Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

1/7/2010
10:03 PM
Connect Directly
Twitter
RSS
E-Mail
50%
50%

BMC To Acquire Phurnace

The startup is being picked up for its Java application management knowhow.

BMC Software, the Houston-based supplier of systems management software, is acquiring Phurnace Software, a supplier of assessment tools for automated Java application deployment, for an undisclosed amount.

Phurnace uses a set of red flames as its company symbol, and it's rise has been rapid from its start as a 2006 an entry in a business plan contest at the University of Texas at Austin's McCombs School of Business. The business plan was the brainchild of MBA student Daniel Nelson and economics major Robert Reeves, who became the company founders. Their plan won first place in the contest, according to Austin American Statesman Thursday.

The firm's flagship product is Phurnace Deliver, which assesses whether the configuration of a Java application and its application server are correct for optimal performance.

With applications being the focus of what cloud computing is all about -- that is, moving an application from the data center into the cloud and back again, or from cloud to cloud -- Phurnace's Java application knowhow helps system administrators deploy applications to either a traditional server, a virtual server or a cloud environment.

Phurnace boasts that it is a company of system administrators building products for system administrators. The Phurnace products will add to the BMC's existing change management and system management product lines. BMC is one of the Big Four systems management vendors.

Phurnace previously worked to integrate its products with BMC's BladeLogic systems management product for automated loading of Java applications onto data center blade servers. It also worked closely with another member of the Big Four, Hewlett-Packard, whose Server Automation products (formerly Opsware) do some of the same things that BMC products do. CA's Unicenter and IBM's Tivoli round out the four dominant system management product lines.

On its Web site, Phurnace says it is working on software that will allow customers to move applications from one environment to another or even from one application server to another, such as from Oracle WebLogic to IBM WebSphere or Red Hat JBoss.

Virtualization is a spur to application mobility. It used to be that an application was configured with its application server and deployed once and that determined its settings for life. A more flexible approach is beginning to emerge, as system administrators consider the possibility of deploying applications on virtual servers either in the data center or in the cloud.

Phurnace CEO Larry Warnock was hired in 2007 with 23 years experience as the former chief marketing officer of Vignette and marketing positions at OnLink Technologies, acquired by the former Siebel Systems, and Documentum, acquired by EMC. "We're excited to be acquired by another Texas company, which will rapidly accelerate our growth," Warnock said in the announcement of the acquisition. Phurnace had earlier raised $5 million in venture capital.

Founder Daniel Nelson is VP of products at Phurnace; Robert Reeves is CTO.

The acqusition is BMC's third in six months. In October, it acquired Tideway, a software dependency mapping firm. In August, it bought MQ Software, a supplier of middleware management software in Minneapolis.

Comment  | 
Print  | 
More Insights
Comments
Threaded  |  Newest First  |  Oldest First
Commentary
Ransomware Is Not the Problem
Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
Edge-DRsplash-11-edge-ask-the-experts
How Can I Test the Security of My Home-Office Employees' Routers?
John Bock, Senior Research Scientist,  6/7/2021
News
New Ransomware Group Claiming Connection to REvil Gang Surfaces
Jai Vijayan, Contributing Writer,  6/10/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Google's new See No Evil policy......
Current Issue
The State of Cybersecurity Incident Response
In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-24368
PUBLISHED: 2021-06-20
The Quiz And Survey Master – Best Quiz, Exam and Survey Plugin WordPress plugin before 7.1.18 did not sanitise or escape its result_id parameter when displaying an existing quiz result page, leading to a reflected Cross-Site Scripting issue. This c...
CVE-2021-31664
PUBLISHED: 2021-06-18
RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-33185
PUBLISHED: 2021-06-18
SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
CVE-2021-33186
PUBLISHED: 2021-06-18
SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
CVE-2021-31272
PUBLISHED: 2021-06-18
SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.