Welcome!

Symbian Authors: Jack Newton, Kevin Benedict, Matthew Lobas, Shelly Palmer, RealWire News Distribution

News Feed Item

INSIDE Secure to Acquire Embedded Security Solutions (ESS), a Security Specialist in the Mobile and Networking Markets

INSIDE Secure (NYSE Euronext INSD.PA) today announced that it has entered into an agreement to purchase Embedded Security Solutions (ESS), a high expertise business which designs and develops encryption-related security hardware intellectual property (IP) and software for a variety of industries, including the mobile and networking markets. The transaction is expected to close before the end of 2012 subject to certain customary closing conditions. The Supervisory Board of INSIDE Secure has unanimously approved the transaction.

This strategic acquisition will enable INSIDE Secure to reinforce its position as a key player in the fast-growing security solutions market:

  • ESS brings to INSIDE Secure complementary offerings for a complete security architecture, as well as additional solutions for securing both content (Digital Rights Management or “DRM”) and data exchange (Virtual Private Network or “VPN”);
  • ESS complements INSIDE Secure’s know-how with a talented team of 79 highly qualified employees located in Europe, Asia and in the US, as well as its extensive and highly regarded security intellectual property and technology portfolio, which aligns with INSIDE’s long-term strategy to generate its own IP licensing revenue;
  • This acquisition will allow INSIDE Secure to access a wider customer base in the mobile, content provider and network industries that serve a variety of application markets (smart grids, automotive, gaming and others); and
  • By leveraging the strong capabilities of INSIDE Secure’s existing Mobile NFC and Digital Security businesses, the combined offer should lead to additional sales in high growth markets.

At closing, INSIDE Secure will pay USD38 million in cash subject to a working capital adjustment, and up to an additional USD10 million subject to completion of certain post-closing transactions. The transaction is expected to be accretive to INSIDE Secure’s 2013 adjusted operating and net results, and to enhance INSIDE Secure’s gross margin.

Commenting on this announcement, Rémy de Tonnac, chief executive officer of INSIDE Secure, said: “This transaction is an important opportunity to extend our position in the security value chain and reinforce our global offer in high-end security solutions. It will enable us to complement our product and solution portfolio in Mobile NFC and Digital Security and enhance our customer offerings in fast-growing markets. The talented ESS team who will be joining will contribute their know-how and expertise to advancing our innovative technologies, and help us address new security markets.”

Overview of ESS know-how, products and expertise

ESS designs, develops and sells a range of embedded security solutions, encompassing hardware IP and software. It offers a host of security solutions tailored for businesses and consumers on the move.

The ESS portfolio offer includes a comprehensive suite of embedded security solutions which include semiconductor IP, security toolkits and DRM solutions that address both client- and server-side security.

The solutions are centered on the use of encryption algorithms and security blocks to protect data and ensure confidentiality, integrity and availability. ESS offers three product lines: a Content Protection product line, a Security Toolkit product line and a Semiconductor IP product line.

ESS products are used in hundreds of millions of mobile and networking products to ensure data privacy for businesses and individuals, and are sold to a variety of tier-one brand name customers, such as Alcatel-Lucent, Cisco, HBO, LG, Motorola, Nokia, Samsung, Sky and Texas Instruments.

ESS recorded2 net revenue of USD25.3 million in 2011, with gross margins exceeding 90 percent and operating income of USD6.3 million. For the first nine months of 2012, the net revenue was USD21.4 million and the operating income USD6.2 million.

Conference call details

Rémy de Tonnac, Chief Executive Officer of INSIDE Secure, jointly with Richard Vacher Detournière, General Manager and Chief Financial Officer, will comment on the acquisition of ESS and will be available to answer questions during a conference call to be held on 19 November 2012 at 3pm CET / 2pm GMT / 9am EST. The call will be held in English.

To participate in the conference call, you may call the following numbers prior to the scheduled start time: +33 (0) 1 70 77 09 40 (France) or +44 203 367 9453 (United Kingdom) or + (1) 866 907 5923 (USA).

This press release and other presentation materials will be available on INSIDE Secure’s website: www.insidesecure.com.

A replay of the conference call will also be available approximately two hours following the conference call and for 90 days on the Group’s website.

About INSIDE Secure

INSIDE Secure (NYSE Euronext Paris FR0010291245 – INSD.PA) is a leading designer, developer and supplier of semiconductors, embedded software and platforms for secure transactions and digital security. INSIDE mobile NFC, secure payment and digital security products provide security for a wide range of information processing, storage and transmission applications. The company’s customers are found in a wide range of markets, including mobile payment, identification documents, access control, transit, electronic device manufacturing, pay television and mobile service operators. For more information, visit www.insidesecure.com.

Forward-looking statements

This press release contains certain forward-looking statements concerning the INSIDE Secure group. Although INSIDE Secure believes its expectations to be based on reasonable assumptions, they do not constitute guarantees of future performance. The group’s actual results may accordingly differ materially from those anticipated in these forward-looking statements owing to a number of risks and uncertainties. For a more detailed description of these risks and uncertainties, please refer to the “Risk Factors” section of the annual financial report of 27 April 2012, available on www.insidesecure.com.

1 INSIDE Secure uses performance indicators that are not strictly accounting measures (adjusted operating result, and adjusted income /(loss)). These indicators are not defined under IFRS, and do not constitute accounting elements used to measure the group’s financial performance. They should be considered in addition to, and not as a substitute for, any other operating and financial performance indicator of strict accounting nature, as presented in the Group’s Consolidated Financial Statements and the corresponding notes. The Group uses these indicators because it believes they are useful measures of its operating performance and of its operating cash flow generation.

2 Unaudited, US GAAP

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.
The Jevons Paradox suggests that when technological advances increase efficiency of a resource, it results in an overall increase in consumption. Writing on the increased use of coal as a result of technological improvements, 19th-century economist William Stanley Jevons found that these improvements led to the development of new ways to utilize coal. In his session at 19th Cloud Expo, Mark Thiele, Chief Strategy Officer for Apcera, will compare the Jevons Paradox to modern-day enterprise IT, e...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning...
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
SYS-CON Events announced today the Enterprise IoT Bootcamp, being held November 1-2, 2016, in conjunction with 19th Cloud Expo | @ThingsExpo at the Santa Clara Convention Center in Santa Clara, CA. Combined with real-world scenarios and use cases, the Enterprise IoT Bootcamp is not just based on presentations but with hands-on demos and detailed walkthroughs. We will introduce you to a variety of real world use cases prototyped using Arduino, Raspberry Pi, BeagleBone, Spark, and Intel Edison. Y...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Internet of @ThingsExpo, taking place November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with the 19th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world and ThingsExpo Silicon Valley Call for Papers is now open.
Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
SYS-CON Events announced today that ReadyTalk, a leading provider of online conferencing and webinar services, has been named Vendor Presentation Sponsor at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. ReadyTalk delivers audio and web conferencing services that inspire collaboration and enable the Future of Work for today’s increasingly digital and mobile workforce. By combining intuitive, innovative tec...
There is growing need for data-driven applications and the need for digital platforms to build these apps. In his session at 19th Cloud Expo, Muddu Sudhakar, VP and GM of Security & IoT at Splunk, will cover different PaaS solutions and Big Data platforms that are available to build applications. In addition, AI and machine learning are creating new requirements that developers need in the building of next-gen apps. The next-generation digital platforms have some of the past platform needs a...
Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra...