Telex: Chapter 11 for StorCentric, COO for S3NS, Elon Musk cancels Twitter takeover, Deloitte opens up to zero trust

– Chapter 11 for StorCentric looking to sell itself. A composite player in the primary and secondary storage market, Storcentric, which has gone through a flurry of tactical takeovers in recent years (Drobo, Retrospect, Nexsan, Vexata and Violin Memory), has filed for Chapter 11 protection and is seeking a buyer. Drobo, owned by StorCentric, also filed its own Chapter 11 claim. These entities cited the devastating business impact of the Covid-19 pandemic to explain their difficulties. Prior to filing for bankruptcy, StorCentric had attempted to recover funds, $5 million, from Serene Investment Management to honor a debt.

– A director of operations for S3NS. Yannis Crevoisier announced his arrival in post on Linkedin and would be in office since the beginning of June. In the past, he held various positions at Thales, notably within the Gemalto subsidiary focused on digital security. He served as CDO at Gemalto from October 2021 until his recent departure. The S3NS joint venture, born of a merger between Thales and Microsoft, aims to launch a trusted cloud offering.

– Elon Musk cancels Twitter takeover. The billionaire confirmed this Friday, July 8, that he wanted to withdraw from the purchase agreement he had signed to acquire Twitter. But the leaders of the social network did not let it go and immediately announced legal action against the boss of Tesla. The firm announces that it has responded to all of Elon Musk’s requests, in particular on the number of fake accounts. In good faith, Twitter has deleted 1 million fake accounts a day since the start of negotiations.

– Deloitte launches zero trust managed service. The firm today announced the launch of Zero Trust Access, a managed security service that security teams can use to secure communications between users, devices and applications. This service will provide decentralized peer-to-peer (P2P) connectivity between end users and software, so that sensitive data traffic does not pass through point-of-presence (POP) devices operated by third parties.

Leave a Comment