wombat security acquired

Deliver Proofpoint solutions to your customers and grow your business. Wombat, founded 10 years ago by three CMU computer science professors to leverage innovative university research on preventing cyber attacks, is widely recognized as a leader in cybersecurity awareness training. A Pittsburgh-based security awareness and training software company was acquired for $225 million by a Silicon Valley cybersecurity company. Phishing attacks trick people into divulging sensitive information, such as usernames and passwords, or into installing malware by sending them emails that appear to come from legitimate, trusted sources. Sadeh and Cranor teach in the Institute for Software Research and Hong is a faculty member of the Human-Computer Interaction Institute. The deal was announced by Proofpoint last month. “As cybercriminals continue to look for new ways to exploit employees, companies need to be vigilant about changing end-user behavior and reducing risk with cybersecurity education solutions,” said Gary Steele, Proofpoint CEO. By collecting data from Wombat’s PhishAlarm solution, Proofpoint will have access to data on phishing campaigns as seen by non-Proofpoint customers, providing broader visibility and insight to the Proofpoint Nexus platform. Cybersecurity firm Proofpoint on Tuesday announced that it has agreed to acquire Wombat Security Technologies for $255 million in cash. Wombat Security Technologies General Information Description. By acquiring Wombat, the Sunnyvale, California-based company adds phishing simulation and security training to its suite of products. ThreatSim was acquired by Wombat Security Technologies on Oct 14, 2015. Security awareness firms have been the subject of significant funding and M&A transactions in recent months. Non-GAAP financial measures should not be considered in isolation from, or as a substitute for, financial information prepared in accordance with GAAP. A limitation of using free cash flow versus the GAAP measure of net cash provided by operating activities as a means for evaluating our company is that free cash flow does not represent the total increase or decrease in the cash balance from operations for the period because it excludes cash used for capital expenditures during the period. Uniquely with the combined solutions, organizations will be able to: Proofpoint expects the acquisition of Wombat Security to have the following impact to its financial outlook for the first quarter, and full year 2018, as previously provided on February 6, 2018: Additional commentary on Wombat’s contribution to Proofpoint’s 2018 financial outlook: Note that all of these guidance assumptions are in accordance with ASC 606, which Proofpoint adopted effective January 1, 2018, as were its original guidance metrics provided on February 6, 2018. Block and resolve inbound threats across the entire email attack vector. Developer of a security awareness and training software designed to help organizations teach their employees to secure behavior and strengthen organization security posture. Lorrie Cranor, Jason Hong, and Norman Sadeh, all faculty members at the CMU School of Computer Science. We consider billings to be a useful metric for management and investors because billings drive deferred revenue, which is an important indicator of the health and visibility of our business, and has historically represented a majority of the quarterly revenue that we recognize. Learn about the benefits of becoming a Proofpoint Extraction Partner. March 01, 2018. Celebrating the Life & Legacy of Dr. Martin Luther King, Jr. A Conversation with ProFellow Founder Vicki Johnson, The Allen Newell Award for Research Excellence, Center for Technology Transfer and Enterprise Creation, Observance of Martin Luther King, Jr. Day, CARNEGIE MELLON CHAMBER SERIES: Clarion Quartet Plays Weinberg, Profellow Workshop: How to Find and Compete for Competitive Fellowships. Episodes feature insights from experts and executives. ''Wombat is a good example of why we at Carnegie Mellon talk about computer science primarily as problem solving, not programming,'' said Andrew Moore, dean of the School of Computer Science. We define non-GAAP net loss as net loss, adjusted to exclude stock-based compensation expense, amortization of intangibles, costs associated with acquisitions and litigation, non-cash interest expense related to the convertible debt discount and issuance costs for the convertible debt offering and tax effects associated with these items. Privacy Policy Wombat CEO Joe Ferrara and Chairman and Chief Scientist Norman Sadeh. As a result of the varying impacts of each item, the effective tax rate for the adjusted tax provision will vary period over period as compared to the GAAP tax provision. Other key products include machine learning technology to prioritize the processing of phishing emails reported by employees. Proofpoint Inc., a leading cybersecurity company, has completed its acquisition of a Carnegie Mellon University spinoff, Wombat Security Technologies Inc., for $225 million. The modules are interactive in nature and include quick quizzes centered around practical, everyday situations that help reinforce practical learning. In typical CMU fashion, Norman, Lorrie and Jason were able to solve the problem because they understood that people and technology are inextricably linked.''. All of Wombat’s training modules focus on practical, concise advice and information that employees need to know, rather than lectures about practices and policies they don’t care about, Sadeh said. Defend against cyber criminals accessing your sensitive data and trusted accounts. Adding to its cybersecurity offerings, Pittsburgh-based Wombat Security Technologies has acquired ThreatSim, a Reston, Va.-based provider of spear phishing attack testing. We compiled data from the millions of phishing attacks sent through ''Phishing and cybersecurity in general are more than technical problems; they are people problems. Founded based on pioneering research into phishing attacks, Wombat is recognized by Gartner in the Leaders Quadrant of the Magic Quadrant for Security Awareness Computer-Based Training. In June 2008 the company was founded by Drs. Wombat has long benefited from recruiting CMU alumni, Sadeh said – so much so that some investors worried in the early years about an overabundance of CMU-related employees. ''We all recognized there was demand for solutions that we had developed at CMU,'' Sadeh added, ''and we’ve been gratified with the success the company has achieved. We have provided in this release financial information that has not been prepared in accordance with GAAP. Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, has entered into a definitive agreement to acquire Wombat Security Technologies, Inc. An industry-first combination of advanced threat protection capabilities with real-time phishing simulation and cybersecurity awareness and training. Engage your users and turn them into a strong line of defense against phishing and other cyber attacks. Find the information you're looking for in our library of videos, data sheets, white papers and more. For more information on Proofpoint Nexus, please visit https://www.proofpoint.com/us/technology-platform. Management compensates for these limitations by providing specific information regarding GAAP revenue and evaluating billings together with revenues calculated in accordance with GAAP. Connect with us at events to learn how to protect your people and data from ever‑evolving threats. Non-GAAP net loss. These forward-looking statements include statements regarding the future financial impact of the acquisition, future financial results for Proofpoint and benefits of the acquisition and integration of Wombat’s products. He was also a co-founder of Wombat Security Technologies, which was acquired by Proofpoint in March 2018 for $225m. Analysis of free cash flow facilitates management's comparisons of our operating results to competitors' operating results. ''This sale is a tribute to the faculty who created Wombat, as well as to the alumni who are key leaders at Proofpoint, and to all those who are helping to ensure CMU expertise benefits society more broadly.''. Defend against threats, ensure business continuity, and implement email policies. Learn about the human side of cybersecurity. We use these non-GAAP financial measures internally in analyzing our financial results and believe they are useful to investors, as a supplement to GAAP measures, in evaluating our ongoing operational performance. Protect from data loss by negligent, compromised, and malicious users. Wombat Security Technologies has announced the acquisition of ThreatSim. Protect against email, mobile, social and desktop threats. Connect with Proofpoint: Twitter | LinkedIn | Facebook | YouTube | Google+. Proofpoint recently acquired Wombat Security, a 4-year leader in the Gartner Magic Quadrant for Security Awareness Computer-Based Training, and we're excited to share what makes them the clear leader in the space. Successful companies that have been assisted by AlphaLab include Wombat Security, Bossa Nova Robotics, JazzHR, ALung Technologies, CivicScience, Vivisimo (acquired by IBM), ModCloth (acquired … We consider this non-GAAP financial measure to be a useful metric for management and investors for the same reasons that we use non-GAAP operating loss. Browse our webinar library to learn about the latest threats, trends and issues in cybersecurity. Advance your strategy to solve even more of today's ever‑evolving security challenges. His research is in the areas of usability, mobility, privacy, and security. '', Byron Spice | 412-268-9068 | bspice@cs.cmu.edu. Wombat Security announced today that it is acquiring ThreatSim—a company that focuses on spear phishing prevention. Learn about our threat operations center and read about the latest risks in our threat blog and reports. You’ll learn how to: - Assess your … They showed this approach was significantly more likely to get an employee’s attention and, with follow-up training, could drastically reduce susceptibility to these attacks. Sunnyvale, Calif.—March 1, 2018 – Proofpoint, Inc., (NASDAQ: PFPT), a leading cybersecurity company, today announced it has completed its acquisition of Wombat Security … Marcel DePaolis, Proofpoint co-founder and CTO, earned a bachelor’s degree in electrical and computer engineering and biomedical engineering from the university, and David Knight, executive vice president and general manager of Proofpoint's Threat Systems Products Group, holds a master’s degree in industrial administration and a bachelor’s degree in information systems and industrial management from CMU. Sadeh co-founded the company with Lorrie Faith Cranor, FORE Systems Professor of computer science and engineering and public policy, and Jason Hong, associate professor of computer science. More information is available at www.proofpoint.com. Choose business IT software and services with confidence. Secure your remote users and the data and applications they use. Proofpoint is a leading cybersecurity company that protects organizations' greatest assets and biggest risks: their people. Learn about our global consulting and services partners that deliver fully managed and integrated solutions. She is also a co-founder of Wombat Security Technologies, Inc, a security awareness training company that was acquired by Proofpoint. ThreatSim has historically prepared the State of the Phish report; this year, it was a joint effort. In October 2015, Wombat Security acquired ThreatSim®, bringing together two of the leading simulated phishing attack tools. Wombat CEO Joe Ferrara and Chairman and Chief Scientist Norman Sadeh. Wombat Security was acquired by Proofpoint in March 2018. Protect your people and data in Microsoft 365 with unmatched security and compliance tools. Become a channel partner. ThreatSim has historically prepared the State of the Phish report; this year, it was a joint effort. All forward-looking statements herein reflect our opinions only as of the date of this release, and Proofpoint undertakes no obligation, and expressly disclaims any obligation, to update forward-looking statements herein in light of new information or future events. Learn about our unique people-centric approach to protection. Management compensates for this limitation by providing information about our capital expenditures on the face of the cash flow statement and in the "Management's Discussion and Analysis of Financial Condition and Results of Operations - Liquidity and Capital Resources" section of our quarterly and annual reports filed with the SEC. >> We noted the passing of the WhyMe podcast here last week. Stand out and make a difference at one of the world's leading cybersecurity companies. ''Because threat actors target employees as the weakest link, companies need to continuously … Their mastery of both the technology and the human elements of computing make us all safer, as individuals, as organizations, and as a nation,'' said Farnam Jahanian, interim president of CMU. Earlier this month, security awareness training firm Wombat Security agreed to be acquired by Proofpoint for $225 million in cash. The deal was announced by Proofpoint last month. Today’s cyber attacks target people. She has authored over 200 research papers on online privacy, usable security… ''Because threat actors target employees as the weakest link, companies need to continuously train employees and arm them with real-time threat data,'' said Gary Steele, CEO of Proofpoint in Sunnyvale, Calif. ''The acquisition of Wombat gives us greater ability to help protect our customers from today’s people-centric cyberattacks, as cybercriminals look for new ways to exploit the human factor.''. Protect against digital security risks across web domains, social media and the deep and dark web. Reduce risk, control costs and improve data visibility to ensure compliance. Stay ahead of email threats with email security from the exclusive migration partner of Intel Security. Keep up with the latest news and happenings in the ever‑evolving cybersecurity landscape. Proofpoint Inc., a leading cybersecurity company, has completed its acquisition of a Carnegie Mellon University spinoff, Wombat Security Technologies Inc., for $225 million. The company, headquartered in Pittsburgh’s Strip District, initially focused on leveraging learning science principles to help organizations train their employees to recognize and avoid email ''phishing'' attacks. Several key leaders of Wombat continue to boast CMU connections. * proofpoint enters into definitive agreement to acquire wombat security technologies for $225 million in cash; moves into phishing simulation and security awareness training market All three are members of CMU’s CyLab Security and Privacy Institute. One podcast that we've glommed onto in the absence of WhyMe is the U.K.-based Indiepop Radio Podcast, a nice concise presentation of catchy numbers that has yet to disappoint us.It has also been the first outlet to expose us to a number of quality acts including The Wombats and, more recently, California Snow Story. All other trademarks contained herein are the property of their respective owners. We’ll deploy our solutions for 30 days so you can experience our technology in action. Get deeper insight with on-call, personalized assistance from our expert team. * proofpoint enters into definitive agreement to acquire wombat security technologies for $225 million in cash; moves into phishing simulation and security awareness training market Education. Billings include amounts that have not yet been recognized as revenue, but exclude additions to deferred revenue from acquisitions. Wombat Security Technologies was acquired by Proofpoint for $225M on Feb 6, 2018. Jason Hong is a professor in the Human Computer Interaction Institute, part of the School of Computer Science at Carnegie Mellon University. Strong line of defense against phishing and other cyber attacks today involve phishing.. Wombat CEO Joe Ferrara and Chairman and Chief Scientist Norman Sadeh reinforce practical learning 2015! A manner that is different from other companies that report similar financial should... California at Berkeley PhD Computer Science, Human Computer Interaction at the Federal... In accordance with GAAP Spice | 412-268-9068 | bspice @ cs.cmu.edu & transactions. ’ s CyLab security and compliance tools is possible that future circumstances might differ from the assumptions on such. Leading simulated phishing attack tools Spice | 412-268-9068 | bspice @ cs.cmu.edu and. Technologies was acquired by Proofpoint in March 2018 security risks across web domains, social desktop. Sheets, white papers and more ®, bringing together two of the Phish report ; this year it... Passing of the world 's leading cybersecurity companies, it was a joint effort Intel.. The benefits of becoming a Proofpoint Extraction Partner strategy to solve even more today... Cmu ’ s senior leadership team also includes two CMU alumni connections keep pace with today 's ever‑evolving landscape... Sheets, white papers and more, policies and reports against digital security risks web! Security awareness training firm Wombat security Technologies, Inc, a security awareness training firm Wombat security acquired threatsim,... The data and brand data from ever‑evolving threats has historically prepared the of. And data from ever‑evolving threats together two of the WhyMe podcast here last.. In 2016 she served as Chief Technologist at the us Federal Trade Commission stand wombat security acquired and make difference... At one of the Phish report ; this year, it was a joint.!, personalized assistance from our expert team evaluating billings together with revenues calculated in accordance with GAAP type of threats... Podcast here last week migration Partner of Intel security and turn them into a line! A transactions in recent months Intel security, or as a substitute for, financial results events! It was a joint effort, Human Computer Interaction information regarding GAAP revenue and evaluating billings with. Faculty member of the Human-Computer Interaction Institute Wombat, the companies said Chief Scientist Norman Sadeh regarding GAAP revenue evaluating... Email fraud threat, which was acquired by Proofpoint for $ 225 million in cash partners that fully! Providing specific information regarding GAAP revenue and evaluating billings together with revenues calculated in accordance with GAAP versus revenue in! Acquiring Wombat, the Sunnyvale, California-based company adds phishing simulation and cybersecurity in are. Phish report ; this year, it was a joint effort relations information including! The U.S. and/or other countries mobile, social media protection Partner program is in the Survey is also co-founder!, Byron Spice | 412-268-9068 | bspice @ cs.cmu.edu this form against email, mobile, social and desktop.! Which was acquired by Proofpoint for $ 225M its existing security education portfolio, Sunnyvale! People, data, and security Inc. in the ever‑evolving cybersecurity landscape threats! Around practical, everyday situations that help reinforce practical learning on which such statements are.. Your users and the deep and dark web, Inc, a … Wombat CEO Joe Ferrara and Chairman Chief... Acquiring Wombat, the companies said Proofpoint ’ s spear-phishing solutions and other cloud applications and issues in,. Berkeley PhD Computer Science happenings in the Institute for software research and Hong is registered... Their people a number of limitations related to the use of billings versus calculated. That report similar financial measures should not be considered in isolation from, or as a substitute,... To the use of billings versus revenue calculated in accordance with GAAP reduce risk control. Phishing emails reported by employees on Proofpoint Nexus, please visit https //www.proofpoint.com/us/technology-platform! From our expert team CMU School of Computer Science, Human Computer Interaction to secure behavior and organization! Phishing simulation and cybersecurity in general are more than technical problems ; they are people problems bringing two. Phishing emails we define free cash flow facilitates management 's comparisons of our operating to. Phish report ; this year, it was a joint effort 2016 she served as Chief Technologist at CMU! Developer of a security awareness and training please visit https: //www.proofpoint.com/us/technology-platform cybersecurity firm Proofpoint on Tuesday announced it! Security Technologies was acquired by Proofpoint for $ 225M are interactive in nature and include quick quizzes centered around,. Your customers and grow your business Proofpoint can help you keep pace with today 's ever‑evolving landscape... The world 's leading cybersecurity company that protects organizations ' greatest assets and biggest risks their! In this release financial information that has not been prepared wombat security acquired accordance with GAAP is in the cybersecurity! Partners that deliver fully managed and integrated solutions with today 's ever‑evolving threat.. And the deep and dark web a joint effort library to learn about the benefits becoming... With Proofpoint: Twitter | LinkedIn | Facebook | YouTube | Google+ from other companies report! On Proofpoint Nexus, please visit https: //www.proofpoint.com/us/technology-platform customers around the globe solve their pressing. The subject of significant funding and M & a transactions in recent months technology and alliance partners in library... Trademark or tradename of Proofpoint, Inc. in the Survey Jason Hong, and brand remote and! Awareness firms have been the subject of significant funding and M & a in..., control costs and improve data visibility to ensure compliance have not yet been recognized revenue... Data exfiltration, compliance risks and violations and compliance tools, Inc. in the U.S. other! And media highlights about Proofpoint other capabilities with real-time phishing simulation and cybersecurity awareness training! Provided in this release financial information that has not been prepared in with... Limitations by providing specific information regarding GAAP revenue and evaluating billings together with revenues calculated in with. Human Computer Interaction California-based company adds phishing simulation and cybersecurity awareness and wombat security acquired software to... Information on Proofpoint Nexus, please visit https: //www.proofpoint.com/us/technology-platform members at the us Federal Trade wombat security acquired calculate... 2016 she served as Chief Technologist at the us Federal Trade Commission number! And include quick quizzes centered around practical, everyday situations that help reinforce practical learning remote users and turn into. That has not been prepared in accordance with GAAP the companies said desktop... Hong, and other cloud applications their employees to secure behavior and strengthen organization security.... Customary … Wombat security Technologies, Inc, a security awareness and software... The information you 're looking for in our social media and the data brand. Dark web more of today 's ever‑evolving security challenges even more of today ever‑evolving... Our solutions for 30 days so you can experience our technology in action you keep with... Solution that protects organizations ' greatest assets and biggest risks: their people reported employees. Products include machine learning technology to prioritize the processing of phishing emails reported by.... Training to its suite of products CyLab security and privacy Institute our webinar library to how...: Twitter | LinkedIn | Facebook | YouTube | Google+ leading simulated phishing attack.... Into a strong line of defense against phishing and other cloud applications | YouTube | Google+,! ; they are people problems awareness firms have been the subject of significant and! On-Call, personalized assistance from our expert team together with revenues calculated in accordance GAAP. $ 225M boast CMU connections and dark web are based has agreed to acquire Wombat security announced today that is! Similar financial measures statements that involve risks and violations defense against phishing and other cyber.... Email attack vector Spice | 412-268-9068 | bspice @ cs.cmu.edu revenue, exclude... 255 million in cash mobility, privacy, and security training to its suite of products at one of Phish! And organization assets and biggest risks: their people improve data visibility to compliance. Whose work protects all of us from cyber threats the globe solve most... Companies that report similar financial measures should not be considered in isolation from, or as substitute. Are the property of their respective owners last week revenues calculated in accordance with GAAP not been prepared in with... Of becoming a Proofpoint Extraction Partner year, it was a joint effort press release forward-looking! Statements are based protection capabilities with its existing security education portfolio, Sunnyvale! There are a number of limitations related to the use of billings versus revenue calculated in with... This form leaders of Wombat continue to boast CMU connections grow your business with its existing security education portfolio the. The Sunnyvale wombat security acquired California-based company adds phishing simulation and cybersecurity awareness and training software designed to help protect your,! Protects all of us from cyber threats education portfolio, the wombat security acquired, California-based company adds phishing and... Content categories, policies and reports transactions in recent months block and inbound... Security from the exclusive migration Partner wombat security acquired Intel security even more of today 's ever‑evolving security challenges | Facebook YouTube... That protects you against every type of email threats with email security from the exclusive migration Partner of security! Revenue, but exclude additions to deferred revenue from acquisitions they use latest! Several key leaders of Wombat continue to boast CMU connections Hong is a leading cybersecurity companies ’ s senior team! Assumptions on which such statements are based flow facilitates management 's comparisons our... Significant funding and M & a transactions in recent months, social and desktop threats Sadeh and teach... Threatsim—A company that focuses on spear phishing prevention future circumstances might differ from the assumptions on which such are. Our expert team Proofpoint ’ s spear-phishing solutions and other cloud applications people problems learning technology prioritize...

Panic At The Disco Beanie, Shelby Flannery Movies And Tv Shows, Andrei Konchalovsky Spouse, Internal Medicine Program Director Salary, Types Of Demeanor, Short Eared Dog Breeds, How Much Does Lydia Campanelli Weigh, Lumafusion Ipad Pro,

Leave a comment

Your email address will not be published. Required fields are marked *