CA Technologies to Acquire Arcot Systems, Inc., A Visionary in Fraud Prevention, Advanced Authentication; Acquisition Supports Cloud Strategy, Extends Market Opportunity for Leading Identity and Access Management Offerings CA Technologies to Acquire Arcot Systems, Inc., A Visionary in Fraud Prevention, Advanced Authentication; Acquisition Supports Cloud Strategy, Extends Market Opportunity for Leading Identity and Access Management Offerings

CA Technologies to Acquire Arcot Systems, Inc., A Visionary in Fraud Prevention, Advanced Authentication; Acquisition Supports Cloud Strategy, Extends Market Opportunity for Leading Identity and Access Management Offerings

ENP Newswire 2010, August 31

    • £2.99
    • £2.99

Publisher Description

ENPNewswire-31 August 2010-CA Technologies to Acquire Arcot Systems, Inc., a Visionary in Fraud Prevention, Advanced Authentication; Acquisition Supports Cloud Strategy, Extends Market Opportunity for Leading Identity and Access Management Offerings(C)2010 ENPublishing - http://www.enpublishing.co.uk Release date- 30082010 - ISLANDIA, N.Y. - CA Technologies (NASDAQ:CA) today announced it has signed a definitive agreement to acquire privately-held Arcot Systems, Inc., a leader in providing advanced authentication and fraud prevention solutions through on premises software or cloud services, in an all-cash transaction valued at $200 million.

GENRE
Business & Personal Finance
RELEASED
2010
31 August
LANGUAGE
EN
English
LENGTH
5
Pages
PUBLISHER
Normans Media Ltd.
SIZE
82
KB
CA Technologies Executes on Its Cloud Strategy with Identity and Access Management to, For and from the Cloud; New Product Integrations Streamline Identity Governance for on Premise and Cloud Applications CA Technologies Executes on Its Cloud Strategy with Identity and Access Management to, For and from the Cloud; New Product Integrations Streamline Identity Governance for on Premise and Cloud Applications
2010
Business Plans Handbook Business Plans Handbook
2017
Mcafee Validates First Third-Party Interoperable Products Mcafee Validates First Third-Party Interoperable Products
2008
The International Handbook of Electronic Commerce The International Handbook of Electronic Commerce
2013
Power System Protection Crucial to Nuclear Simulations Power System Protection Crucial to Nuclear Simulations
2008
Practical Cloud Security Practical Cloud Security
2016
Adobe Flash Player 10.1 Coming to Mobile Devices; Quotes from Industry Partners Adobe Flash Player 10.1 Coming to Mobile Devices; Quotes from Industry Partners
2010
-Poor Economics by Abhijit V. Banerjee and Esther Duflo Wins the Financial Times and Goldman Sachs Business Book of the Year Award 2011 -Poor Economics by Abhijit V. Banerjee and Esther Duflo Wins the Financial Times and Goldman Sachs Business Book of the Year Award 2011
2011
2K Games Partners with Playboy Magazine to Bring Sophistication and Classic Imagery to Mafia II; Vintage Covers and Centerfolds from the Archives of the World's Best-Selling Men's Monthly Magazine to be Found Throughout the World of Empire Bay 2K Games Partners with Playboy Magazine to Bring Sophistication and Classic Imagery to Mafia II; Vintage Covers and Centerfolds from the Archives of the World's Best-Selling Men's Monthly Magazine to be Found Throughout the World of Empire Bay
2010
Panasonic Lumix Lx5, The Ultimate Compact High-Performing Digital Camera AIMS for Superb Photo Quality Panasonic Lumix Lx5, The Ultimate Compact High-Performing Digital Camera AIMS for Superb Photo Quality
2010
Canonical's Ubuntu 10.04 LTS Server Edition Features the Ideal Deployment Platform for Linux Server Workloads and Cloud Computing; Long-Term Support (LTS) Version of Popular Server Operating System Generally Available on 29 April Canonical's Ubuntu 10.04 LTS Server Edition Features the Ideal Deployment Platform for Linux Server Workloads and Cloud Computing; Long-Term Support (LTS) Version of Popular Server Operating System Generally Available on 29 April
2010
Juniper Confronts Mobile Security Challenge; First to Protect Pathways from Smartphones to Applications and Corporate Networks; Junos Pulse and Mobile Secure Deliver Pervasive Mobile Security, Enabling Secure User Experiences and New Service Models for Operators Juniper Confronts Mobile Security Challenge; First to Protect Pathways from Smartphones to Applications and Corporate Networks; Junos Pulse and Mobile Secure Deliver Pervasive Mobile Security, Enabling Secure User Experiences and New Service Models for Operators
2010