Skip to main content

BlackBerry Goes Shopping Again, Buys Good Technology

BlackBerry Goes Shopping Again, Buys Good Technology

Next Story
BlackBerry pulled a surprise move this morning when it announced that it’s purchasing mobile device management vendor Good Technology for $425 million in cash.
It signals that BlackBerry, which has lost most of its worldwide handset marketshare, is shifting its focus by expanding its mobile enterprise security platform.
In a way, this shift makes sense, as BlackBerry has always been about delivering secure mobile solutions. It’s easy to forget now that BlackBerry was once the undisputed leader in enterprise mobility, but when Apple and Android came along, BlackBerry quickly lost its dominant position.
To give you a sense of how far it has fallen, according comScore, in September, 2009 BlackBerry led US mobile marketshare with more than 42 percent. In the most recent report from July, it had plunged to 1.5 percent. Clearly, it’s not going to be a player in the handset market.
Although it may seem like this move comes out of the blue, in a company blog post, BlackBerry COO Marty Beard said it was really just a logical extension of BlackBerry’s existing strategy to expand into enterprise mobility across platforms.
“But when you look more closely, you see that we share a common heritage in security and our strengths complement each other incredibly well,” Beard wrote.
CEO John Chen said in a press conference that the two companies fit well together, especially given that Good’s strength is in iOS, where BlackBerry is not as strong.
Chen also pointed out that the company wants to switch to a subscription business, and the vast majority of Good’s revenue comes from subscriptions, giving Blackberry an existing platform to make this transition.
He indicated that the purchase was part of a broader acquisitions strategy as it tries pivoting to an enterprise mobile security platform. BlackBerry bought German voice encryption firm Secusmart last year. It snagged WatchDox, an enterprise file security company, back in April.
Good Technology filed an S1 in May of 2014, but it never pulled the trigger on the IPO. There were rumors of layoffs and the S1 shows substantial debt of over $24 million.
R Ray Wang, founder at Constellation Research, says that while that debt ultimately hurt the company, it has some of the “best enterprise mobility management” products on the market.
It’s not just a pure mobility play, however as both companies have also begun focusing on Internet of Things technology.
Wang said that this was a smart move for BlackBerry, enabling it go cross-platform into iOS and Android. “The result is a powerhouse EMM offering with 70+ security certificates, but the real gold here is the ability to get to a platform to support Internet of Things,” he said.
But one industry insider saw it differently with two struggling companies that might just work better together. “These are both embattled firms that are trying to stay relevant in this day and age of mobile management,” the insider said.
Overall, this looks like it could be a good deal for both companies, giving Good Technologies a soft landing without having to risk the dangers of IPOing in an increasingly hostile market, while filling out BlackBerry’s growing security platform without putting out a huge amount of cash.

Popular posts from this blog

Hidden Wiki

Welcome to The Hidden WikiNew hidden wiki url 2015 http://zqktlwi4fecvo6ri.onion Add it to bookmarks and spread it!!!
Editor's picks Bored? Pick a random page from the article index and replace one of these slots with it.
The Matrix - Very nice to read. How to Exit the Matrix - Learn how to Protect yourself and your rights, online and off. Verifying PGP signatures - A short and simple how-to guide. In Praise Of Hawala - Anonymous informal value transfer system. Volunteer Here are five different things that you can help us out with.
Plunder other hidden service lists for links and place them here! File the SnapBBSIndex links wherever they go. Set external links to HTTPS where available, good certificate, and same content. Care to start recording onionland's history? Check out Onionland's Museum Perform Dead Services Duties. Introduction PointsAhmia.fi - Clearnet search engine for Tor Hidden Services (allows you to add new sites to its database). DuckDuckGo - A Hidden S…

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER

[SOLVED] IDM WAS REGISTERED WITH A FAKE SERIAL NUMBER
Good News [May 08, 2015]: IDM developers got smarter, but the crackers are always a step ahead. Follow this article and send an email to uglyduckblog@gmail.com if you are desperate. I can NOT post any crack here for legal reasons. Happy Downloading with IDM. ;) *********** first tip is to use latest crack for idm from  onhax.net idm universal web crack and make sure u are using all latest vers I am sure many of us are too much dependent on Internet Download Manager a.k.a. IDM. The main reason didn’t permanently switch to linux was IDM. I mainly use it for batch downloading and download streaming videos. Till yesterday, IDM was working fine with me (of course with fake serial numbers, keygen, crack, patch etc. which could be found with little effort). But few days ago, with the latest update version 6.18 build 7 (released on Nov 09, 2013) Internet Download Manager was literally had a breakthrough and crushed all the serial numbers, …

DoubleAgent Attack Turns Your Antivirus Into Malware And Hijacks Your PC



Short Bytes: Cybellum security researchers have uncovered a new attack mechanism that can be used to take control of your antivirus and turn it into a malware. Called DoubleAgent, this attack exploits an old and undocumented vulnerability in Windows operating system. This Zero Day code injection technique affects all major antivirus vendors and has the power to hijack permissions. The security researchers from Cybellum have found a new technique that can be used by the cybercriminals to hijack your computer by injecting malicious code. This new Zero-Day attack can be used to take full control over all the major antivirus software. Instead of hiding from the antivirus, this attack takes control of the antivirus itself. Called DoubleAgent, this attack makes use of a 15-year-old legitimate feature of Windows (read vulnerability)–that’s why it can’t be patched. It affects all versions of Microsoft Windows. Cybellum blog mentions that this flaw is still unpatched by most antivirus v…