Feeds

Iron Mountain hit by hedge fund attack

Stop digital and international growth

Combat fraud and increase customer satisfaction

Data-vaulting company Iron Mountain has been hit by a hedge fund shareholder attack that accuses management of disastrous forays into digital data storage and international expansion. It should become a real estate-focused company delivering cash to shareholders instead of wasting it on fruitless growth ambitions, says the fund.

Iron Mountain has reported dreadful results in its eDiscovery business with a near £300m goodwill impairment charge and restructuring of the sales force.

Elliot Management is the hedge fund in question. It is run by Paul Singer, and owns almost 5 per cent of Iron Mountain stock. Elliot has sent an open letter strongly criticising Iron Mountain CEO Bob Brennan's strategy of growing the company by expanding its physical paper and tape storage operations overseas, and also by setting up a digital data storage and eDiscovery business. The latter has lost money, Elliot claims, and the former delivers dismal returns.

Elliot wants four new directors on Iron Mountain's board and, through their efforts, a change in the company's strategy such that it maximises the creation of shareholder value by recognising it runs a mature, real estate-focused business. It should become an operator of a REIT (Real Estate Investment Trust) which would provide significantly lower US tax obligations and return profits to shareholders, according to Elliot. As such it could also be run more efficiently, meaning lower costs.

A presentation has been made available on the SEC website explaining Elliot's analysis and the justification for its REIT proposal.

If Elliot gets its way and persuades a majority of shareholders to back its proposals, then Brennan's future as Iron Mountain CEO could be curtailed. The company has said it is evaluating the Elliot proposals. ®

3 Big data security analytics techniques

More from The Register

next story
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Kingston DataTraveler MicroDuo: Turn your phone into a 72GB beast
USB-usiness in the front, micro-USB party in the back
AMD's 'Seattle' 64-bit ARM server chips now sampling, set to launch in late 2014
But they won't appear in SeaMicro Fabric Compute Systems anytime soon
Microsoft's Nadella: SQL Server 2014 means we're all about data
Adds new big data tools in quest for 'ambient intelligence'
BOFH: Oh DO tell us what you think. *CLICK*
$%%&amp Oh dear, we've been cut *CLICK* Well hello *CLICK* You're breaking up...
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.