Feeds

Feisty Mercury comes out fighting

Quicksilver

Top three mobile application threats

Mercury Interactive marketing chief Christopher Lochhead was in London on Monday to reassure investors, customers and employees that the company remains on track despite a US fraud investigation that prompted the departure of three of its most senior executives.

The enterprise software vendor's chief executive, general counsel and chief finance officer resigned earlier this month following an investigation into irregular allocation of stock option grants between 1995 and 2002.

Former chief executive officer Amnon Landan has left the company he founded, with Anthony Zingale stepping up from chief operating officer to lead the business technology optimisation firm. Mercury has delayed its Q3 financial results and said it would have to re-state historical results as a consequence of the misdated stock grants.

Lochhead said the investigation is focused only on stock options, not on Mercury's historical revenues or cash position which remains strong. Mercury markets a suite of software and services that help corporations achieve good IT governance and comply with regulations such as Sarbanes Oxley Act (SOX). The stock options under question date from before the time Mercury launched IT governance products, which in any case are nothing to do with stock option grants, Lochhead said.

Landan's replacement by Zingale was due to take place next year, according to Lochhead. "This doesn't change our strategy." he said. "The restatement of our financials will occupy our new CFO but the rest of the business will operate as normal. This won't be a distraction."

IT firms in the midst of financial investigations (something Lochhead claimed is no longer out of the ordinary) normally keep their head below the parapet but Mercury has come out fighting. One has to admire its bravura.

Mercury competes with CA, IBM, HP, BMC and CompuWare though not as head-on competitors. "Our financial reserves are strong. We will continue to invest in research and development and work on our acquisition roadmap... to expand our footprint in IT governance and application optimisation," Lochhead said. "The value of what we do and our financial operation remains just as strong as they were three weeks ago."

Rival sales teams out to exploit Mercury's forced management changes to swing sales ought to be beware. "My advice to them is pack a launch because we're going to crush them," Lochhead told El Reg. ®

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex–Apple CEO John Sculley: Ousting Steve Jobs 'was a mistake'
Twenty-nine years later, post-Pepsi exec has flat-forehead moment
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.