{"id":1367,"date":"2004-12-16T00:00:00","date_gmt":"2004-12-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/16\/symantec-will-buy-veritas-for-13-5b-in-stock\/"},"modified":"2021-12-30T11:39:14","modified_gmt":"2021-12-30T11:39:14","slug":"symantec-will-buy-veritas-for-13-5b-in-stock","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2004\/12\/16\/symantec-will-buy-veritas-for-13-5b-in-stock\/","title":{"rendered":"Symantec will buy Veritas for $13.5B in stock"},"content":{"rendered":"<p>Symantec will buy Veritas Software  in an all-stock transaction, the companies announced Thursday.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The deal values Veritas at around $13.5 billion, they said.<\/p>\n<p>By joining forces, Symantec will be able to help enterprise customers secure their information better, the companies said.<\/p>\n<p>Symantec Chairman and Chief Executive Officer John Thompson will continue in that role, while his opposite number at Veritas, Gary Bloom, will become vice-chairman and president of the combined company.<\/p>\n<p>&#8220;This is not your typical merger focused on removing cost and redundant infrastructure,&#8221; he said.  Bloom will take day-to-day responsibility for sales, service and support&#8221;, Thompson said.<\/p>\n<p>For his part, Bloom said that a single company that can both secure its customers&#8217; data, and make that data more available, represents a unique value proposition.<\/p>\n<p>How long such integration will take is an unanswered question, as the people who will do the programming have been kept in the dark about the deal until now, according to Thompson.<\/p>\n<p>The companies expect to report $5 billion in combined revenue in their first financial year together, from April 2005 to March 2006, according to Symantec&#8217;s Chief Financial Officer Greg Myers.<\/p>\n<p>The previous week, it announced plans to acquire intrusion system Platform Logic of Glenwood, Maryland.<\/p>\n<p>This latest deal dramatically extends and strengthens Symantec&#8217;s offering to enterprises, according to Richard Ptak, an analyst with Ptak, Noel &#038; Associates, commenting on the deal via e-mail.<\/p>\n<p>Veritas has so far failed to capitalize on its 2002 acquisitions of Jareva Technologies and Precise Software Solutions, but the deal with Symantec will give it a second chance to apply these technologies, drawing on the greater experience and financial resources of the merged company, Ptak said.  Ptak wondered whether Computer Associates International or BMC Software would have been a better target.<\/p>\n<p>BMC, in particular, would have given Symantec a solid position in the systems management market &#8212; and may still be a target if it is on the market by the time Symantec swallows Veritas.<\/p>\n<p>http:\/\/itproductguidebeta.infoworld.com\/article\/04\/12\/16\/HNsymantecbuyveritas_1.html<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1367","post","type-post","status-publish","format-standard","hentry","category-product"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=1367"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1367\/revisions"}],"predecessor-version":[{"id":3854,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/1367\/revisions\/3854"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=1367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=1367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=1367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}