered the five principles that successful IT people use to build satisfying lives and careers and he shares them in this fast-paced, thought-provoking webinar. You'll learn the importance of striking a balance with technical skills and people skills, challenge your pre-existing ideas about IT customer service, and gain new in...
With 10 simultaneous tracks, keynotes, general sessions and targeted breakout classes, Cloud Expo and @ThingsExpo are two of the most important technology events of the year. Since its launch over eight years ago, Cloud Expo and @ThingsExpo have presented a rock star faculty as well as showcased hundreds of sponsors and exhibitors! In this blog post, I provide 7 tips on how, as part of our world-class faculty, you can deliver one of the most popular sessions at our events. But before reading the...
Buzzword alert: Microservices and IoT at a DevOps conference? What could possibly go wrong? In this Power Panel at DevOps Summit, moderated by Jason Bloomberg, the leading expert on architecting agility for the enterprise and president of Intellyx, panelists peeled away the buzz and discuss the important architectural principles behind implementing IoT solutions for the enterprise. As remote IoT devices and sensors become increasingly intelligent, they become part of our distributed cloud enviro...
TechTarget storage websites are the best online information resource for news, tips and expert advice for the storage, backup and disaster recovery markets. By creating abundant, high-quality editorial content across more than 140 highly targeted technology-specific websites, TechTarget attracts and nurtures communities of technology buyers researching their companies' information technology needs. By understanding these buyers' content consumption behaviors, TechTarget creates the purchase inte...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business. Though, IoT is far more complex than most firms expected with a majority of IoT projects having failed. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, Chief IoTologist at Wipro, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology portfolios and business models to adopt and leverage IoT. He will delve in...
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
There are 66 million network cameras capturing terabytes of data. How did factories in Japan improve physical security at the facilities and improve employee productivity? Edge Computing reduces possible kilobytes of data collected per second to only a few kilobytes of data transmitted to the public cloud every day. Data is aggregated and analyzed close to sensors so only intelligent results need to be transmitted to the cloud. Non-essential data is recycled to optimize storage.