Feeds

Sun purchase fuels need for speed

Identity and access managed

Intelligent flash storage arrays

Sun Microsystems has become the latest infrastructure provider to express its love for smaller software partners in the form of an acquisition.

Sun is purchasing Neogent, a reseller of Sun's Java System Identity Access Management suite that Neogent claims it can get up and running in 45 days using a pre-integrated software bundle. Financial terms of the deal were not disclosed.

Sun has promised "dramatically increased speed and accuracy" for deployment of identity services based on its software, giving it a "significant" advantage over competitors IBM, Computer Associates, Oracle, Microsoft and Novell. Sun is targeting customers' needs around service oriented architectures (SOAs) and regulatory compliance.

Dale Ferrario, Sun vice president of engineering, SOA and business integration, told The Register that identity and access management is one of the two areas where Sun will lead in selling its software - the other being SOA.

"We talk about our SOA capabilities from SeeBeyond integrated with identity management and portal to give a complete solution. If customers are not to the point where they think SOA is for them, we lead with a business problem: like Sarbanes Oxley, compliance or putting their business on the web."

Sun's identity and access management is considered one of the company's strongest software assets. Sun backs this up with a strong presence in telecoms and service providers, while Neogen brings a small but impressive customer list that includes American Airlines, Cisco Systems, Yamaha, Wells Fargo and Sikorsky.

However, with so much M&A shaping up as wholesale purchase of customers to drive "non-organic" growth (yes, Oracle we're looking at you), Sun's deal seems based on getting its hands on Neogen's technology - specifically the Velocity Identity Package (VIP).

VIP sees Sun's Identity Manager and supporting software plus Sun's Java application server pre-configured and pre-loaded on a hardware server, and wrapped up in a workflow library to eliminate the time and cost associated with customers creating their own workflows.®

Internet Security Threat Report 2014

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Microsoft to bake Skype into IE, without plugins
Redmond thinks the Object Real-Time Communications API for WebRTC is ready to roll
Microsoft promises Windows 10 will mean two-factor auth for all
Sneak peek at security features Redmond's baking into new OS
Mozilla: Spidermonkey ATE Apple's JavaScriptCore, THRASHED Google V8
Moz man claims the win on rivals' own benchmarks
Yes, Virginia, there IS a W3C HTML5 standard – as of now, that is
You asked for it! You begged for it! Then you gave up! And now it's HERE!
FTDI yanks chip-bricking driver from Windows Update, vows to fight on
Next driver to battle fake chips with 'non-invasive' methods
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
Ubuntu 14.10 tries pulling a Steve Ballmer on cloudy offerings
Oi, Windows, centOS and openSUSE – behave, we're all friends here
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Mitigating web security risk with SSL certificates
Web-based systems are essential tools for running business processes and delivering services to customers.