Feeds

Symantec drafts nSuite for virtualization ops

Connection broker boosts endpoint roster

Designing a Defense for Mobile Applications

Symantec

Symantec is still keen to buy clout in the endpoint virtualization space after purchasing Altiris in early 2007 and creating a new group around it.

Presently, it plans to procure nSuite, a virtual workspace firm based in Woburn Massachusetts for an undisclosed sum. Symantec said it expects the deal to close later this month.

The firm makes PrivacyShell Virtual Workspace Management, a suite of connection brokering software primarily run by hospitals and healthcare providers.

PrivacyShell lets users access a secure personal workspace running on remote servers as if they were running locally. Users can also move their workspace and accompanying applications to any desktop in the network they need.

Until now, nSuite sold its wares almost entirely to the medical beat, although Symantec says the technology is easily enough migrated to the market at large. Symantec's director of enterprise marketing, Brad Rowland, believes its roots will in fact ensure a truly secure workspace born from compliance with the stringent security requirements of hospital work.

And although the software is not as mature as connection brokering offerings by rivals such as Citrix, Symantec hopes to play up its vendor neutral M.O. to win over customers.

The software will at first be continued to be sold as a stand-alone product. It will be rolled into Symantec's newly established Endpoint Virtualization group along with Altiris and Appstream which currently make up the operation.

The eventual plan is to re-box the bunch under a common naming convention. But seeing as Symantec hasn't worked up the energy to do this for even Altiris SVS and Appstream, it's likely the nSuite brand will stick around for a good bit longer. ®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.