Feeds

Telstra Borgs O2 networks for hit of services oxygen

Melbourne-based prey to retain brand, staff

Seven Steps to Software Security

Melbourne-based O2 Networks is the lucky recipient of a bag of cash from Telstra, which has paid $AU60 million for the business.

O2 company has 370 customers and 100 staff, and according to Telstra “has designed, implemented and managed networks for clients including some of Australia’s largest financial institutions and government owned enterprises”.

Telstra describes the acquisition as being part of its strategy to expand its network services business, and is driven by customers' shift to the cloud, resulting in demand for “capabilities to securely integrate networks, data centres, and cloud-based applications”.

It follows the purchase late last year of NSC, which brought a major provider of unified communications systems into Telstra's warm and wealthy embrace.

Telstra says all staff will be retained, and the O2 brand will survive for the time being.

The carrier's media release quotes Telstra's Network Applications and Services executive director Michelle Bendschneider as saying “O2 have a reputation for deep-domain expertise and speed to market with emerging technologies including wireless network integration and next generation security threat detection and mitigation solutions”.

Right now, the biggest ticket customer in the Telstra Network Applications and Services business is the Department of Defence, under a $1.1 billion six-year deal.

Telstra, Australia's dominant carrier, is widely held to be targeting businesses like O2 and NSC in order to replace revenue from its declining PSTN businesses. Along the way it is moving increasingly towards enterprise IT, a shift that will doubtless leave other players in that field feeling a little nervous. ®

Boost IT visibility and business value

More from The Register

next story
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.