Feeds

Symantec reaches endpoint with $830m Altiris

Meanwhile, back in the data centre...

Beginner's guide to SSL certificates

Symantec announced today it would cough up $830m for infrastructure management software firm Altiris.

Altiris's software is designed to keep tabs on corporate IT assets such as laptops, PDAs, desktops, and servers.

The Utah-based firm was founded in 1998 by Jan Newman and went public in May 2002. Symantec's offer breaks down at $33 per share, a 22 per cent premium on Altiris' $27.14 close on Friday. Subject to stockholder approval and closing conditions, the buy should go through during the second calendar quarter this year.

Symantec CEO John Thompson said: "By combining the endpoint management solutions from Altiris with the security expertise from Symantec, we believe we can offer customers a more comprehensive solution to protect and manage the millions of connected devices that make up the fabric of today's global IT infrastructure."

At the other end of the enterprise, Symantec today launched version 7.0 of its Enterprise Vault. The pitch this time round is based on new heuristics which monitor the actual content of email - say if a product codename was being bandied about willie nillie - and IM conversations across different platforms. Symantec says it will not have too much impact on network performance. Product manager Fredrik Sjostedt said the package is fully Vista-ready, too.

Symantec needs Enterprise Vault 7 to do good business. Last week it blamed an eight per cent drop in storage software sales for missing its targets and an upcoming $200m round of cuts.

The struggling division is being given an extra marketing push to coincide with the Enterprise Vault launch. Available for March, Symantec Information Foundation 2007 will attempt to pin storage software more closely with the firm's security reputation, by rebranding the package formerly known as Veritas Information Foundation. Symantec bosses will be hoping the move will go some way to vindicating the Veritas acquisition, which is yet to create new value in many eyes.

In contrast, of late IBM has seen vigourous growth in storage code according to IDC, by attacking from the continuity side. EMC is set to come out with a more coherent plan too as it accelerates the integration of its software purchases to augment its number one software vendor position. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
IT crisis looming: 'What if AWS goes pop, runs out of cash?'
Public IaaS... something's gotta give - and it may be AWS
Linux? Bah! Red Hat has its eye on the CLOUD – and it wants to own it
CEO says it will be 'undisputed leader' in enterprise cloud tech
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Ello? ello? ello?: Facebook challenger in DDoS KNOCKOUT
Gets back up again after half an hour though
Hey, what's a STORAGE company doing working on Internet-of-Cars?
Boo - it's not a terabyte car, it's just predictive maintenance and that
Troll hunter Rackspace turns Rotatable's bizarro patent to stone
News of the Weird: Screen-rotating technology declared unpatentable
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.