Newsletters
The Enterprise Security Supersite NewsFactor Sites:       NewsFactor.com     Enterprise Security Today     CRM Daily     Business Report     Sci-Tech Today  
   
This ad will display for the next 20 seconds. Click for more information, or
Home Network Security Viruses & Malware Cybercrime Security Solutions More Topics...
Applications
Tame your scariest paperwork. Find Out How
Average Rating:
Rate this article:  
HP Will Buy ArcSight To Move Beyond Perimeter Security
HP Will Buy ArcSight To Move Beyond Perimeter Security

By Jennifer LeClaire
September 13, 2010 1:55PM

Bookmark and Share
Hewlett-Packard plans to increase its security focus by purchasing security and compliance firm ArcSight for $1.5 billion. HP sees a need for better tools as enterprises give employees, partners and customers more access to data. ArcSight CEO Tom Reilly sees the deal as creating an integrated security platform for HP to address security risks.
 


On the heels of Intel's acquisition of McAfee, Hewlett-Packard has announced plans to acquire another security industry player. HP will pay $1.5 billion, or $43.50 per share, in an all-cash deal for security and compliance firm ArcSight.

This is HP's second security-related acquisition in as many months. In August, HP acquired security assurance company Fortify Software. HP is betting its latest in a string of acquisitions will beef up security, lower the risk, and streamline compliance at a lower cost for its customers. That's a tall promise, but one that HP may be getting closer to with the ArcSight buy.

"From a security perspective, the perimeter of today's enterprise is porous, putting enormous pressure on clients' risk and compliance systems," said Bill Veghte, executive vice president of HP's Software and Solutions business. "The combination of HP and ArcSight will provide clients with the ability to fortify their applications, proactively monitor events, and respond to threats."

Beyond Perimeter Security

As HP sees it, enterprises are facing a challenge that its combined security portfolio can solve: Companies need to give employees, partners and customers more access to applications, services and information amid escalating threats and ever-growing complexity and regulatory challenges.

HP said adding ArcSight to its portfolio gives clients a 360-degree view of IT operations, broader security and compliance tools, the ability to detect threats and risks by correlating both activity and state changes in real time, and a feedback loop between build, manage and monitor to ensure that enterprises remain secure.

Tom Reilly, president and CEO of ArcSight, went so far as to say the acquisition will create a new type of security solution for the modern enterprise. The result of the merger, in his view, is an integrated security platform that goes beyond identifying risks to remediating them. "In a world where perimeter security is no longer enough," he said, "businesses need this holistic approach to securing their networks, applications and sensitive data."

Seeking Differentiation

Charles King, principal analyst at Pund-IT, said HP's latest acquisition indicates the growing importance that most vendors are putting on security, and specifically delivering integrated security. Unlike IBM and Oracle, HP does not have proprietary security platforms that were developed in-house, and appears to be hedging against that disadvantage with its recent security acquisitions.

"As we move forward toward a future where IT hardware is more and more commodity-based -- and I think the industry is headed there over the long term -- the question becomes this: If everybody is building their servers out of the same basic components, how do you differentiate the value add and the competitive advantage that your products offer?" King asked.

"I think we are seeing a rush toward proprietary security features that can be tailored toward HP customers with this deal," he said. "I suspect we will see more security acquisitions by other firms and, over time, other sorts of enhancements that will either be developed in-house or purchased in future acquisition-buying sprees."
 

Tell Us What You Think
Comment:

Name:

Al Hilwa, IDC:

Posted: 2010-09-13 @ 5:03pm PT
The fact that these acquisitions are happening after Mark Hurd left might suggest that he had not been in favor of such expansive acquisitions, but more likely it is a just a matter of timing as such acquisitions take time to brew, and so likely the discussions started prior to his departure.

We are in a very acquisitive and highly consolidative era right now in the industry, for various reasons. Aside from technical reasons such as valuations and opportunity costs, as the number of big technology firms consolidate, the battle for what is left heats up and they begin to see each other as competitors even though they are not directly playing in each other’s business.

It is all about envisioning what the market will look like in a few years, which has become harder, because of the multiple disruptive forces at play, such as the explosion of cloud and mobility.

One scenario I see is that Oracle is likely to embark on an a second wave of large acquisitions under Mark’s leadership, potentially oriented at taking it to completely different places, perhaps even following a more diversified portfolio similar to IBM and HP.

We will probably get more insight on that from the body language or indeed what Larry Ellison might say at Oracle Open World.

Al Hilwa
Program Director
Applications Development Software
IDC – Seattle



Salesforce.com is the market and technology leader in Software-as-a-Service. Its award-winning CRM solution helps 82,400 customers worldwide manage and share business information over the Internet. Experience CRM success. Click here for a FREE 30-day trial.


 Applications
1.   Salesforce App Personalizes the Sale
2.   Will Next OS X Bring New Apple Grief?
3.   Sprint Becomes Google Apps Reseller
4.   Target App Makes Shopping a Snap
5.   Cisco Woos More Devs with DevNet


advertisement
Salesforce App Personalizes the Sale
New CRM and sales automation tools.
Average Rating:
Cisco Woos More Devs with DevNet
To create new network-aware apps.
Average Rating:
Mobile Apps Offer Last-Minute Deals
Along with spontaneity and surprise.
Average Rating:
Product Information and Resources for Technology You Can Use To Boost Your Business

Network Security Spotlight
Canadian Government Charges China With Cyberattack
The government of Canada is not happy with China. Canadian officials have accused "a highly sophisticated Chinese state-sponsored actor" of launching a cyberattack on its National Research Council.
 
Researchers Working To Fix Tor Security Exploit
Developers for the Tor privacy browser are scrambling to fix a bug revealed Monday that researchers say could allow hackers, or government surveillance agencies, to track users online.
 
Wall Street Journal Hacked Again
Hacked again. That’s the story at the Wall Street Journal this week as the newspaper reports that the computer systems housing some of its news graphics were breached. Customers not affected -- yet.
 

Enterprise Hardware Spotlight
Apple Updates MacBook Pros, Cuts Prices Up to $100
The popular MacBook Pro laptop line just got an update and a price cut of as much as $100. The MacBook Pro with Retina display now includes faster processors and double the memory.
 
Watson Gets His First Customer Service Gig
Since appearing on Jeopardy, IBM's Watson supercomputer has been making a living using his super-intelligent knowledge base for business verticals. Now, Watson's been hired for his first customer service job.
 
Tablet Giants Apple and Samsung Feel the Heat
When a company saturates its home market with a once-hot product, expect it to pump up efforts elsewhere. Apple, for its part, is now pushing iPads to big corporations and the enterprise market.
 

Mobile Technology Spotlight
Android 'Fake ID' Puts Millions of Users at Risk
Having this fake ID is nothing to brag about, even if you are a minor. The “Fake ID” Android flaw drops malware into smartphone apps. It can steal credit card data and even take over your device.
 
FTC Wants Fix for 'Perfect Scam' of Mobile Cramming
The U.S. Federal Trade Commission has issued new guidelines to curb “mobile cramming,” a troublesome practice that adds unauthorized third-party charges to mobile phone bills.
 
Facebook: You Will Use Messenger, and You Will Like It
Starting this week, Facebook users with Android and iOS phones will be forced to use the separate Messenger app to send Facebook messages. Pending messages will still be visible in the main app.
 

Navigation
Enterprise Security Today
Home/Top News | Network Security | Viruses & Malware | Cybercrime | Security Solutions | Mobile Security | Disaster Recovery | Windows Security
Data Security | EST Press Releases
NewsFactor Network Enterprise I.T. Sites
NewsFactor Technology News | Enterprise Security Today | CRM Daily

NewsFactor Business and Innovation Sites
Sci-Tech Today | NewsFactor Business Report

NewsFactor Services
FreeNewsFeed | Free Newsletters

About NewsFactor Network | How To Contact Us | Article Reprints | Careers @ NewsFactor | Services for PR Pros | Top Tech Wire | How To Advertise

Privacy Policy | Terms of Service
© Copyright 2000-2014 NewsFactor Network. All rights reserved. Article rating technology by Blogowogo. Member of Accuserve Ad Network.