Beta Systems Acquires Auconet / Asdis GmbH
Berlin, 23 February 2018 – Effective as of 1 February 2018, a subsidiary of Beta Systems DCI Software AG acquired sufficient company assets to ensure the continued business operations of Auconet GmbH and Auconet Technologie GmbH. For more than 10 years, Auconet has been developing and marketing IT operation management (ITOM) software that complements the Beta Systems Data Center Intelligence (DCI) portfolio. The DCI business unit will be strengthened both economically and technologically by expanding the Auconet sales team and integrating their products into Beta Systems’ existing international sales network.
Strategic Expansion of the Data Center Intelligence (DCI) Portfolio
“Auconet’s flagship product BICS, an easy-to-install tool that delivers complete transparency, security and control of complex IT infrastructures, is firmly established in the market,” comments Armin Steiner, a member of Beta Systems’ Board of Directors. “We see vast potential for this technology, especially since the number of end points is growing exponentially in the present age of the Internet of Things etc., making it more important than ever for companies to introduce an ITOM platform.”
The Auconet subsidiaries Asdis Solutions GmbH (Berlin), Auconet Austria GmbH (Vienna) and Auconet Inc. (Delaware, USA) are part of the acquisition package. Auconet is joining the Beta Systems Group as an independently run subgroup, and as such it will continue to engage in a direct dialog with its customers. Managing Director Frank Winter will stay with the company in his previous capacity: “Beta Systems Group is a strong market player with a rich product portfolio. For Auconet this means gaining access to an excellent sales network and benefitting from synergies in terms of technological resources, know-how and technology.”
Detailed information on the data center solutions of Beta Systems DCI Software AG is provided at:https://www.betasystems-dci.com/de
- Why you need 100% network visibility
- How you can get 100% network visibility
- The benefits of full network visibility, control, and security
For years, leading analysts – specialists in Network Access Control (NAC) – have maintained that 10-20% of endpoints are unknown to enterprises’ IT teams.
A colleague, who manages the network for a commercial office rental firm, says he has sleepless nights wondering what devices, and how many of them, are being added and subtracted, on a daily basis, from the network he manages. “People just plug ‘whatever’ into the open ports whenever they want.”
Is this secure computing? Can enterprises afford to be so lax about their endpoint security when it takes just one open port for a bad guy to get in and steal confidential information or shut down the network and thereby the company? The former CEO of Target, who had to step down after the retailer’s gargantuan data theft, would probably say, “No.”
- Lebron versus Curry in the NBA Finals
- Learn basketball from a basketball on the Internet of Everything
- The potential of the IoE means new kinds of endpoints
- Virtually no enterprises can see their entire networks today
- Find all your endpoints, master the IoE
- Warriors in 7 games. There, we said it!
San Francisco, where Auconet is headquartered, is abuzz this month with exhilaration – after forty years, the once-obscure Warriors basketball team made it to the NBA finals. Everyone anticipates an epic showdown with the Cleveland Cavaliers, featuring the leadership of Lebron James, the NBA’s strongest and most intellectual player, against the “incredible lightness” of the world’s best shooter, San Francisco’s quicksilver guard, Stephen Curry.
Not every child can grow up to shoot like Curry, but with the Internet of Everything (IoE) in play, tens of millions could become better athletes at whatever sport they are suited to. Today we are in the age of IoE 1.0, and for about $180 you can pick up the 94Fifty Infomotion Smart Sensor Basketball that feeds data on a player’s shooting to an iPhone and through a coaching app, helps the player improve and refine his or her shooting.
- Collecting unrelated best-of-breed tools to detect, monitor, and control the entire IT network is an inherently faulty approach.
- The weakness of a set of [good, or even very good] point tools becomes even more apparent as enterprise networks extend in new ways.
- Point solutions fragment the discovery, visibility and mastery of your infrastructure.
- An infrastructure control platform with 100% visibility can improve the largest networks through the next 10 years.
Just when IT thinks it may have mastered the network, the network becomes something else. From desktops, laptops, and BlackBerries, it morphed rather suddenly into virtualized infrastructure that employees, guests, and customers access via tablets and a wide range of mobile devices.
Now, many companies are thinking, “Why can’t one platform help us manage both IT infrastructure and our industrial machinery? After all, real-time management of an enterprise should let us immediately model the financial impact of an assembly line outage, and respond directly.”