Feeds

Novell to acquire Managed Objects

The CMDB software of my desire

The Power of One Infographic

Novell intends to buy Managed Objects, maker of business service management (BSM) software, for an undisclosed sum. The deal is expected to close during Novell's first fiscal quarter 2009, which ends next January.

Key to Novell's purchase is getting its mitts on the McLean, Virgina-based firm's Configuration Management Data Base (CMDB) software, called CMDB360.

CMDB builds a repository of information on an IT system's components and dependencies. The analytics are considered quite useful for a range of issues from troubleshooting to ascertaining the impact of a system change or new system roll out.

When the deal closes, Managed Objects will switch business cards to Novell's Systems and Resource Management business unit. The Linux vendor's last purchase of note in the data center management arena was the $205m acquisition of PlateSpin. Obviously, the Linux vendor is putting some renewed effort into building up its management ops.

"Novell and Managed Objects are a natural fit because they share a common ideology for openness and vendor neutrality," said Managed Objects CEO, Siki Giunta. "There is very little product overlap and tremendous synergy between the two companies and our respective technology, which is great news for our customers and the market at large."

Novell's chief marketing officer John Dragoon echoed sentiments on the company blog that there will be little product overlap. He reckons, at the same time, the two companies share the same customer base looking for a common data center management strategy. ®

Boost IT visibility and business value

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
ITC: Seagate and LSI can infringe Realtek patents because Realtek isn't in the US
Land of the (get off scot) free, when it's a foreign owner
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.