Risk
1/5/2010
05:56 PM
Bob Evans
Bob Evans
Commentary
50%
50%

Global CIO: Hewlett-Packard Recruits Microsoft To Raid Sun's Customers

HP plus Microsoft, Red Hat and Novell are trying to pull leery CIOs away from Sun before the Oracle deal closes.

Talk about a buyer's market! Microsoft has joined forces with Hewlett-Packard as HP accelerates its targeted raids on Sun customers by promising fully configured systems and specialized services with lower TCO. HP's latest offensive also includes Novell and Red Hat and comes just weeks after a Sun counterpunch offered HP customers "no-risk migration assessments" that were sure to lead to—you guessed it—lower TCO.

Conjuring up images of coordinated carnivores cutting one out of a herd of antelopes or wildebeests, HP proclaims its new four-way partnership will "provide customers with service offerings, incentives and training programs that streamline the migration from Sun to HP-based solutions, while reducing total cost of ownership."

Called "HP CompleteCare," the new bundle of integrated sets of expertise will "ensure that customers' data center environments are fully supported" and will include "proof of concept, initial assessments, application migration, implementation, and total life-cycle services."

Global CIO
Global CIOs: A Site Just For You
Visit InformationWeek's Global CIO -- our new online community and information resource for CIOs operating in the global economy.

This latest hunting party is the latest in a series of offensives HP has staged against Sun's installed base this year and that have intensified since Sun agreed in April to be acquired by Oracle. After that proposed acquisition was announced, HP and IBM and Dell stepped up their recruitment of Sun customers by playing on their concerns over how the new owners might change support, services, and pricing.

(To learn more about the efforts of IBM and HP to recruit Sun customers, and about the Oracle-Sun deal, please check out the "Recommended Reading" list at the end of this column.)

After having sand kicked in its face quite openly and aggressively by IBM and HP throughout the summer, Sun early last month stepped up its own counteroffensive against HP by making a slew of promises about what HP customers could look forward to if they'd make the jump to Sun. In a Dec. 1 article called Sun Trying To Snatch HP Customers, we described Sun's efforts to ward off some of the brutal raiding of its customer base in which HP, IBM and Dell were and still are engaged:

Looking to show that turnabout is very fair play, Sun has launched a campaign to snatch customers from HP with a "no-risk migration assessment" aimed at HP enterprise users who "are facing higher support costs, performance and availability issues, and loss of ISV support for critical business applications."

The offer from Sun Professional Services says that Sun's servers, storage solutions, and implementation services will let HP enterprise customers do everything except solve for Pi: "You can reduce complexity and support costs, enhance performance and business agility, improve asset utilization and infrastructure reliability, save money on power, cooling and real-estate and protect your applications, data and business processes."

But for all of that bark, I'm not sure just how much bite is behind the Sun effort to grab customers from HP: a fairly vigorous search of the website for Sun Professional Services failed to turn up any special program for HP enterprise customers, and the only link offered in the press release touting the "Make Your Move" campaign went to a generic registration page. That page made no mention of HP, and only sought contact information from prospects.

But here's the hard truth about Sun:

Previous
1 of 2
Next
Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Register for Dark Reading Newsletters
Dark Reading Live EVENTS
INsecurity - For the Defenders of Enterprise Security
A Dark Reading Conference
While red team conferences focus primarily on new vulnerabilities and security researchers, INsecurity puts security execution, protection, and operations center stage. The primary speakers will be CISOs and leaders in security defense; the blue team will be the focus.
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: No, no, no! Have a Unix CRON do the pop-up reminders!
Current Issue
Security Vulnerabilities: The Next Wave
Just when you thought it was safe, researchers have unveiled a new round of IT security flaws. Is your enterprise ready?
Flash Poll
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
[Strategic Security Report] How Enterprises Are Attacking the IT Security Problem
Enterprises are spending more of their IT budgets on cybersecurity technology. How do your organization's security plans and strategies compare to what others are doing? Here's an in-depth look.
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2017-0290
Published: 2017-05-09
NScript in mpengine in Microsoft Malware Protection Engine with Engine Version before 1.1.13704.0, as used in Windows Defender and other products, allows remote attackers to execute arbitrary code or cause a denial of service (type confusion and application crash) via crafted JavaScript code within ...

CVE-2016-10369
Published: 2017-05-08
unixsocket.c in lxterminal through 0.3.0 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (preventing terminal launch), or possibly have other impact (bypassing terminal access control).

CVE-2016-8202
Published: 2017-05-08
A privilege escalation vulnerability in Brocade Fibre Channel SAN products running Brocade Fabric OS (FOS) releases earlier than v7.4.1d and v8.0.1b could allow an authenticated attacker to elevate the privileges of user accounts accessing the system via command line interface. With affected version...

CVE-2016-8209
Published: 2017-05-08
Improper checks for unusual or exceptional conditions in Brocade NetIron 05.8.00 and later releases up to and including 06.1.00, when the Management Module is continuously scanned on port 22, may allow attackers to cause a denial of service (crash and reload) of the management module.

CVE-2017-0890
Published: 2017-05-08
Nextcloud Server before 11.0.3 is vulnerable to an inadequate escaping leading to a XSS vulnerability in the search module. To be exploitable a user has to write or paste malicious content into the search dialogue.