Welcome!

Microsoft Cloud Authors: Pat Romanski, Liz McMillan, Lori MacVittie, Elizabeth White, Yeshim Deniz

News Feed Item

INSIDE Secure Completes the Acquisition of Embedded Security Solutions (ESS)

INSIDE Secure (NYSE Euronext INSD.PA) today announced it has completed the acquisition of Embedded Security Solutions (ESS). ESS is a high expertise business which designs and develops encryption-related security hardware intellectual property (IP) and software for a variety of industries, including the mobile and networking markets. At closing, INSIDE Secure paid a transaction consideration of USD 41.6 million net of cash acquired and after an adjustment based on the estimated working capital of the transferred business at closing and completion of certain closing-related transactions. INSIDE Secure may pay an additional cash consideration of up to USD 5.2 million subject to completion of certain transactions before April 1, 2013

As announced on November 19, 2012, when INSIDE Secure entered into an agreement to purchase ESS, this strategic acquisition will enable the company to reinforce its position as a key player in the fast-growing security solutions market. ESS will bring to INSIDE Secure complementary offerings for a complete security architecture, as well as additional solutions for securing both content (Digital Rights Management or “DRM”) and data exchange (Virtual Private Network or “VPN”). By leveraging the strong capabilities of INSIDE Secure’s existing Mobile NFC and Digital Security businesses, the combined offer should also lead to additional sales in high growth markets. The transaction is expected to be accretive to INSIDE Secure’s adjusted1 operating and net results as of 2013, and to enhance the company’s gross margin.

As a result of this acquisition, Simon Blake-Wilson, vice president of ESS since 2006, has been appointed executive vice president in charge of INSIDE Secure’s Embedded Security Solutions division. Simon Blake-Wilson has a proven track record in digital security solutions. He is a well-known researcher in wireless security and his skills range from cryptographic protocol design to the implementation of security policies and the business and legal ramifications of digital signatures.

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD.PA) is a leading designer, developer and supplier of semiconductors, embedded software and platforms for secure transactions and digital security. INSIDE mobile NFC, secure payment and digital security products provide security for a wide range of information processing, storage and transmission applications. The company’s customers are found in a wide range of markets, including mobile payment, identification documents, access control, transit, electronic device manufacturing, pay television and mobile service operators. For more information, visit www.insidesecure.com.

Forward-looking statements

This press release contains certain forward-looking statements concerning the INSIDE Secure group. Although INSIDE Secure believes its expectations to be based on reasonable assumptions, they do not constitute guarantees of future performance. The group’s actual results may accordingly differ materially from those anticipated in these forward-looking statements owing to a number of risks and uncertainties. For a more detailed description of these risks and uncertainties, please refer to the “Risk Factors” section of the annual financial report of 27 April 2012, available on www.insidesecure.com.

1 INSIDE Secure uses performance indicators that are not strictly accounting measures (adjusted operating result, and adjusted income /(loss)). These indicators are not defined under IFRS, and do not constitute accounting elements used to measure the group’s financial performance. They should be considered in addition to, and not as a substitute for, any other operating and financial performance indicator of strict accounting nature, as presented in the Group’s Consolidated Financial Statements and the corresponding notes. The Group uses these indicators because it believes they are useful measures of its operating performance and of its operating cash flow generation.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

IoT & Smart Cities Stories
The deluge of IoT sensor data collected from connected devices and the powerful AI required to make that data actionable are giving rise to a hybrid ecosystem in which cloud, on-prem and edge processes become interweaved. Attendees will learn how emerging composable infrastructure solutions deliver the adaptive architecture needed to manage this new data reality. Machine learning algorithms can better anticipate data storms and automate resources to support surges, including fully scalable GPU-c...
Machine learning has taken residence at our cities' cores and now we can finally have "smart cities." Cities are a collection of buildings made to provide the structure and safety necessary for people to function, create and survive. Buildings are a pool of ever-changing performance data from large automated systems such as heating and cooling to the people that live and work within them. Through machine learning, buildings can optimize performance, reduce costs, and improve occupant comfort by ...
The explosion of new web/cloud/IoT-based applications and the data they generate are transforming our world right before our eyes. In this rush to adopt these new technologies, organizations are often ignoring fundamental questions concerning who owns the data and failing to ask for permission to conduct invasive surveillance of their customers. Organizations that are not transparent about how their systems gather data telemetry without offering shared data ownership risk product rejection, regu...
René Bostic is the Technical VP of the IBM Cloud Unit in North America. Enjoying her career with IBM during the modern millennial technological era, she is an expert in cloud computing, DevOps and emerging cloud technologies such as Blockchain. Her strengths and core competencies include a proven record of accomplishments in consensus building at all levels to assess, plan, and implement enterprise and cloud computing solutions. René is a member of the Society of Women Engineers (SWE) and a m...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...