IBM buys bolster security, content management offerings
Company closes acquisition, plans for ISS
IDG News Service - IBM won stockholder approval of a buyout bid and closed another acquisition deal in two recent developments that will bolster its product and service offerings.
Internet Security Systems Inc. (ISS) will become an IBM subsidiary after shareholders Monday approved a $1.3 billion cash offer. IBM announced on Aug. 23 that it was buying the Atlanta company. ISS' security services aim to protect networks, servers and desktop and laptop PCs by pre-emptively blocking Web threats, such as spam and viruses.
When announcing the potential purchase, IBM said that ISS will become part of IBM Global Technology Services division and that it plans to keep ISS's 1,300 employees.
IBM completed its $1.6 billion bid for FileNet on Thursday, a move that adds to the company's enterprise content management (ECM) portfolio. FileNet's content management and business process applications have been used by 4,300 businesses. Although IBM runs its own ECM division and FileNet's software will be added to that business, the company will support both platforms. FileNet's applications will be integrated with IBM's business process management and SOA (service-oriented architecture) wares, IBM said when it announced the acquisition.
The FileNet buy is IBM's fifth purchase in the SOA market. In August it bought business processes tools developer Webify Solutions for an undisclosed sum and offered $740 million for service management company MRO Software. In 2005, IBM acquired hardware appliance company DataPower in October and portal technology and tools business Bowstreet in December.
- Silicon Valley's 19 Coolest Places to Work
- Is Windows 8 Development Worth the Trouble?
- 8 Books Every IT Leader Should Read This Year
- 10 Hot Hadoop Startups to Watch
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- Radicati: Cloud Business Email - Market Quadrant 2013 Google was named the top cloud business email provider in a recent report by research firm Radicati. Out of 14 key players, Google...
- Tablets in the Enterprise: A Checklist for Successful Deployment How can you enterprise manage and secure tablets in order to protect corporate data while providing access to the information and applications employees...
- Enterprise Mobility: A Checklist for Secure Containerization The advantages and disadvantages of the multiple approaches to containerization. Learn More>>
- Enterprise File Sync & Share Checklist File sync and share has changed the way people work and collaborate in today's tech-savvy world. Gone are the email roadblocks, clunky FTP...
- Live Webcast LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- LIVE EVENT: 5/7, The End of Data Protection As We Know It. Introducing a Next Generation Data Protection Architecture. Traditional backup is going away, but where does this leave end-users?
- On-demand webinar: "Mobility Mayhem: Balancing BYOD with Enterprise Security" Check out this on-demand webinar to hear Sophos senior security expert John Shier deep dive into how BYOD impacts your enterprise security strategy... All Security White Papers | Webcasts