Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Application Security

7/16/2018
08:05 AM
Larry Loeb
Larry Loeb
Larry Loeb
50%
50%

Broadcom's Deal for CA Puts Big Iron in the Spotlight

With Broadcom buying CA for $18.9 billion, old-time big iron is suddenly cool again. Here's what it means for security and software development.

Last week, chipmaker Broadcom has announced it made an all-cash, $18.9 billion bid for CA Technologies -- formerly Computer Associates -- a leader in mainframe-style computing.

Broadcom has an interesting history.

It recently made a bid for Qualcomm before it was stopped over concerns about the patents that Qualcomm holds passing out of US jurisdiction. Broadcom was based in Singapore before it moved its headquarters to the US as a way of appeasing federal regulators about Qualcomm. (See Trump Cites National Security to Kill Broadcom's Proposal for Qualcomm.)

While it makes chips for WiFi, Bluetooth, and GPS connectivity in smartphones, Broadcom has made a bigger impact by its purchases of established players with leading products in a field. Massive cost-cutting usually happens to the acquisitions that it makes, along with the divestiture of product lines that are less profitable than corporate targets.

In the last 12 years, Broadcom has spent $50 billion in such acquisitions. It has become more of a financial engine than an innovation engine.

CA is widely known for its presence in the corporate IT infrastructure field. It has products that enable IT operations, digital security, project management, as well as for developing applications. Its software runs on "big iron" mainframe computers, not on smartphones or smaller devices.

This has led to lots of confusion about how such a product mix would fit into Broadcom's portfolio. (See Unknown Document 744615.)

Most companies make acquisitions in some area that allows them to improve what they're already good at. There might also be access to new markets for their existing products. Neither of those come to mind with Broadcom's bid.

CA is software, Broadcom is hardware.

What the deal actually does is move Broadcom into profitable software. Enterprise tools are fairly sticky -- once they are installed they tend to stick around. It also gives them a major lock on the enterprise IT tool market. This is the boring, put profitable stuff that keeps a business running.

Not only that, software is far less cyclical than semiconductors and can provide a high-margin recurring revenue.

As CA put it in its announcement: "The majority of CA's largest customers transact with CA across both its Mainframe and Enterprise Solutions portfolios. CA benefits from predictable and recurring revenues with the average duration of bookings exceeding three years."


Boost your understanding of new cybersecurity approaches at Light Reading's Automating Seamless Security event on October 17 in Chicago! Service providers and enterprise receive FREE passes. All others can save 20% off passes using the code LR20 today!

And it seems that Broadcom learned from its Qualcomm experience as well. CA and Broadcom do not overlap in what they do, hence regulators will be much more inclined to let what results from the bid alone.

But the CA announcement also mentioned something that may indeed concern regulators: its patents. The announcement noted that "CA … currently holds more than 1,500 patents worldwide, with more than 950 patents pending."

What is represented by those patents remains to be seen.

Broadcom, however, now seems to want to avoid the flux of the chip market by taking a major part of profitable mainframe computing into itself.

Related posts:

— Larry Loeb has written for many of the last century's major "dead tree" computer magazines, having been, among other things, a consulting editor for BYTE magazine and senior editor for the launch of WebWeek.

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
COVID-19: Latest Security News & Commentary
Dark Reading Staff 8/10/2020
Researcher Finds New Office Macro Attacks for MacOS
Curtis Franklin Jr., Senior Editor at Dark Reading,  8/7/2020
Hacking It as a CISO: Advice for Security Leadership
Kelly Sheridan, Staff Editor, Dark Reading,  8/10/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Special Report: Computing's New Normal, a Dark Reading Perspective
This special report examines how IT security organizations have adapted to the "new normal" of computing and what the long-term effects will be. Read it and get a unique set of perspectives on issues ranging from new threats & vulnerabilities as a result of remote working to how enterprise security strategy will be affected long term.
Flash Poll
The Changing Face of Threat Intelligence
The Changing Face of Threat Intelligence
This special report takes a look at how enterprises are using threat intelligence, as well as emerging best practices for integrating threat intel into security operations and incident response. Download it today!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-8720
PUBLISHED: 2020-08-13
Buffer overflow in a subsystem for some Intel(R) Server Boards, Server Systems and Compute Modules before version 1.59 may allow a privileged user to potentially enable denial of service via local access.
CVE-2020-12300
PUBLISHED: 2020-08-13
Uninitialized pointer in BIOS firmware for Intel(R) Server Board Families S2600CW, S2600KP, S2600TP, and S2600WT may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-12301
PUBLISHED: 2020-08-13
Improper initialization in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2020-7307
PUBLISHED: 2020-08-13
Unprotected Storage of Credentials vulnerability in McAfee Data Loss Prevention (DLP) for Mac prior to 11.5.2 allows local users to gain access to the RiskDB username and password via unprotected log files containing plain text credentials.
CVE-2020-8679
PUBLISHED: 2020-08-13
Out-of-bounds write in Kernel Mode Driver for some Intel(R) Graphics Drivers before version 26.20.100.7755 may allow an authenticated user to potentially enable denial of service via local access.