HP Gets More Than Security From ArcSight Acquisition, It Gets Closer to Comprehensive BI for IT

Updated: September 13, 2010

ArcSight -- with a $200 million revenue run rate and 35 percent annual top line growth -- might be best known for providing the means to snuff out cyber crime and user access and data management risks. And the systems log capture and management portfolio at ArcSight is also adept at helping with regulatory oversight requirements and compliance issues. To solve these problems, the company sells to the largest enterprises, including the US government and military, and financial, telco and retail giants.

But for me the real value for HP is in gaining a comprehensive platform and portfolio via ArcSight for total systems log management. Being able to manage and exploit the reams of ongoing log data across all data center devices offers huge benefits, even the ability to correlate business events and IT events for what I call BI for IT.

We're right on the cusp of reliable and penetrating levels predictive types of IT analysis, and HP needs to in the vanguard on this. VMware just last month bought privately held Integrien for the same reason. The market is looking for de facto standard governance systems of record and HP's other governance products plus ArcSight makes that a market opportunity only one for HP to lose.

This predictive approach to IT failures -- of identifying and ameliorating system snafus before they impact applications and data performance -- stands as the progeny of better IT operations continuity. The structured and unstructured systems data and analysis from ArcSight will help HP develop a constant feedback loop between build, manage and monitoring processes, to help ensure that enterprises remain secure and reliable in operations, says HP.

Consider too that managing security and dependability at the edge takes on a whole new meaning as enterprises dive more deeply into smartphones, mobile apps, netbooks, thin clients and desktop virtualization, and the need to not just manage each of them -- but all of them in an orchestra of coordinated data and applications access, provisioning and compliance.

Virtualization drives need for governance


Oh, and then there's the virtualization revolution that's only partly played out in enterprise IT and growing fast. And so how to manage and govern fleeting virtual instances of servers, networking equipment and storage? The logs. The logs data. It's a sure way to gain a complete view of IT operations, even as that picture is rapidly changing moment by moment.

Another complement to the ArcSight-HP match-up: All that log data needs to be crunched and reported, a function of BI-adept hardware and optimized systems, which, of course, HP has in spades.

Related Categories
Featured Research
  • Securing Enterprise Information Technology

    In the 1980s and 1990s, business applications and data were largely confined within and protected by a Local Area Network (LAN). The 2000s introduced a significant change. Download this white paper now to learn why the shift to the cloud is changing how companies think about and manage their IT infrastructure. more

  • Office365 Adoption eGuide

    Microsoft moved to the cloud in 2014, and, as a result, Office 365 is taking off. Now, Okta customers are connecting to Office 365 in increasing numbers. This eGuide explains why IT departments should plan and deploy solutions around identity and mobility management in concert with their Office 365 roll out to get maximum user adoption. more

  • Okta Directory Integration

    For most companies, Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) play a central role in coordinating identity and access management policies. When on-premise applications are integrated to Active Directory or LDAP, users get the best possible experience. That's why Okta's cloud-based identity and access management service provides a highly useful single integration point. more

  • Top 8 Identity and Access Management Challenges with Your SaaS Applications

    With more and more businesses adopting Software-as-a-Service (SaaS) applications, enterprise IT is fundamentally changing. This whitepaper presents the eight biggest Identity and Access Management (IAM) challenges associated with adopting and deploying cloud and SaaS applications, and discusses best practices for addressing each of them. more

  • Better BYOD with Pulse Secure and MDM Partners

    Learn how Pulse Secure and leading MDM product partners are transforming the way employees and IT benefit from the productivity and flexibility of BYOD — without compromising security or increasing management complexity. more