Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Endpoint Security

After Delays, Dell Sets New path Under Private Buyout

WASHINGTON – After a bruising shareholder battle, Dell appears set for a new path under a private equity buyout aimed at reviving the fortunes of the former number one computer maker.

WASHINGTON – After a bruising shareholder battle, Dell appears set for a new path under a private equity buyout aimed at reviving the fortunes of the former number one computer maker.

A shareholder vote Thursday appears set to give control of the US tech giant to its founder, Michael Dell, in a go-private deal worth some $25 billion backed in part by the investment firm Silver Lake.

The vote had been delayed three times over the past few months, amid fierce opposition from some shareholders led by billionaire investor Carl Icahn, who called the plan a “giveaway.”

But after a modified voting process was approved to exclude nonvoting shares from the tally, Icahn acknowledged defeat this week.

The move will likely give another chance to Dell, which missed the tech sector shift to mobile devices away from desktop and laptop PCs.

“Shareholders will benefit from Michael Dell-Silver Lake’s proposal, as it not only shifts the restructuring risk to the buying consortium, but also frees up cash that can be invested elsewhere for higher returns,” said a note from the research firm Trefis.

But Dell’s future is far from guaranteed, as it seeks to move into software and services to make up for the steep declines in the PC business.

“It’s a very risky situation for Dell,” said Roger Kay, analyst at Endpoint Technologies Associates.

Advertisement. Scroll to continue reading.

Kay said Dell will have difficulty reshaping the company but that “they now have permission to shift the focus of the enterprise more rapidly.”

Analysts say Dell needs some radical changes, and that such moves are harder as a public company where shareholders press for quarterly profit targets.

“I think at this point you have to give it a couple of years to know if its working,” Kay said.

Kay said Dell needs to look at “trimming” its consumer products, like PCs, which are still in steep decline but that it has “to get through the eye of the needle” on enterprise services, where it goes up against rivals like IBM.

The buyout plan now appears set to succeed after the Dell special panel examining options agreed on a process that would require a majority of shares voted, instead of a majority of all outstanding shares not affiliated with Michael Dell.

Icahn said this change in the voting procedure made it “almost impossible to win the battle” at Thursday’s shareholder meeting, but maintained that the plan “undervalues” Dell.

Dell, once the world’s biggest PC seller, has fallen behind rivals Lenovo and Hewlett-Packard and faces pressure because of slumping computer sales. A recent survey showed worldwide sales of personal computers dropped for a fifth consecutive quarter in the April-June period.

Dell has failed in smartphones and tablets, but has seen some success in software and business services through its acquisitions.

Dell said last month its quarterly profit plunged 72 percent from a year ago to $204 million as it felt the impact of weak PC sales.

It was the company’s seventh consecutive decline in profits.

The Dell special panel said in July the personal computer business appears even bleaker than earlier forecasts, and that Dell still relies on the PC segment for two-thirds of its revenues.

Michael Dell has indicated he would “invest for growth” and compete aggressively in new markets if he wins the battle.

Under his plan, Dell would hire more sales personnel and “invest for growth in the PC and tablet business… to enhance our ability to compete,” according to the memo he filed with stock market regulators earlier this year.

“While Dell’s strategy in the PC business has been to maximize gross margins, following the transaction, we expect to focus instead on maximizing revenue and cash flow growth with the goal of improving long-term sales and competitive positioning.”

Written By

AFP 2023

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Cody Barrow has been appointed as CEO of threat intelligence company EclecticIQ.

Shay Mowlem has been named CMO of runtime and application security company Contrast Security.

Attack detection firm Vectra AI has appointed Jeff Reed to the newly created role of Chief Product Officer.

More People On The Move

Expert Insights

Related Content

Endpoint Security

Today, on January 10, 2023, Windows 7 Extended Security Updates (ESU) and Windows 8.1 have reached their end of support dates.

Application Security

Virtualization technology giant VMware on Tuesday shipped urgent updates to fix a trio of security problems in multiple software products, including a virtual machine...

Endpoint Security

Gigabyte has announced BIOS updates that remove a recently identified backdoor feature in hundreds of its motherboards.

Endpoint Security

Several major companies have published advisories in response to the Downfall vulnerability affecting Intel CPUs.

Data Protection

By implementing strong security practices,, organizations can significantly reduce the risks associated with lost and stolen computers and safeguard their sensitive information.

Application Security

Microsoft on Tuesday pushed a major Windows update to address a security feature bypass already exploited in global ransomware attacks.The operating system update, released...

Endpoint Security

Apple has launched a new security research blog and website, which will also be the new home of the company’s bug bounty program.

Endpoint Security

When establishing visibility and security controls across endpoints, security professionals need to understand that each endpoint bears some or all responsibility for its own...