News
8/29/2008
02:31 PM
George Crump
George Crump
Commentary
Connect Directly
RSS
E-Mail
50%
50%

Storage Acquisitions

Brocade's purchase of Foundry Networks seems like a smart move, but technology acquisitions in general and storage acquisitions in specific never seem to pay off well. OK, never is a bit extreme, but it does seem rare and failure here hurts everyone. It distracts the buying company, often ruins the software from the bought company, and leaves users hanging in the balance.

Brocade's purchase of Foundry Networks seems like a smart move, but technology acquisitions in general and storage acquisitions in specific never seem to pay off well. OK, never is a bit extreme, but it does seem rare and failure here hurts everyone. It distracts the buying company, often ruins the software from the bought company, and leaves users hanging in the balance.I think the question as to "why is the acquisition occurring?" is a big factor in determining the success. If it is one of mutual survival, as I believe is the case with Brocade's purchase of Foundry, then I think it makes sense. There are many external factors that make this particular transaction make sense; the convergence of IP and Fibre Channel and the need for Brocade to compete with Cisco in more than only storage are just two. While I would not pronounce the deal a success until we see innovative and integrated solutions, clearly their mutual survival against a common competitor is something to start with.

Another "why" of acquisition that often seems successful is the one done for investment purposes. This is an acquisition that was typically made as an investment in a new technology or company. Here you will see the purchasing company keep the purchased company as a separate entity. EMC and VMware are a textbook example of that and an amazing example, so far, of restraint on EMC's part, although the latest CEO change at VMware has me nervous.

When buyers seem to go off-course is when there is a desire to expand market share for the buying company, essentially leveraging its market share or sales force to sell additional related product. During these purchases you'll hear my favorite term, "We are going to develop tight integration between our products." Most often this never happens and if it does it is a common management GUI of some sort. GUI's are nice, but integration to eliminate redundant resources, or meta-data stores and redundant policy application, is what is needed and is very rarely delivered.

The challenge is that software integration is hard work. Its like trying to build a car out of American and Japanese auto parts -- you are better off starting from scratch. That's one of the reasons that new companies keep showing up. They can start from a clean slate; take advantage of the latest software development tools with no real concern about backward compatibility. The market leaders can choose to do this as well. But there is a decision to be made -- take the time to develop the product in-house and guarantee integration, or purchase the product, be to market with it now, and worry about integration later.

In the end, 1+1 does not often make three, which is the goal of an acquisition -- usually it equals 1.5. I think, however, that the Brocade acquisition has some key ingredients to be successful, but only time will really tell the tale.

Track us on Twitter: http://twitter.com/storageswiss.

Subscribe to our RSS feed.

George Crump is founder of Storage Switzerland, an analyst firm focused on the virtualization and storage marketplaces. It provides strategic consulting and analysis to storage users, suppliers, and integrators. An industry veteran of more than 25 years, Crump has held engineering and sales positions at various IT industry manufacturers and integrators. Prior to Storage Switzerland, he was CTO at one of the nation's largest integrators.

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Threat Intel Today
Threat Intel Today
The 397 respondents to our new survey buy into using intel to stay ahead of attackers: 85% say threat intelligence plays some role in their IT security strategies, and many of them subscribe to two or more third-party feeds; 10% leverage five or more.
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-0640
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote authenticated users to bypass intended restrictions on resource access via unspecified vectors.

CVE-2014-0641
Published: 2014-08-20
Cross-site request forgery (CSRF) vulnerability in EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to hijack the authentication of arbitrary users.

CVE-2014-2505
Published: 2014-08-20
EMC RSA Archer GRC Platform 5.x before 5.5 SP1 allows remote attackers to trigger the download of arbitrary code, and consequently change the product's functionality, via unspecified vectors.

CVE-2014-2511
Published: 2014-08-20
Multiple cross-site scripting (XSS) vulnerabilities in EMC Documentum WebTop before 6.7 SP1 P28 and 6.7 SP2 before P14 allow remote attackers to inject arbitrary web script or HTML via the (1) startat or (2) entryId parameter.

CVE-2014-2515
Published: 2014-08-20
EMC Documentum D2 3.1 before P24, 3.1SP1 before P02, 4.0 before P11, 4.1 before P16, and 4.2 before P05 does not properly restrict tickets provided by D2GetAdminTicketMethod and D2RefreshCacheMethod, which allows remote authenticated users to gain privileges via a request for a superuser ticket.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Three interviews on critical embedded systems and security, recorded at Black Hat 2014 in Las Vegas.