Top

IBM's RedHat Acquisition – Complements & Completes IBM's Cloud Offerings

IBM, one of the world’s leading integrated technology and services company focusing on enterprises agreed to acquire Red Hat Inc for about US$34 Billion. This is a major big-ticket acquisition in the cloud segment. Most companies are looking to adopt cloud for everyday workload, processes consuming cloud based storage infra, services, tools, technologies and big data analytics which means significant opportunities for everyone in the cloud computing value chain. Some of our thoughts below on this acquisition and what it means:

  • Since IBM’s business model has pivoted to helping enterprises in their digital transformation journey, building end-to-end cutting edge capabilities from hardware to software to services is key for IBM to scale and grow.
  • IBM’s current offerings include a comprehensive suite of innovative solutions and services – Cloud (IBM Cloud Infra and services), AI (IBM Watson), Solutions (Blockchain, Watson IoT, Cognitive and Transaction Processing Software), Enterprise Services (Consulting, Application Management, etc) and more.
  • The bigger piece of its portfolio has been the “Technology Services & Cloud Platforms, a US$34 billion per year business along with the US$8 billion per year IBM Systems segment in 2017.
  • Together the direct cloud related hardware systems, software integration and services totaling to almost US$42 billion business though more or less flat YoY growth expected in 2018 as well. This has been putting pressure on IBM to strengthen its revenue generation opportunities to enhance the portfolio.
  • IBM has been collaborating with Red Hat to drive enterprise-grade Linux software integrations along with the hot trend of “containerization” with Kubernetes to tap the significant growth in edge computing space by offering hybrid-cloud solutions.
  • Thus, RedHat’s offerings nicely complements IBM’s offerings – RedHat offers a stable stream of “software-services subscription revenue” of almost $700 million per quarter (~90% of RedHat’s revenues which is a clear gap in IBM’s portfolio and will be additive to IBM’s top and bottom line).
  • RedHat’s OpenShift (containers) and Ansible are fastest growing technologies for the company adding immediate value though there might be some overlap in Middleware & Applications Services segment where IBM is better positioned to drive forward with its existing offerings.
  • Overall, this helps IBM become a vertically integrated cloud solution provider by adding an open software driven services model for the modern cloud and data infrastructure.
  • For RedHat, this is a great deal to now have ability to be more integrated into IBM’s end-to-end cloud solution and scale faster with IBM’s bigger enterprise footprint.

  • RedHat also enjoys a strong mindshare across a vibrant developer community, so this is a great win for IBM as well to court more enterprise developers and cross-sell its multitude of services and solutions.
  • However, the cost of acquisition ~$34 billion means IBM will be under pressure to scale this $3 billion per year RedHat business to double every year in order to meet the return over next five years.
  • This deal makes for a more formidable and complete cloud player and will help win some big deals. However, IBM still has its work cut out to ensure it succeeds and helps boost the already flattening revenues.
  • It also remains to be seen if the RedHat acquisition will turn out as significant as Android acquisition was to Google or the NeXT acquisition was to Apple.
  • This adds to IBM’s significant R&D investments in forward looking technologies such as AI, blockchain and  IoT, which should hopefully drive some growth over the next few years.
  • This will be possible only if IBM scales similar to how Microsoft has successfully scaled the Azure Cloud business targeting different verticals and enterprises from small-medium to large.
  • Microsoft and Amazon will be keeping a close eye on how this affects their relationship with RedHat even though most of RedHat’s offerings are open-source.

Neil is a sought-after frequently-quoted Industry Analyst with a wide spectrum of rich multifunctional experience. He is a knowledgeable, adept, and accomplished strategist. In the last 18 years he has offered expert strategic advice that has been highly regarded across different industries especially in telecom. Prior to Counterpoint, Neil worked at Strategy Analytics as a Senior Analyst (Telecom). Neil also had an opportunity to work with Philips Electronics in multiple roles. He is also an IEEE Certified Wireless Professional with a Master of Science (Telecommunications & Business) from the University of Maryland, College Park, USA.

Term of Use and Privacy Policy

Counterpoint Technology Market Research Limited

Registration

In order to access Counterpoint Technology Market Research Limited (Company or We hereafter) Web sites, you may be asked to complete a registration form. You are required to provide contact information which is used to enhance the user experience and determine whether you are a paid subscriber or not.
Personal Information When you register on we ask you for personal information. We use this information to provide you with the best advice and highest-quality service as well as with offers that we think are relevant to you. We may also contact you regarding a Web site problem or other customer service-related issues. We do not sell, share or rent personal information about you collected on Company Web sites.

How to unsubscribe and Termination

You may request to terminate your account or unsubscribe to any email subscriptions or mailing lists at any time. In accessing and using this Website, User agrees to comply with all applicable laws and agrees not to take any action that would compromise the security or viability of this Website. The Company may terminate User’s access to this Website at any time for any reason. The terms hereunder regarding Accuracy of Information and Third Party Rights shall survive termination.

Website Content and Copyright

This Website is the property of Counterpoint and is protected by international copyright law and conventions. We grant users the right to access and use the Website, so long as such use is for internal information purposes, and User does not alter, copy, disseminate, redistribute or republish any content or feature of this Website. User acknowledges that access to and use of this Website is subject to these TERMS OF USE and any expanded access or use must be approved in writing by the Company.
– Passwords are for user’s individual use
– Passwords may not be shared with others
– Users may not store documents in shared folders.
– Users may not redistribute documents to non-users unless otherwise stated in their contract terms.

Changes or Updates to the Website

The Company reserves the right to change, update or discontinue any aspect of this Website at any time without notice. Your continued use of the Website after any such change constitutes your agreement to these TERMS OF USE, as modified.
Accuracy of Information: While the information contained on this Website has been obtained from sources believed to be reliable, We disclaims all warranties as to the accuracy, completeness or adequacy of such information. User assumes sole responsibility for the use it makes of this Website to achieve his/her intended results.

Third Party Links: This Website may contain links to other third party websites, which are provided as additional resources for the convenience of Users. We do not endorse, sponsor or accept any responsibility for these third party websites, User agrees to direct any concerns relating to these third party websites to the relevant website administrator.

Cookies and Tracking

We may monitor how you use our Web sites. It is used solely for purposes of enabling us to provide you with a personalized Web site experience.
This data may also be used in the aggregate, to identify appropriate product offerings and subscription plans.
Cookies may be set in order to identify you and determine your access privileges. Cookies are simply identifiers. You have the ability to delete cookie files from your hard disk drive.