Symantec And Veritas CEOs Tout Benefits Of Merging Storage And Security Lines
The CEOs combine efforts to win shareholder backing and reassure wary customers. In an interview with InformationWeek, the executives explain how their product lines will work together to make life easier and safer for users.
Symantec Corp. CEO John Thompson and Veritas Software Corp. CEO Gary Bloom have some convincing to do. Following the December announcement of their plans for a $13.5 billion all-stock merger, the two CEOs must be persuasive on two fronts. First they must convince shareholders, who will vote in the next couple of months, to back the melding of the two companies into one storage and security management giant with estimated annual revenue of $5 billion. Then they need to convince customers of the greater value that lies ahead.
In an exclusive interview with InformationWeek, the duo explained the reasons behind the merger and shed some light on how the combined companies will benefit their customers.
The two CEOs say the combined product lines will help customers reduce security risks while increasing the availability of information. "The risks of losing data and security are creating enormous complexities and costs to the CIO," Bloom says.
The growing regulatory burden to archive massive amounts of E-mail coupled with the never-ending deluge of spam and virus attacks is one of the primary areas in which the two CEOs believe a combined company will be stronger than separate entities.
Customers will be able to turn to Symantec to manage the entire life cycle of their E-mail, from cleansing incoming E-mail of viruses and spam to storing, archiving, and retrieving E-mail. "What two companies are better suited for that?" Thompson says.
The combination of security software and storage applications will help companies move from reactive security technologies to more proactive defenses, Thompson says. He points to Symantec's DeepSight Threat Management System service, a collection of tens of thousands of sensors watching for attacks throughout the Internet, which, when coupled with Veritas' storage-management software, can help bolster customers' security. "When we see a network attack, [a company] can trigger more frequent backups using Veritas software. Or they can [automatically] change the setting on a server to minimize the risk of that attack," he says.
"The alternative will be to buy technologies from four or five vendors," Bloom says, which would include a mix of network/system-management vendors and a handful of startups focused on helping companies meet regulatory compliance.
But network- and system-management vendors, such as IBM's Tivoli unit, Computer Associates, and Hewlett-Packard, have all tried to sell similar multifaceted packages in the past with little success. "The framework vendors went to large customers and said, 'Buy all of this great software for system availability.' We are not making a promise of all or nothing," Thompson says. "We have proactive and reactive technologies that complement each other. And we're confident that if you use the technologies that we provide you can create a more resilient environment."
How Enterprises Are Attacking the IT Security EnterpriseTo learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Infographic: The State of DevOps in 2017Is DevOps helping organizations reduce costs and time-to-market for software releases? What's getting in the way of DevOps adoption? Find out in this InformationWeek and Interop ITX infographic on the state of DevOps in 2017.
IT Strategies to Conquer the CloudChances are your organization is adopting cloud computing in one way or another -- or in multiple ways. Understanding the skills you need and how cloud affects IT operations and networking will help you adapt.