Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats //

Insider Threats

Dell To Acquire 3PAR For $1.15 Billion

EMC's status as Dell's longtime storage partner is unclear, but adding 3PAR's high-end data storage offering may boost the PC maker's moves into IT services and cloud computing.

Image Gallery: 8 Online Storage Solutions
(click for larger image and for full photo gallery)
Moving deeper into IT services and cloud computing, Dell Inc. said Monday that it plans to buy 3PAR Inc., a high end data storage company, for $1.15 billion.

Best known for sales of PCs to enterprises and consumers, Dell has been muscling its way into IT services since it acquired Perot Systems for $3.9 billion last year. The 3PAR deal follows Dell's 2007 $1.4 billion acquisition of EqualLogic, which gave Dell a solid storage base, but on a lower end than 3PAR's.

Dell is betting that 3PAR's thin provisioning approach, which treats storage as a utility, will result in a big payoff for the firm and its customers. The combination of thin provisioning and virtualization, Dell indicated, can overcome the limitations of traditional modular and monolithic arrays.

"3PAR addresses the problem of costly, complex, and rigid IT environments and enables organizations to treat storage as a utility," said Dell in a release, adding that customers need to pay only for "the capacity and performance they need, and only when they use it."

3PAR's technology utilizes a multi-tenant clustered storage architecture, which helps IT organizations build virtualized infrastructures. 3PAR has long maintained that its thin provisioning approach enables customers to better predict performance as they face storage capacity requirements that always seem to be increasing.

It was not immediately clear what impact, if any, the deal with 3PAR will have on Dell's longtime partnership with EMC on storage, which represents about 25% of Dell's total storage business, according to industry research estimates. Dell said it plans to integrate 3PAR into its storage portfolio including its Dell/EMC products. Dell added: "With 3PAR. Dell will offer innovative systems and customer choice at every storage tier, from direct-attach to highly-virtualized clustered SANS."

Dell said it believes a 3PAR acquisition will help Dell reduce data management costs dramatically, creating additional space in customer budgets for other strategic investments.

"We have aligned our storage offerings over the last several years to provide our customers choice and value," said Dell's Brad Anderson, senior vice president of Dell's enterprise product group, in a statement. "3PAR brings the same values of performance, agility and ease-of-use to higher end, virtualized storage deployments as EqualLogic does for the entry-level an mid-range, rounding out our industry-leading solutions portfolio."

3PAR's chief executive David Scott said the acquisition is a good fit, because his firm's storage solutions will complement Dell's distribution network.

Dell paid dearly for 3PAR, offering $18 a share for the firm, whose stock was last traded at $9.65 a share on Friday. The purchase price represents an 87% premium. The firms said they expect the acquisition will be completed by the end of the year.

In explaining 3PAR's value to boost Dell's cloud computing offerings, Dell said the storage firm's acquisition will help Dell achieve its goal of reducing customer data management costs by 50%. 3PAR has valuable virtualization solutions that should help Dell's customers trim power and energy costs as they adopt cloud computing more aggressively.

The acquisition will help Dell as it competes more aggressively with Cisco, EMC, HP and IBM, all of which have strong positions in IT services and cloud computing.

-- Dell Offers Exchange 2010 Services

-- Dell Streak Carves Niche Between Tablet And Smartphone

-- Dell Dives Deeper Into Data Center

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Deliver a Deadly Counterpunch to Ransomware Attacks: 4 Steps
Mathew Newfield, Chief Information Security Officer at Unisys,  12/10/2019
Intel's CPU Flaws Continue to Create Problems for the Tech Community
Irfan Ahmed, Assistant Professor in the Department of Computer Science at Virginia Commonwealth University,  12/10/2019
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Our Endpoint Protection system is a little outdated... 
Current Issue
The Year in Security: 2019
This Tech Digest provides a wrap up and overview of the year's top cybersecurity news stories. It was a year of new twists on old threats, with fears of another WannaCry-type worm and of a possible botnet army of Wi-Fi routers. But 2019 also underscored the risk of firmware and trusted security tools harboring dangerous holes that cybercriminals and nation-state hackers could readily abuse. Read more.
Flash Poll
The State of Ransomware
The State of Ransomware
Ransomware has become one of the most prevalent new cybersecurity threats faced by today's enterprises. This new report from Dark Reading includes feedback from IT and IT security professionals about their organization's ransomware experiences, defense plans, and malware challenges. Find out what they had to say!
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2019-12-12
minerstat msOS before 2019-10-23 does not have a unique SSH key for each instance of the product.
PUBLISHED: 2019-12-12
IBM DB2 High Performance Unload load for LUW 6.1 and 6.5 could allow a local attacker to execute arbitrary code on the system, caused by an untrusted search path vulnerability. By using a executable file, an attacker could exploit this vulnerability to execute arbitrary code on the system. IBM X-For...
PUBLISHED: 2019-12-12
Intesync Solismed 3.3sp1 allows Local File Inclusion (LFI), a different vulnerability than CVE-2019-15931. This leads to unauthenticated code execution.
PUBLISHED: 2019-12-12
Cacti through 1.2.7 is affected by multiple instances of lib/functions.php unsafe deserialization of user-controlled data to populate arrays. An authenticated attacker could use this to influence object data values and control actions taken by Cacti or potentially cause memory corruption in the PHP ...
PUBLISHED: 2019-12-12
An issue was discovered in Intesync Solismed 3.3sp1. An flaw in the encryption implementation exists, allowing for all encrypted data stored within the database to be decrypted.