Dell fills data center technology stack with Force10
IDG News Service - Dell's acquisition of Force10 Networks will fill a critical networking hole as the company buys its way into building an integrated technology stack for data centers, analysts said on Wednesday.
System vendors such as Hewlett-Packard, Cisco and IBM have been rounding out hardware to deliver a more end-to-end data center package, and Dell is moving in that direction, analysts said. Dell offers servers, storage and services, and acquiring Force10 Networks would provide it with networking technology that could help the company offer an integrated hardware stack to automate the deployment of systems in data centers.
Dell has acquired multiple companies to build out more end-to-end products, analysts said. Among the dozens of companies acquired in recent years, the key acquisitions include services company Perot Systems, storage companies EqualLogic and Compellent and security company SecureWorks. The company is already building data centers in multiple countries to host cloud applications and is also opening research centers for cloud reference architectures.
"Dell has clearly said they want to have some intellectual property on the internal side," said Cindy Borovick, research vice president for IDC's enterprise communications and data center networks. "The question is: Do you build versus buy?"
By integrating the hardware stack, Dell wants to automate deployment and configuration of systems in data centers, said Dario Zamarian, vice president and general manager of networking at Dell, during a conference call. Automation will help customers build data centers quicker and reduce manual processes in maintaining data centers.
Dell already offers networking products through its PowerConnect line, and Force10's switches and routers would be complementary, Zamarian said. Force10 also brings product design capabilities and an open operating system that could help Dell improve its networking products.
Dell also offers networking products such as switches from partners like Brocade and Cisco, and there may be product overlap in some cases, Zamarian said. The company will continue its relationship with Brocade though the nature of the relationship may "change in some dimensions," Zamarian said.
One advantage with Force10 is its open architecture, and its FTOS OS used in Force10 products can be easily customized, IDC's Borovick said. Dell can quickly adapt FTOS to deliver prepacked products to customers, who can then further customize the OS depending on their system and network configurations.
Dell will have to maintain a relationship with Brocade for Fibre Channel networking technology, for which Dell doesn't yet have its own intellectual property, Borovick said. Dell may be done acquiring networking companies for now, though it could look into buying application intelligence or security companies to boost the networking portfolio.
Force10 is a relatively small company and had just a 2% share in the data center market in the first half of 2011, behind Cisco, HP, Brocade and Juniper, according to IDC.
- 15 Non-Certified IT Skills Growing in Demand
- How 19 Tech Titans Target Healthcare
- Twitter Suffering From Growing Pains (and Facebook Comparisons)
- Agile Comes to Data Integration
- Slideshow: 7 security mistakes people make with their mobile device
- iOS vs. Android: Which is more secure?
- 11 sure signs you've been hacked
- HP HAVEn: See the big picture in Big Data HP HAVEn is the industry's first comprehensive, scalable, open, and secure platform for Big Data. Enterprises are drowning in a sea of data...
- What Datapipe customers need to know about the new PCI DSS 3.0 compliance standard This handy quick reference outlines what PCI DSS 3.0 is, who needs to be compliant and how Alert Logic solutions address the new...
- The 12 PCI DSS 3.0 requirements addressed by Peer 1 Hosting This handy quick reference outlines the 12 PCI DSS 3.0 requirements, who needs to be compliant and how Alert Logic solutions address the...
- Defense Throughout the Vulnerability Life Cycle This whitepaper provides insight into how to leverage threat and log management technologies to protect your IT assets throughout their vulnerability life cycle.
- Meg Whitman presents Unlocking IT with Big Data During this Web Event you will hear Meg Whitman, President and CEO, HP discuss HAVEn - the #1 Big Data platform, as well...
- The New Way to Work Knowledge Vault This Knowledge Vault focuses on how, in today's increasingly virtual world, it's more important than ever to engage deeply with employees, suppliers, partners,... All IT Outsourcing White Papers | Webcasts