Veritas gives utility computing a boost

Veritas Software is to buy a small supplier of application virtualisation technology to boost its utility computing product line.

Veritas Software is to buy a small supplier of application virtualisation technology to boost its utility computing product line.

Veritas will pay $59m in cash to acquire Ejasent in a deal due to be completed this month.

Ejasent's core product, called UpScale, allows IT managers move applications from one server to another without disrupting or terminating their use. UpScale takes snapshots of applications to preserve all settings and data and then transfers them to new servers in near real time.

Veritas will, initially, sell UpScale as a point product, but by 2005 it expects to integrate the software with its ClusterServer application, which supports system clustering.

Bob Maness, senior director of worldwide product marketing at Veritas, said the next move will be to hook all of the company's recent software acquisitions into its existing portfolio of server and storage management products.

Veritas last year acquired Precise Software Solutions, a supplier of application performance management software, and in late 2002 it bought server provisioning tools developer Jareva Technologies.

Vernon Turner, an analyst at market research firm IDC, said the Ejasent acquisition puts Veritas into competition with other server virtualisation suppliers. But he added that if Veritas does not move more quickly to integrate the products it has bought into its existing suite of software, "they'll lose the market momentum they may have had with these acquisitions". 

Lucas Mearian writes for Computerworld

CW+

Features

Enjoy the benefits of CW+ membership, learn more and join.

Read more on IT suppliers

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCIO

SearchSecurity

  • Dissecting the Hack

    In this excerpt from chapter three of Dissecting the Hack: The V3RB0TEN Network, authors Jayson E. Street, Kristin Sims and Brian...

  • Digital Identity Management

    In this excerpt of Digital Identity Management, authors Maryline Laurent and Samia Bousefrane discuss principles of biometrics ...

  • Becoming a Global Chief Security Executive Officer

    In this excerpt of Becoming a Global Chief Security Executive Officer: A How to Guide for Next Generation Security Leaders, ...

SearchNetworking

SearchDataCenter

SearchDataManagement

Close