IBM Plans to Acquire Security Specialist Randori

IBM Plans to Acquire Security Specialist Randori
IBM

IBM announced it plans to acquire Randori, a leading attack surface management (ASM) and offensive cybersecurity provider based in the Boston area. The transaction is expected to close in the next few months, subject to customary closing conditions and any required regulatory reviews.

This is IBM's fourth acquisition in 2022 as the company continues to bolster its hybrid cloud and AI skills and capabilities, including in cybersecurity. IBM has acquired more than 20 companies since Arvind Krishna became CEO in April 2020.

"Our clients today are faced with managing a complex technology landscape of accelerating cyberattacks targeted at applications running across a variety of hybrid cloud environments - from public clouds, private clouds, and on-premises," said Mary O'Brien, General Manager at IBM Security. "In this environment, it is essential for organizations to arm themselves with attacker's perspective to help find their most critical blind spots and focus their efforts on areas that will minimize business disruption and damages to revenue and reputation.

Randori is a hacker-led company, with software to help security teams discover gaps, assess risks, and improve their security posture over time by delivering an authentic attack experience at scale. Designed to help security teams zero in on previously unknown exposure points, Randori's unique attack surface management solution takes into account the logic of an adversary based on real-world attacks - and is the only one to prioritize based on the level of risk as well as the attractiveness of an asset to potential attackers using their proprietary scoring system.

Their unique approach has led to the development of a cloud-native solution that provides better prioritization of vulnerabilities and reduces noise by focusing on customers' unique attack surface. By simply entering an email domain, Randori will begin mapping a customer's attack surface, helping to identify shadow IT risks and potential entry points for ransomware.