Integrated Systems - News
|Cassidian is a trusted and preferred player in the global Cyber Security market|
Cassidian successfully acquired Regency IT Consulting on 19 August strengthening the company's cyber capabilities in the UK. The acquisition will ensure that Cassidian stays at the forefront of cyber security expertise and have insights into emerging threats.
Regency employs over 20 subject matter experts in the field of Information Assurance and managed IT security services. The company has longstanding credibility with government and military customers through the delivery of successful services to meet the most demanding security requirements. Andrew Beckett, the co-founder of Regency, will continue to run Regency but will also be Head of CyberSecurity Business Development in the UK market.
Denis Gardin, Head of EADS CyberSecurity Customer Solutions Centre, said: "I am excited that Regency is joining Cassidian. The Regency experts are strongly complementary of Cassidian capabilities to mitigate risks and provide solutions to our customers facing cyber threats."
Len Tyler, Head of Development of Business for Cassidian Systems, said: "This is an important strategic acquisition that will strengthen the Company's position in the cyber arena and an important milestone in implementing the Cassidian cyber strategy."
Cassidian is already recognised internationally as a trusted and preferred player in the global Cyber Security market offering high-speed crypto products (ECTOCRYP®) and managed encryption services, Security Cockpit and Desktop Monitoring, Federated ID Management and network management services.
To meet the growing need for new solutions and products to face cyber threats, Cassidian and EADS Innovation Works - EADS central research labs - decided in October 2009, to group their cyber forces in a Cyber Security Customer solutions Centre. There is a strong expert base in the UK, France and Germany to serve the needs of operators of critical IT infrastructure (government, global companies, critical infrastructure operators) and to provide the structure with all the expertise and solutions required to detect and respond to cyber threats.
on SourceSecurity.com US Edition