Feeds

IBM consumes network kit automation firm

Intelliden rolls into Tivoli

Security for virtualized datacentres

IBM has scooped up network automation software maker Intelliden.

Big Blue announced the acquisition on Tuesday, but it did not disclose the terms of the deal. Venture-backed Intelliden specializes in software that allows telecoms to automate the configuration of thousands of routers, switches, and hubs made by a range of different vendors.

IBM plans to fold Intelliden into its Software Group under the Tivoli systems management brand. Big Blue said it will continue to advance the capabilities of Intelliden while integrating the software with products such as Tivoli Network Manager and Netcool Omnibus.

The company's approximately 70 employees will continue to work at its Menlo Park, California headquarters and at offices in Colorado Springs, Colorado and Belfast, Ireland.

Intelliden marketing chief Rahul Sachdev said during an acquisition conference call that while other firms offer the same capabilities as Intelliden, the main attraction of the firm's software is its ability to scale to hundreds of thousands of devices.

IBM said the ability to offer products that manage and secure devices and access points in data centers will be an important driver of growth in 2010. ®

New hybrid storage solutions

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.