Feeds

Marathon reels in another $6.5m

How to tackle Microsoft, VMware

Combat fraud and increase customer satisfaction

Fault tolerant and high availability clustering software maker Marathon Technologies has received the second part of a $13.5m round of equity funding that the company lined up late last year.

According to documents filed with the Securities and Exchange Commission, Marathon has sold $13.5m in equity in total, but the company did not disclose who kicked in the money or how much came in during this round. The Boston Business Journal reports that $6.5m came in during this second traunche of funding from ten investors, with $7m coming in last August from unnamed investors.

Of its many investors, Atlas Venture, Sierra Ventures, and Longworth Venture Partners have kicked in dough to the company. Since it emerged from bankruptcy in 2003, Marathon has raised $27.8m and has completely revamped its product line.

Last September, after getting the first traunche of cash, Marathon tapped Jim Welch to be its chief executive officer. Welch was vice president of product operations at data integration software maker Ascential Software (which was spun out of database maker Informix) when IBM shelled out $1.1bn to acquire it in March 2005. (IBM had bought the database half of Informix back in 2001 for $1bn). Both bits of software have played key roles in the development of the InfoSphere data warehouse software business, which has grown to about $600m a year according to a statement put out by Marathon upon Welch's appointment.

Marathon currently has more than 2,500 customers using its everRun clustering and fault tolerance software for physical and virtual servers. Marathon is based in Littleton, Massachusetts. It was formed in 1993 by a group of fault tolerant computing engineers from the former Digital Equipment Corp who worked on that company's VAXft fault tolerant server line.

The company started out doing hardware-based fault tolerant clustering and then moved on to use more flexible software-based techniques, embodied in the everRun products, to accomplish the same levels of high availability that used to require hardware lockstepping.

What Marathon has not done, and perhaps should do, is expand beyond supporting the clustering of Windows with everRun 2G and fault tolerance with the everRun HA and FT products solely based on the XenServer hypervisor. Microsoft's Hyper-V and VMware's ESX Server have larger market share on X64 servers. But there are two issues with going more broadly: Marathon has failover products that compete with those from Microsoft and VMware, and the hypervisors from Microsoft and VMware are closed source, which means Marathon needs their help to support them with its everRun suite.

In a separate announcement, Marathon has partnered with NEC Phillips Unified Solutions to integrate its everRun tools with the server-based communications systems created and sold by the NEC-Phillips partnership in Europe. NEC, you will remember, shuttered its PC business in Europe last February and said it would farm out production of its servers for EMEA. But it still sells servers and various turnkey products in Europe. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Microsoft's Nadella: SQL Server 2014 means we're all about data
Adds new big data tools in quest for 'ambient intelligence'
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.