M&A Deal Summary

Nehemiah Security Acquires Triumfant

On October 20, 2016, Nehemiah Security acquired software company Triumfant

Acquisition Highlights
  • This is Nehemiah Security’s 3rd transaction in the Software sector.
  • This is Nehemiah Security’s 3rd transaction in the United States.
  • This is Nehemiah Security’s 1st transaction in Maryland.

M&A Deal Summary

Date 2016-10-20
Target Triumfant
Sector Software
Buyer(s) Nehemiah Security
Deal Type Add-on Acquisition

Target

Triumfant

Rockville, Maryland, United States
Triumfant, Inc. is a developer of software for automatically detect and remediate stealthy exploits and obfuscated malware without signatures of any kind. AtomicEye combines comprehensive data collection, lightning quick analysis, and automated or human-augmented surgical remediation workflows to detect and respond to APTs, targeted attacks, zero-days, malicious insiders and other assaults on your digital assets.

Search 214,239 Deals Now

SEARCH BY

  • Buyer Type (PE or Strategic)
  • Deal Size ($10M to $10B+)
  • Sector (60 Sectors)
  • Deal Type
  • Geography
  • & More

Try Free

Buyer(S) 1

Buyer

Nehemiah Security

Tysons, Virginia, United States

Category Company
Founded 2015
Sector Software
DESCRIPTION

Nehemiah Security offers the industry’s first cybersecurity software solution able to automatically detect and remediate exploits without signatures of any kind. Nehemiah Security was founded in 2015 and is based in Tysons, Virginia.


DEAL STATS #
Overall 3 of 3
Sector: Software M&A 3 of 3
Type: Add-on Acquisition M&A Deals 3 of 3
State: Maryland M&A 1 of 1
Country: United States M&A 3 of 3
Year: 2016 M&A 1 of 1
PREVIOUS DEAL
DATE TARGET DEAL TYPE VALUE
2015-10-05 Allied Security and Defense Systems

United States

Allied Security and Defense Systems (ASDS) is a provider of innovative solutions and services for intercepting and stopping advanced persistent threats and destructive cyberattacks. ASDS provides cutting-edge technology solutions designed to intercept and stop the most advanced persistent threats and destructive cyberattacks at the initial point of entry into an enterprise’s endpoints.

Buy -