• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • IBM to Bid for Satyam? Rumors All Over the Place

    March 9, 2009 Timothy Prickett Morgan

    Scandal-ridden Indian IT services company Satyam Computer Services may, or may not, have a Big Blue potential buyer sniffing around now that the Indian Securities and Exchange Commission has given its approval for Satyam to sell a 51 percent controlling stake in itself to a suitor.

    Two months ago, Satyam founder and chairman Ramalinga Raju admitted that the company had forged documents and pumped up the company’s assets by $1 billion. The high-flying application and IT services giant had a market capitalization of over $7 billion a year ago, and now is trading at something around $500 million after the scandal.

    While the Business Standard, an Indian business newspaper, was reporting last Thursday that IBM had sent a team of bankers and lawyers to do due diligence on a deal, a follow-up report in Reuters on Friday poured a whole lot of cold water on the idea.

    By some measures, IBM is already on track to be the largest services provider in India and while paying somewhere between $500 million and $1 billion for Satyam might be a steal, considering the revenue stream its 600-strong global customer base generates, the lawsuits relating to the accounting fraud, which has hammered stockholders, are a big question mark in terms of potential future liabilities. IBM, Hewlett-Packard, CSC, and a number of other players who are rumored to be interested in Satyam probably don’t want those liabilities. It is probably far less costly–and certainly less risky–to try to steal away Satyam’s business.

    RELATED STORIES

    SOA Remains Hard to Define, but Projects on the Rise

    Bsafe and Satyam Partner for System i and z Security

    Sun Partners with Indian Offshorers to Attack AIX, HP-UX, and Linux

    Offshoring Grows Quickly in 2004, but Analysts Say That Won’t Last



                         Post this story to del.icio.us
                   Post this story to Digg
        Post this story to Slashdot

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: mtfh_rc, Volume 18, Number 10 -- March 9, 2009

    Sponsored by
    UCG Technologies

    CYBER-ATTACKS ON THE RISE. PROTECT WITH THE TRIPLE PLAY.

    COVID-19 has not only caused a global pandemic, but has sparked a “cyber pandemic” as well.

    “Cybersecurity experts predict that in 2021, there will be a cyber-attack incident every 11 seconds. This is nearly twice what it was in 2019 (every 19 seconds), and four times the rate five years ago (every 40 seconds in 2016). It is expected that cybercrime will cost the global economy $6.1 trillion annually, making it the third-largest economy in the world, right behind those of the United States and China.”1

    Protecting an organization’s data is not a single-faceted approach, and companies need to do everything they can to both proactively prevent an attempted attack and reactively respond to a successful attack.

    UCG Technologies’ VAULT400 subscription defends IBM i and Intel systems against cyber-attacks through comprehensive protection with the Triple Play Protection – Cloud Backup, DRaaS, & Enterprise Cybersecurity Training.

    Cyber-attacks become more sophisticated every day. The dramatic rise of the remote workforce has accelerated this trend as cyber criminals aggressively target company employees with online social engineering attacks. It is crucial that employees have proper training on what NOT to click on. Cyber threats and social engineering are constantly evolving and UCG’s Enterprise Cybersecurity Training (powered by KnowBe4) is designed to educate employees on the current cutting-edge cyber-attacks and how to reduce and eliminate them.

    A company is only as strong as its weakest link and prevention is just part of the story. Organizations need to have a quick response and actionable plan to implement should their data become compromised. This is the role of cloud backup and disaster-recovery-as-a-service (DRaaS).

    Data is a company’s most valuable asset. UCG’s VAULT400 Cloud Backup provides 256-bit encrypted backups to two (2) remote locations for safe retrieval should a cyber-attack occur. This is a necessary component of any protection strategy. Whether a single click on a malicious link brings down the Windows environment or an infected SQL server feeds the IBM i, once the data is compromised, there is no going back unless you have your data readily available.

    Recovery is not a trivial task, especially when you factor in the time sensitive nature of restoring from an active attack. This leads to the third play of the Triple Play Protection – DRaaS.  Companies have myriad concerns once an attack is realized and a managed service disaster recovery allows employees to keep focus on running the business in a crisis state.

    The combination of training employees with secure backup and disaster recovery offers companies the best chance at avoiding financial disruption in an age of stronger, more frequent cyber-attacks.

    Reach out to UCG Technologies to discuss your company’s security needs and develop a data protection plan that fits you best.

    ucgtechnologies.com/triple-play

     800.211.8798 | info@ucgtechnologies.com

     

    1. https://theconversation.com/cyberattacks-are-on-the-rise-amid-work-from-home-how-to-protect-your-business-151268

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Admin Alert: Things I Learned About IBM Maintenance Contracts DB2/400 Storage Engine for MySQL Now Available as Public Beta

    Leave a Reply Cancel reply

TFH Volume: 18 Issue: 10

This Issue Sponsored By

    Table of Contents

    • Getting Dizzy from Dynamic Infrastructure
    • The Economy Gives the Server Biz a Flat Tire in Q4
    • Infor Battles Customers in Court Over License Fees
    • As I See It: Isolation
    • Global IT Spending Barely Ahead of 2008; Some Regions Showing Strength
    • Have IT Vendors Been Hit Harder Than IT Departments?
    • CFMUG Downshifts from Monthly to Two Yearly Meetings
    • IBM to Bid for Satyam? Rumors All Over the Place
    • MKS Weathers the Economic Storm in Fiscal Q3
    • Overworked, Underpaid, and No Free Donuts and Coffee

    Content archive

    • The Four Hundred
    • Four Hundred Stuff
    • Four Hundred Guru

    Recent Posts

    • Why Open Source Is Critical for Digital Transformation
    • mrc Refreshes IBM i Low-Code Dev Tool
    • Unit Testing Automation Hits Shift Left Instead of Ctrl-Alt-Delete Cash
    • Four Hundred Monitor, March 3
    • IBM i PTF Guide, Volume 23, Number 9
    • Doing The Texas Two Step From Power9 To Power10
    • PHP’s Legacy Problem
    • Guru: For IBM i Newcomers, An Access Client Solutions Primer
    • IBM i 7.1 Extended Out To 2024 And Up To The IBM Cloud
    • Some Practical Advice On That HMC-Power9 Impedance Mismatch

    Subscribe

    To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

    Pages

    • About Us
    • Contact
    • Contributors
    • Four Hundred Monitor
    • IBM i PTF Guide
    • Media Kit
    • Subscribe

    Search

    Copyright © 2021 IT Jungle

    loading Cancel
    Post was not sent - check your email addresses!
    Email check failed, please try again
    Sorry, your blog cannot share posts by email.