Skip to main

You are here

Sophos acquires Linux server security firm Capsule8

Cyber security vendor Sophos has acquired Capsule8, as part of its effort to boost the Linux protection capabilities through its own product line. 

As part of the deal, Sophas plans to integrate Capsule8 technology into its recently launched Adaptive Cybersecurity Ecosystem (ACE) later this fiscal year, said Dan Schiappa (pictured), chief product officer for Sophos.

Sophos said it will also integrate the Capsule security platform to its Extended Detection and Response solutions, Intercept X server protection products, as well as its Sophos Managed Threat Response and Rapid Response services. 

“Comprehensive server protection is a crucial component of any effective cybersecurity strategy that organisations of all sizes are increasingly focused on, especially as more workloads move to the cloud,” said Schiappa.

“With Capsule8, Sophos is delivering advanced, differentiated solutions to protect server environments, and expanding its position as a leading global cybersecurity provider,” he added.

According to its research arm SophosLabs, the company will be able to provide protection against hackers using tactics, techniques and procedures (TTPs) aimed specifically at Linux systems by using the technology developed by Capsule8.

“Attackers today are incredibly aggressive and nimble as they adapt their TTPs to focus on the easiest, largest or fastest-growing opportunities. As more organisations shift to Linux servers, adversaries have noticed and they are adapting and customising their approaches to attack these systems,” Schiappa said.

“To stay protected, organisations must factor in a strong, but lightweight layer of Linux security that automatically integrates and shares intelligence with endpoint, network and other security layers and platforms within an estate."

“We will provide this industry-leading capability and strategically important visibility and detection by combining Capsule8 with our Adaptive Cybersecurity Ecosystem products and services, greatly enhancing the ability to find and eliminate suspicious activity before it becomes malicious,” he added.