Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb

Broadcom's Deal for CA Puts Big Iron in the Spotlight

With Broadcom buying CA for $18.9 billion, old-time big iron is suddenly cool again. Here's what it means for security and software development.

Last week, chipmaker Broadcom has announced it made an all-cash, $18.9 billion bid for CA Technologies -- formerly Computer Associates -- a leader in mainframe-style computing.

Broadcom has an interesting history.

It recently made a bid for Qualcomm before it was stopped over concerns about the patents that Qualcomm holds passing out of US jurisdiction. Broadcom was based in Singapore before it moved its headquarters to the US as a way of appeasing federal regulators about Qualcomm. (See Trump Cites National Security to Kill Broadcom's Proposal for Qualcomm.)

While it makes chips for WiFi, Bluetooth, and GPS connectivity in smartphones, Broadcom has made a bigger impact by its purchases of established players with leading products in a field. Massive cost-cutting usually happens to the acquisitions that it makes, along with the divestiture of product lines that are less profitable than corporate targets.

The good old days\r\n(Source: Wikipedia)\r\n
The good old days
\r\n(Source: Wikipedia)\r\n

In the last 12 years, Broadcom has spent $50 billion in such acquisitions. It has become more of a financial engine than an innovation engine.

CA is widely known for its presence in the corporate IT infrastructure field. It has products that enable IT operations, digital security, project management, as well as for developing applications. Its software runs on "big iron" mainframe computers, not on smartphones or smaller devices.

This has led to lots of confusion about how such a product mix would fit into Broadcom's portfolio. (See Unknown Document 744615.)

Most companies make acquisitions in some area that allows them to improve what they're already good at. There might also be access to new markets for their existing products. Neither of those come to mind with Broadcom's bid.

CA is software, Broadcom is hardware.

What the deal actually does is move Broadcom into profitable software. Enterprise tools are fairly sticky -- once they are installed they tend to stick around. It also gives them a major lock on the enterprise IT tool market. This is the boring, put profitable stuff that keeps a business running.

Not only that, software is far less cyclical than semiconductors and can provide a high-margin recurring revenue.

As CA put it in its announcement: "The majority of CA's largest customers transact with CA across both its Mainframe and Enterprise Solutions portfolios. CA benefits from predictable and recurring revenues with the average duration of bookings exceeding three years."

Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

And it seems that Broadcom learned from its Qualcomm experience as well. CA and Broadcom do not overlap in what they do, hence regulators will be much more inclined to let what results from the bid alone.

But the CA announcement also mentioned something that may indeed concern regulators: its patents. The announcement noted that "CA … currently holds more than 1,500 patents worldwide, with more than 950 patents pending."

What is represented by those patents remains to be seen.

Broadcom, however, now seems to want to avoid the flux of the chip market by taking a major part of profitable mainframe computing into itself.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-07-30
app/View/Elements/GalaxyClusters/view_relation_tree.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster relationships.
PUBLISHED: 2021-07-30
app/View/GalaxyElements/ajax/index.ctp in MISP 2.4.147 allows Stored XSS when viewing galaxy cluster elements in JSON format.
PUBLISHED: 2021-07-30
textview_uri_security_check in textview.c in Claws Mail before 3.18.0, and Sylpheed through 3.7.0, does not have sufficient link checks before accepting a click.
PUBLISHED: 2021-07-30
ObjectPlanet Opinio before 7.13 allows reflected XSS via the survey/admin/surveyAdmin.do?action=viewSurveyAdmin query string. (There is also stored XSS if input to survey/admin/*.do is accepted from untrusted users.)
PUBLISHED: 2021-07-30
Meow hash 0.5/calico does not sufficiently thwart key recovery by an attacker who can query whether there's a collision in the bottom bits of the hashes of two messages, as demonstrated by an attack against a long-running web service that allows the attacker to infer collisions by measuring timing d...