RSS
Логотип
Баннер в шапке 1
Баннер в шапке 2

Context Information Security

Company

width=200px

Owners:
Accenture

Content

Number of employees
2019 year
250

Owners

Context Information Securitythe consulting company founded in 1988 which helps government agencies and financial institutions to be protected from advanced cyber attacks. The company has 11 offices (by March, 2020) located in Great Britain, Germany, Australia and the USA. The headquarters of Context is in London. Number of staff of the company is 250 people.

History

2020: Accenture купила Context Information Security

In March, 2020 Accenture announced acquisition of Context Information Security at the British space giant Babcock International Group. The cost of the transaction was about $137 million.

According to the press release, purchase of Context expands possibilities of Accenture in everything: from cyber defense and group interaction of cybersecurity employees to services of a research of vulnerabilities and response to incidents. Context was engaged in processing of some most complex cases of response to cyber attacks in the industry, declared in Accenture.

Accenture announced acquisition of Context Information Security at the British space giant Babcock International Group
File:Aquote1.png
This acquisition perfectly is suitable for us as it integrates group of highly qualified specialists in the field of cyber security worldwide, at the same time helps to provide the differentiated services for the British market — Kelly Bissell, the senior managing director of Accenture who heads division of Accenture Security said.
File:Aquote2.png

Accenture considers that the staff of Context will help "to deepen even more" services of Accenture Security for clients. The consulting company has the customer base covering several industries including financial services, the government, aerospace and defense industry, infrastructure, etc.

The CEO of Context Mark Reybern says that the strategy of the company and Accenture are similar as they assume simulation of cyber attacks and response to cyberincidents.[1]

Notes