Market Roundup Symantec Secures Altiris for $830 Million |
|
At long last, with great fanfare, Microsoft has launched the consumer version of Vista. Where does one begin? Hundreds of pages have already been dedicated to the analysis of this new operating system. Some users have been working with various builds of this product for years. Microsoft speaks proudly of the thousands of staff who have contributed to the making of this operating system, which Microsoft claims is its most significant OS thus far. Hyperbole aside, Microsoft has worked hard to make a product that is more secure, easier to use, capable of doing more, and changing how many of us use our computers on a daily basis. Power users and Windows lovers around the world rushed to get their copies so they could install and see for themselves what the product is and how it works on their systems. Understandably corporate users (who received their launch in late 2006) were less excited at their launch, but the millions of small businesses and consumers around the world really are the lifeblood of Windows, and pleasing them is one of Microsoft’s primary missions.
Of course the issue is not whether or not to adopt Vista. Most of us will eventually upgrade or we’ll purchase a new PC with the OS pre-installed. The real issue is one of timing; that is, when will we take the plunge? Microsoft of course would like you to start now, or in the very near future. However, most of us aren’t quite ready. Some are worried about performance and compatibility. Microsoft claims that the majority of drivers and applications should be ready now. There is even a tool, the Windows Vista Upgrade Advisor, that you can download to see how ready your system really is. Most people will do a double boot of XP and Vista, so if there are any problems they can use the other OS, so that should ease some fears. The interfaces look different, but many of them can be tweaked to recreate familiarity and features can be turned on or off at the individual’s own pace. Some fear security issues. Microsoft claims that this is the most secure operating system it has ever built. And while we believe that the Redmond crew has learned many lessons about OS security in the Internet era, this is a new product, and acknowledgement of security is earned through testing and proof. The real measure of the security of this OS will come with the passage of time. The good news is that in the course of its lifecycle, it should never be more vulnerable than it is at launch: all future changes will be improvements and it is certainly true that Microsoft has really kept security at the forefront of its intentions.
Another concern users have is DRM and technical capabilities
Microsoft has instituted concerning playback of high-density media. Not many
are actually using HD technology on the desktop yet, but until there is a
better understanding of how Microsoft’s measures affect real-world user
experiences, some people will be unwilling to upgrade to Vista. Microsoft has
described
In the end, Vista is a complicated product. It serves many functions, some new and some improved. It does some things brilliantly—genuinely living up to Microsoft’s proclaimed Wow—but we’ll quickly find the permutations and combinations that result in a very different sort of wow and much cursing of software vendors and their kin. While Microsoft will encourage us all to upgrade sooner rather than later—and eventually it will be in our best interest to do so—each customer is going to have to do the work of figuring out when is appropriate for them. This is certainly not the worst product Microsoft has ever released despite what some disillusioned users argue, and while it may be the best they’ve done so far, it will continue to be improved upon. We encourage users to explore, have fun, but relax. Resist both the hype and the warnings of certain doom.
Symantec Secures Altiris for $830 Million
This week Symantec Corporation announced that it has reached a definitive agreement to acquire Altiris Inc. The acquisition, which is subject to all of the usual closing conditions, is expected to close in the second calendar quarter of this year with Symantec paying $33 in cash for each share of Altiris common stock, thereby valuing Altiris at approximately $830 million, net-of-cash-acquired.
When this acquisition closes Symantec will be a remarkably different organization to that of only two years ago. During this time, Symantec has built on the original security technologies for which it has been very well known for many years to build and acquire a very broad range of solutions designed to assist businesses to secure and protect their endpoints. The addition of the Altiris solutions holds the potential to nicely complement the existing security, compliance, and—courtesy of the earlier acquisition of VERITAS—backup and recovery solutions for most computing and storage platforms.
Altiris will add different and valuable capabilities to the portfolio. The core discovery, asset management, and device configuration solutions supplied by Altiris help companies manage their endpoints effectively and to administer the configuration of those assets in line with business requirements. Symantec's existing security, compliance, and storage management solutions operate well, but to be effective the organization must ensure that all of its IT assets are properly configured and secured; the technologies delivered by Altiris supply the required capabilities to address this fundamental matter.
Like the VERITAS acquisition before it, the purchase of Altiris by Symantec holds great potential. However, to release this potential Symantec will need to address several key issues. Asset Management and end-point configuration management solutions, for all of their undoubted ability to help organizations operate IT assets efficiently and cost-effectively, are notoriously complex to sell. Symantec and its channel partners will need to expend considerable time and effort understanding the many values that Asset Management and configuration management tools can deliver. If the acquisition of Altiris is to succeed the underlying nature of Symantec as an organization will need to change, taking on much more of an “enterprise systems management” flavor than it has heretofore enjoyed. It will also place Symantec more firmly as a genuine competitor in the systems management marketplace, a testing environment. There is clear potential here; we shall watch with interest to see how Symantec takes its new portfolio to market and to note how the other players respond.
Optimal Security: A Mix of Hardware and Software
Mistletoe Technologies, Inc., developer of a complete security system-on-a-chip (SoC) featuring VPN, firewall, and denial-of-service prevention applications in silicon, announced an agreement with Kaspersky Lab, a developer of secure content management solutions headquartered in Moscow, Russia. The collaboration is part of Mistletoe Technologies’ ongoing effort to integrate best-in-class software that will enable system manufacturers to increase unified threat management (UTM) performance and network security, while reducing system development time and expense. Combining various features such as antivirus, URL filtering, and anti-spam, UTM products can provide a holistic and economical approach to security that may be well suited for SMBs. Mistletoe Technologies appears to be the first security silicon architecture to enable UTM features without sacrificing VPN and firewall performance. Historically, with general purpose processors, security system performance was sacrificed to accommodate UTM features; this served as a deterrent to end users seeking to fully or reliably activate these features.
Kaspersky Lab's antivirus technology combines reactive, signature-based antivirus defense methods with proactive technologies to provide protection against viruses, spyware, crimeware, and other malware. Used in conjunction with Mistletoe Technologies’ reference designs, this combination will likely provide improved services, support, and simplified network setup and management.
Security professionals have found that security needs to be built into the IT infrastructure in order to provide optimal protection with minimal negative impact on throughput. Security products that are in the direct data stream often come in for the closest scrutiny, and while this week is Vista’s launch with the attendant press and analyst coverage, Sageza believes that progress in integrating hardware and software to provide complementary, multi-function security is worthy of recognition.
IT management of large organizations has often preferred a
hardware platform over software especially in locations where there is a lack
of technical support personnel. SMBs tend to seek the most cost-effective
solution. We believe that the marriage of hardware and software for security
purposes is one that could be very beneficial for users. However, it can be a
long journey from design to successful implementation with a low
American Power Conversion (
As we have stated before, we believe one of the hot topics
of 2007 will be cooling in the data center. This latest announcement from
Through the use InfraStruXure InRow RP, organizations are afforded the flexibility of being able to place equipment in the available space knowing that the cooling can be brought alongside. However, perhaps even more important is the availability of InfraStruXure Designer tool that can help the organization identify cooling issues prior to the deployment of new equipment. By being to able consider the management of cooling, i.e., the power-in and power-out profile of the datacenter and the resulting heat concentration and dissipation needs, organizations can know in advance whether a proposed footprint will be viable given the cooling infrastructure. This is much better than the historic guesstimate approach that ultimately falls back on cranking down the data center thermostat to compensate for reality while handily emptying the data center power budget.
Increased efficiency in any operation is a relatively simple
way to improve the bottom line and forestall the need for capital investment.
By closely aligning power consumption, heat generation, cooling, and physical
space inside the data center, organizations can not only save ongoing costs but
also recoup more of an existing investment. We are pleased to see that