Feeds

RSA in three-way mating dance

EMC moves out of the shadows

Security for virtualized datacentres

RSA Security has confirmed it is talks with at least one potential bidder after the New York Times said storage giant EMC was closing in on the company.

The NYT said RSA was talking to EMC "or at least one other bidder” about an acquisition which could be worth more than $1.8bn. The firm’s board will review final bids before the weekend, the report said.

The report smoked out RSA, which issued a statement confirming “RSA Security is currently engaged in negotiations with parties regarding a potential strategic transaction.”

It added that “No definitive agreement has been reached” and there was no guarantee a deal would be finalised.

That did nothing to dampen down speculation which powered RSA’s share price up over 18 percent to $22.9m the last time we looked, pushing the value of the firm upto $1.7bn.

The perceived benefits of integrating storage management and security has exercised the brains of industry execs in recent years. To date the most spectacular buy has been Symantec’s $13.5bn hoovering up of Veritas. But while the marriage of two software companies is less likely to scare potential customers and partners, RSA customers may balk at the idea of its technology being tied too closely to EMC’s hardware.®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.