EMC gets Data Domain, now what?
- 10 July, 2009 07:18
NetApp Inc. said "uncle" yesterday after EMC Corp. outbid it for a second time in its quest to acquire Data Domain Inc, but some industry observers believe EMC, in its zeal to acquire the deduplication vendor, may have overpaid for the prize and could have a difficult time realizing a return on its investment.
"EMC won the prom queen but now they have to build a life together. I think I could make the argument that this will be harder than the VMware or RSA acquisitions because the technology is nearer and dearer to EMC's core," said Steve Duplessie, founder and lead analyst at Enterprise Strategy Group Inc. in Milford, Mass.
"I think NetApp will be happy they didn't do this deal," Duplessie continued. "It was way too expensive, and the risk outweighs the rewards."
EMC tendered a US$2.1 billion all-cash offer to acquire all outstanding shares of Data Domain's stock by midnight July 17. The revised offer topped NetApp's latest bid by US$200 million. In a sense, by going that high over its rival's head, EMC was making a clear statement: You're out of your league.
"At that number there was no margin of error for NetApp. EMC can screw this deal up nine ways from Sunday and, while people may yell at them, there's no way it's going to kill EMC," Duplessie said.
In a press release issued late yesterday, EMC said that once the deal is completed, which is expected to occur before the end of July, Data Domain will help accelerate EMC's pace of expansion in the next-generation disk-based backup and archive market. That market includes data reduction strategies that are being lead by deduplication, or single-instancing, technology.
"This is a compelling acquisition from both a strategic and financial standpoint. We look forward to bringing Data Domain together with EMC to form a powerful force in next-generation disk-based backup and archive," EMC CEO Joe Tucci said in a statement. "I have tremendous respect for Data Domain's people, technology and business, and anticipate great things ahead for our respective companies, our customers and partners."
In March, NetApp originally offered US$1.5 billion in cash and stock for Data Domain. But early last month, EMC -- with its deeper pockets -- came in with an all-cash bid of US$1.8 billion for the company. NetApp then increased its bid to US$1.9 billion. Earlier this week, EMC again countered with a US$2.1 billion all-cash offer, this time sweetening the pot by removing any deal-protection provisions, including a deal termination fee. NetApp, however, retained that provision, and got a US$57 million deal termination fee from Data Domain. It was a small price for Data Domain to pay, since the bidding war doubled the value of the company's stock over the past three months.
In the aftermath of yesterday's defeat, NetApp chief marketing officer Jay Kidd said in an interview with Computerworld that like EMC, his company was not looking to purchase deduplication technology, which it already has. NetApp wanted a leading technology vendor that could help increase part of its portfolio of products.
Kidd also restated that his company had a ceiling on how much it could justify paying for Data Domain, and it had reached it. "You never want to judge the level of sanity of your opponent. Many people will say EMC overpaid for them. We certainly feel they did. I think it will be a challenge for EMC to realize the ROI at this price," Kidd said.
Not everyone agrees.
Robert Stevenson, managing director of storage research at TheInfoPro, said while EMC isn't likely to get a return on its US$2.1 billion investment over the next 12 to 18 months, the numbers pan out over a five-year period. Stevenson justifies his numbers by explaining that most enterprise-class deduplication implementations cost about US$1 million, plus an additional 15 per cent to 25 per cent of that for ongoing annual maintenance costs. Over the next few years, upward of 70 per cent of Fortune 1000 companies will have deduplication as part of their backup scheme, which will represent about US$2 billion in revenue.
"You ask storage professionals what their top priority projects are, and they'll tell you it's reclaim underutilized storage assets," Stevenson said, noting that deploying dedpulication is the number one way to regain that unused capacity.
In a survey of 305 enterprise-class or mid-sized companies completed in May, TheInfoPro reported that backup system redesign was the second highest project priority cited by Fortune 1000 companies, and that deduplication is the number one project in that backup redesign. Currently, 30 oer cent of Fortune 1000 companies surveyed have deduplication in place and 40 per cent plan to adopt it in the next six months to a year.
According to Stevenson, 20 per cent of 60,000 mid-sized companies in the U.S. have deduplication technology in place and 35 per cent are considering deploying it in the near term. And the leading vendor in that deduplication space? None other than Data Domain, he said. EMC will not mess with that kind of success, he said.
Stevenson said he expect EMC will be true to its word and will run Data Domain as a separate entity, infusing money into R&D and increasing sales through its worldwide distribution channels and sales force. Eventually, EMC will likely integrate the deduplication technology into its various backup offerings, including Tivoli Storage Manager backup and archive software and its Legato NetWorker product.
Unlike its VMware and RSA acquisitions, which EMC generally allowed to flourish with little to no intervention, Duplessie said he doesn't believe EMC will be able to keep its hands off Data Domain because deduplication technology is so core to its primary storage and backup products.
Duplessie also said NetApp and Data Domain would have been a better fit because there were more synergies between their products and business strategies. "NetApp built a big company selling an appliance into the midstream market and that's exactly what Data Domain does," he said.
"EMC ... has all the execution risk. If they can execute, they not only have a chance to make all us analysts seem like idiots, but they took a weapon out of a fierce competitor's arsenal," he added.
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Dual-Persona Smartphones Not a BYOD Panacea
After two-year hiatus, EFF accepts bitcoin donations again
CIOs struggle to deliver timely mobile business apps: survey
Spiceworks' free management software gets integrated MDM
Opinion: Why national e-health is not for everyone
Endpoint Security and Virtualisation
Besides form factor, virtual systems are not really that different than physical systems. They both use the same operating systems and applications. They both present users with computing resources such as RAM and hard drives. Consequently, the ability to exploit vulnerabilities in a physical environment will present a significant threat to virtualised environments as well. This paper examines the different endpoint security methods for virtualised environments and presents how Endpoint Protection security provides optimal performance, protection and manageability.
Managing the Rapid Rise in Database Growth: 2011 IOUG Survey on Database Manageability
As the era of “Big Data” marches on unabated, data is coming from an ever wider range of sources, including transactional systems, mobile devices, sensors, streaming media, and social networks. Businesses are looking for innovative ways to better leverage terabytes—and for some, petabytes—of information. Read more.
Endpoint Protection Overview
With the exponential growth and sophistication of malware today, the security industry can no longer afford to ‘bury its head in the sand’. The bottom line is that traditional endpoint security protection is now ineffective due to the sheer volume, quality, and complexity of malware. This paper looks at this problem and how Webroot, by going back to the drawing board on countering malware threats, is revolutionising endpoint protection and solving the issues that hinder existing endpoint security solutions. Download now.