|By Business Wire||
|February 26, 2013 01:57 PM EST||
Profile for nCircle has been inserted into release dated Feb. 25, 2013.
The corrected release reads:
RSA CONFERENCE 2013 EXHIBITOR PROFILES
RSA Conference 2013, the world’s largest information security event, takes place February 25 through March 1, 2013 at the Moscone Center in San Francisco.
Links to important information:
RSA Conference Sponsor and Exhibitor News:
Follow the RSA Conference on twitter (official hashtag is #RSAC):
Listed below are RSA Conference 2013 exhibitor profiles.
Accellion, Inc. provides enterprise class mobile file sharing solutions to enable secure, anytime, anywhere access to information while ensuring enterprise security and compliance. More than 11 million users and 1,700 of the world’s leading organizations and government agencies use Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT costs. Accellion file sharing solutions can be deployed in public, private and hybrid cloud environments and provide the ease-of-use business users need while giving the enterprise the flexibility, scalability and protection it needs. For more information, please visit www.accellion.com or call (650)-485-4300.
Becrypt, a leading supplier to national, federal and local governments, law enforcement agencies, and other organizations, announces the availability of DISK Protect Windows 8 for Tablet. This significantly extends the range of touch-screen tablets that run Becrypt’s full disk encryption solution. The solution includes on-screen, touch friendly pre-boot authentication, enabling login/authentication before the operating system boots, avoiding authenticating after a machine may already be compromised.
DISK Protect provides 256 bit encryption and is available in several different accredited versions including FIPS 140.2 making it suitable for U.S. and Canadian Federal governments and organizations requiring a FIPS compliant solution.
|Ticker Symbol & Exchange:||NASDAQ: CA|
|CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data, identities and access, from the data center to the cloud. Specializing in identity and access management and data protection, CA Technologies solutions help organizations find the balance between securing and protecting the business and enabling the business for transformative growth.|
|Core Security is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company’s innovative security research center. For more information, visit www.coresecurity.com.|
|CounterTack, the industry’s first and only in-progress attack intelligence and response solution provider, was born out of the critical need to develop new security approaches for enterprise and government organizations. The detection gap persists despite massive investments and continuing advancements in security technologies, with cyber attacker innovations outpacing cyber defenses. CounterTack is leading the way on new approaches for deeper security intelligence monitoring and faster attack response. To learn more, visit www.CounterTack.com.|
Coverity, Inc., (www.coverity.com), the leader in development testing, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. More than 1,100 Coverity customers use the Coverity® Development Testing Platform to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic failure. Coverity is a privately held company headquartered in San Francisco.
|Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments. Cyber-Ark works with more than 1,200 customers, including more than 40 percent of the Fortune 100. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific.|
|Cypherbridge addresses the cyber threats to new devices flooding onto global networks every day.|
|Software development kits from Cypherbridge target embedded, small to medium memory applications in vertical markets, where space, power and performance are carefully balanced.|
|Our customized device software solutions include SSL/TSL public-key infrastructure, security and encryption SDK, SSH embedded SDK, and uLoad secure boot loader and distribution server. The VPN SDK implements IPsec/IKE for a cryptographically secure solution for IP packet and firewall defense. The new Cloud Device Kit launched with Express Logic lets users connect securely the cloud faster and simpler through JSON and XMPP.|
DB Networks is innovating behavioral analysis based database security equipment for organizations who need to protect their data from advanced attacks. DB Networks ADF-4200 Adaptive Database Firewall is an effective countermeasure against SQL Injection and database Denial of Service attacks. Unlike traditional database security solutions, which require extensive customization and time-consuming white list/black list maintenance, DB Networks ADF-4200 automatically learns each application's proper SQL behavior. Any SQL transaction which subsequently deviates from the model immediately raises an alarm as an attack. DB Networks is privately held and headquartered in San Diego, California. For additional information, please visit us at dbnetworks.com.
|Elliptic Technologies is a leading provider of embedded security hardware cores and software to SoC manufacturers, OEMs, service and content providers. Elliptic's highly-integrated solutions help secure products in markets such as mobile, networking, home entertainment, smart grid and automotive. Elliptic's hardware security cores enable designers to efficiently balance power, performance and silicon area and cover a wide variety of cryptographic cores, public key accelerators, true random generators and protocol processors. Elliptic features DRM and content protection solutions for downloading and sharing premium content between multiple devices, including DTCP-IP and HDCP SDKs built for "trusted execution environments" used in consumer electronics.|
|FireMon is the industry leader in providing enterprises, government and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite -- Security Manager, Policy Planner and Risk Analyzer -- enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.|
|Ticker Symbol & Exchange:||NASDAQ: FTNT|
|Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Customers include enterprises, service providers and the majority of the 2012 Fortune Global 100. Fortinet's FortiGate products delivers ASIC-accelerated performance and integrates multiple layers of security designed to protect against application and network threats. Fortinet's product line goes beyond UTM to help secure the extended enterprise - from endpoints, to the perimeter and the core, including databases and applications.|
|Company:||Global Knowledge Training|
|Global Knowledge is the worldwide leader in IT and business skills training, with more than 1,500 courses that span foundational and specialized training and certifications. Our core training is focused on Cisco, Microsoft, Avaya, VMware, Red Hat, business process improvement, and leadership development. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning services. Global Knowledge employs more than 1,300 people worldwide and is headquartered in Cary, N.C. The company is owned by New York-based investment firm MidOcean Partners. Learn more at www.globalknowledge.com.|
|Booth:||3107, Hall B|
|GreenSQL is the world’s #1 installed database security solution.|
|GreenSQL’s unified software solution provides database security, Database Activity Monitoring (DAM), and Dynamic Data Masking in one product that addresses today’s database security needs for all organizations. GreenSQL is easy to install and manage and can be up and running in your organization in a matter of minutes. As the leader of the largest community of database administrators, we ensure that our solutions are always suited and updated for the latest market needs. GreenSQL supports Microsoft Azure, SQL Server, MySQL, PostgreSQL, Amazon RDS and Maria DB database applications.|
|The International Association of Privacy Professionals (IAPP) is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. Founded in 2000, the IAPP is a not-for-profit association that helps define, support and improve the privacy profession through networking, education and certification. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge.|
|With more than 20 years of individual experience in IT security, Keypasco’s founders are the minds behind some of the revolutionary two factor authentication technology solutions used by leading Internet banks today. And they have brought their knowledge to their new business: Keypasco.|
Keypasco develops secure software based authentication solution, which is designed and customized to be used on trusted devices. Keypasco delivers on society’s expanding needs for personal authentication services, and identity protection within Internet banking, online gaming, eCommerce, mobile Commerce, mobile payment and eGovernment. Keypasco’s vision is to be a leading supplier of services for securing cloud services.
|Klocwork® helps developers create more secure software. Our tools analyze source code on-the-fly, simplify peer code reviews and extend the life of complex software. Over 1000 customers, including the biggest brands in the mobile device, consumer electronics, medical technologies, telecom, automotive, military and aerospace sectors, have made Klocwork part of their software development process. Tens of thousands of software developers, architects and development managers rely on our tools everyday to improve their productivity while creating better software.|
|Company:||Linoma Software | GoAnywhere|
|Founded in 1994, Linoma Software is a global provider of enterprise software solutions that keep data secure at rest and in motion to help companies meet compliance regulations such as HIPAA, PCI DSS, SOX, GLBA and state privacy regulations. Our GoAnywhere suite is an on-site, browser-based managed file transfer solution for the enterprise that can be installed on almost any platform using FTPS, SFTP, HTTPS, AS2 communication protocols, and popular encryption standards such as Open PGP, GPG, AES and FIPS 140-2. Visit http://www.GoAnywhereMFT.com for more information or to download a free trial.|
nCircle is the leading provider of information risk and security performance management solutions to more than 6,500 businesses and government agencies worldwide. nCircle solutions enable enterprises of all sizes to (1) automate compliance and reduce risk, and (2) measure and compare the performance of their IT security program with their own goals and industry peers. nCircle solutions may be deployed on a customer's premises, as a cloud-based service, or in combination, for maximum flexibility and value. nCircle has won numerous awards for growth, innovation, customer satisfaction and technology leadership.
|NetIQ is a global, enterprise software company with a relentless focus on customer success. Our award-winning solution portfolio includes scalable, automated solutions for Identity, Security, Access, Governance, Systems and Application, Service, and Workload Management that help organizations intelligently secure, manage and measure across hybrid IT environments in a cost-effective manner.|
|OneLogin is the innovator in enterprise identity management with 700 enterprise customers in 34 countries, including AAA, Gensler, Netflix, News Corp International, Pandora, Red Hat, Steelcase and PBS. The company provides the industry’s most comprehensive solution for managing user identities in the cloud and behind the firewall. Unique capabilities like Cloud Search and OneLogin for iPad break down SaaS data silos and increase productivity. OneLogin’s cloud identity platform comes complete with secure single sign-on for web, mobile and iPad, federated search, user provisioning, deep directory integration with real-time user sync, out-of-band multi-factor authentication, VPN integration and compliance reporting. Follow @onelogin.|
|OPSWAT is the leading provider of software management technologies and multiple antivirus engine scanning solutions. OPSWAT’s OESIS Framework, an SDK for detecting and managing thousands of third-party software applications, is used by leading SSL VPN and NAC vendors and is showcased in the free OPSWAT Security Score tool (www.opswat.com/products/security-score). AppRemover SDK allows for easy uninstallation of security and file sharing applications. Try the free demo at www.appremover.com. OPSWAT’s Metascan technology allows enterprises, government agencies, and software vendors to integrate up to 30 anti-malware engine scanning into their workflows. Try www.metascan-online.com, the free online implementation of Metascan for scanning uploaded files.|
|Web:||www.phishnix.com / www.aujas.com|
|Phishnix is a Phishing Diagnostic Solution which enables organizations to enhance their security posture against social engineering attacks. Through assessment and awareness training, Phishnix provides valuable information regarding the health of your organization’s human firewall. A simulated phishing attack, coupled with a teaching moment that provides a customized educational experience, increases the effectiveness of remediation. Phishnix is powered by Aujas, a Global Information Risk Management (IRM) services company. Phishnix consultants are certified information security professionals and will work with you to create a realistic phishing scenario. Strengthen your human firewall with Phishnix.|
|Company:||PistolStar, Inc. dba PortalGuard|
|Are you avoiding two-factor authentication due to high cost and low user adoption? You might be interested in the unique way in which PortalGuard PassiveKey™ delivers two-factor which requires no hardware, no interaction from the user, no recurring costs, and no change to the user experience. It is 100% transparent to the user, offers strong authentication and is easy to deploy.|
|PortalGuard’s Authentication Platform delivers five complimentary authentication layers including two-factor (SMS, voice, printed, email) plus transparent user authentication, self-service password reset/recovery, SAML single sign-on, and password sync in one encompassing platform.|
|Portcullis is a leading international specialist in Cyber Security Services.|
|We provide Security testing services, Computer Forensics and Incident Response for both the public and private sectors.|
|Here at Portcullis, information security is our business. We provide our clients with the reassurance that their systems, networks and web sites are secure from threat of attack from unauthorized sources;|
|We are also proud to represent Mavituna Security and their web application scanning tool, Netsparker.|
|Mavituna together with Portcullis is launching ScanToSecure, the Saas version of Netsparker, this week at RSA. Come check it out at the Portcullis booth (3007).|
|Premio is a flexible US-based ODM/OEM global technology solution provider of design, assembly, test, manufacturing, system integration and supply chain services. We are unique in our ability to provide transparent end-to-end support that delivers the proven results that our OEM and ODM customers have come to expect. Unlike most contract manufacturers, our design experts are ready to work with our customers to increase product design and reliability, optimize efficiency and reduce costs. Premio can accommodate service level and volume requirements of any complexity. For more information about Premio, please contact the Marketing Department at 800.9.PREMIO or visit: premioinc.com.|
|Prolexic, the world’s largest, most trusted Distributed Denial of Service (DDoS) mitigation provider, restores mission-critical Internet-facing infrastructures within minutes. Ten of the world’s largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel/hospitality, gaming and other at-risk industries work with Prolexic because DDoS Attacks End Here. www.prolexic.com.|
|Pwnie Express is the premier global provider of innovative, cost effective, rapid deployment penetration testing products. Their products are used by service providers, Fortune 50 companies and the federal government. Their newly released Enterprise Pentesting Appliance (EPA) enables coverage to large numbers of remote offices, persistent pentesting functionality and centralized management capabilities. They are announcing the release of the industry-re-defining Pwn Pad, a tablet, loaded with wired and external wireless pentesting tools (currently available for pre-order with 1 April ship date). Pwnie Express was selected as a 2012 Industry Innovator in Analysis and Testing by SC Magazine.|
|Founded in 2002, Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. Secunia’s proven, complementary portfolio aids businesses in their handling of complex IT security risks and compliance requirements across industries and sectors – a key component in corporate risk management assessment, strategy, and implementation. Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base.|
|SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers’ most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.|
|More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.|
|Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.|
|SPYRUS, Inc. develops and manufactures hardware-based encryption, authentication, and digital content security products. Featured products at RSA in 2013 include Secure Portable Workplace, our encrypted Microsoft certified Windows To Go drive that boots Windows 8; Rosetta hardware-based encryption devices in multiple form factors; and the cross-platform PocketVault Encryptor applications for computers, tablets, and phones.|
|SPYRUS holds patents in the U.S. and abroad. Secured by SPYRUS™ security technology is proudly designed, engineered, and manufactured in the USA to meet FIPS 140-2 Level 3 standards.|
|SPYRUS is a privately held company headquartered in San Jose, California.|
|Company:||Tenable Network Security|
|Tenable Network Security is relied on by security and compliance professionals at many of the world's largest companies and governments, to stay ahead of emerging vulnerabilities, threats, and compliance-related risks. Its Nessus and SecurityCenter solutions set the standard for identifying vulnerabilities, preventing attacks, and complying with regulatory requirements. http://www.tenable.com|
|TITUS is a leading provider of security and data governance software that helps organizations share information securely while meeting policy and compliance requirements. With over 2 million users worldwide, our solutions enable enterprises, military and government organizations to classify and secure unstructured information. Products include TITUS Classification, the leading message, document and file classification and labeling solutions that enhance data loss prevention by involving end users in identifying sensitive information; TITUS Mobile, a mobile email solution for securely sending email and viewing attachments on mobile devices; and the TITUS family of classification and security solutions for Microsoft SharePoint.|
|Trustwave is a leading provider of compliance, Web, application, network and data security solutions delivered through the cloud, managed security services, software and appliances. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its TrustKeeper® portal and other proprietary security solutions. Trustwave has helped hundreds of thousands of organizations--ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers--manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices worldwide. For more information, visit https://www.trustwave.com.|
|Verdasys provides Enterprise Information Protection solutions and managed services to secure sensitive data and business processes, enabling midsize and global businesses to successfully compete in collaborative and mobile environments. Digital Guardian is a proven technology platform providing policy-based data lifecycle monitoring, classification, control and forensics on endpoints, servers, virtual machines, enterprise applications, networks, mobile devices and cloud environments. Digital Guardian protects IP and regulated data from compromise by insiders, contractors, partners and targeted cyberattacks. Since 2003, millions of Digital Guardian agents have been deployed to protect critical data for global leaders in financial services, insurance, technology, manufacturing and healthcare industries.|
|Company:||Wombat Security Technologies, Inc.|
|Wombat Security Technologies, Inc. is the first and only company to offer a complete suite of anti-phishing and security awareness products that leverage progressive training techniques of professional educators to effectively improve human response against cyber-attacks over 80%. Wombat’s breakthrough software-based training solutions teach users how to recognize and avoid the most advanced attacks involving phishing, social networking, smartphones, and working outside of the office. They also offer training for and PCI-DSS and PII compliance.|
|Fortune 1000 companies, large government agencies, and small to medium businesses around the world are successfully using Wombat’s training solutions to significantly improve their security posture.|
|Learn more at www.wombatsecurity.com.|
Business Wire is the official news wire & online press kit service for the RSA Conference 2013. Breaking news releases, press kits, and multimedia are available at Tradeshownews.com, Business Wire's trade show, conference, and event news resource.
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Public relations and investor relations professionals rely on Business Wire for both broad-based and targeted market reach. A recognized disclosure service in the United States, Canada and a dozen European countries, Business Wire handles document formatting and regulatory filing into EDGAR, SEDAR and other systems. Professional communicators from public and private companies, government agencies, advocacy groups and more rely on Business Wire for both broad-based and targeted reach -- with IR services for public companies and PR services that include Public Policy, LatinoWire and Corporate Social Responsibility. Business Wire provides online newsroom hosting and integration services as well as search engine optimization, mobile distribution and detailed measurement on every press release. Its patented NX delivery platform provides simultaneous full-text posting of Business Wire content to news systems and websites in virtually any country or language. With 31 bureaus worldwide, Business Wire offers local service and global reach.
SYS-CON Events announced today that Dataloop.IO, an innovator in cloud IT-monitoring whose products help organizations save time and money, has been named “Bronze Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Dataloop.IO is an emerging software company on the cutting edge of major IT-infrastructure trends including cloud computing and microservices. The company, founded in the UK but now based in San Fran...
Dec. 7, 2016 07:00 PM EST Reads: 430
Join Impiger for their featured webinar: ‘Cloud Computing: A Roadmap to Modern Software Delivery’ on November 10, 2016, at 12:00 pm CST. Very few companies have not experienced some impact to their IT delivery due to the evolution of cloud computing. This webinar is not about deciding whether you should entertain moving some or all of your IT to the cloud, but rather, a detailed look under the hood to help IT professionals understand how cloud adoption has evolved and what trends will impact th...
Dec. 7, 2016 06:00 PM EST Reads: 2,647
In his session at 19th Cloud Expo, Claude Remillard, Principal Program Manager in Developer Division at Microsoft, contrasted how his team used config as code and immutable patterns for continuous delivery of microservices and apps to the cloud. He showed how the immutable patterns helps developers do away with most of the complexity of config as code-enabling scenarios such as rollback, zero downtime upgrades with far greater simplicity. He also demoed building immutable pipelines in the cloud ...
Dec. 7, 2016 06:00 PM EST Reads: 1,869
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 7, 2016 05:45 PM EST Reads: 1,096
Businesses and business units of all sizes can benefit from cloud computing, but many don't want the cost, performance and security concerns of public cloud nor the complexity of building their own private clouds. Today, some cloud vendors are using artificial intelligence (AI) to simplify cloud deployment and management. In his session at 20th Cloud Expo, Ajay Gulati, Co-founder and CEO of ZeroStack, will discuss how AI can simplify cloud operations. He will cover the following topics: why clou...
Dec. 7, 2016 05:15 PM EST Reads: 925
"We are a custom software development, engineering firm. We specialize in cloud applications from helping customers that have on-premise applications migrating to the cloud, to helping customers design brand new apps in the cloud. And we specialize in mobile apps," explained Peter Di Stefano, Vice President of Marketing at Impiger Technologies, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 7, 2016 05:15 PM EST Reads: 315
As data explodes in quantity, importance and from new sources, the need for managing and protecting data residing across physical, virtual, and cloud environments grow with it. Managing data includes protecting it, indexing and classifying it for true, long-term management, compliance and E-Discovery. Commvault can ensure this with a single pane of glass solution – whether in a private cloud, a Service Provider delivered public cloud or a hybrid cloud environment – across the heterogeneous enter...
Dec. 7, 2016 05:15 PM EST Reads: 1,741
@DevOpsSummit taking place June 6-8, 2017 at Javits Center, New York City, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @DevOpsSummit at Cloud Expo New York Call for Papers is now open.
Dec. 7, 2016 05:00 PM EST Reads: 1,916
Everyone knows that truly innovative companies learn as they go along, pushing boundaries in response to market changes and demands. What's more of a mystery is how to balance innovation on a fresh platform built from scratch with the legacy tech stack, product suite and customers that continue to serve as the business' foundation. In his General Session at 19th Cloud Expo, Michael Chambliss, Head of Engineering at ReadyTalk, discussed why and how ReadyTalk diverted from healthy revenue and mor...
Dec. 7, 2016 04:30 PM EST Reads: 1,674
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Dave McCarthy, Director of Products at Bsquare Corporation; Alan Williamson, Principal...
Dec. 7, 2016 04:15 PM EST Reads: 344
"Qosmos has launched L7Viewer, a network traffic analysis tool, so it analyzes all the traffic between the virtual machine and the data center and the virtual machine and the external world," stated Sebastien Synold, Product Line Manager at Qosmos, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 7, 2016 04:15 PM EST Reads: 783
President Obama recently announced the launch of a new national awareness campaign to "encourage more Americans to move beyond passwords – adding an extra layer of security like a fingerprint or codes sent to your cellphone." The shift from single passwords to multi-factor authentication couldn’t be timelier or more strategic. This session will focus on why passwords alone are no longer effective, and why the time to act is now. In his session at 19th Cloud Expo, Chris Webber, security strateg...
Dec. 7, 2016 04:15 PM EST Reads: 339
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU's GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes. In...
Dec. 7, 2016 04:00 PM EST Reads: 1,277
In his session at Cloud Expo, Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, provideed economic scenarios that describe how the rapid adoption of software-defined everything including cloud services, SDDC and open networking will change GDP, industry growth, productivity and jobs. This session also included a drill down for several industries such as finance, social media, cloud service providers and pharmaceuticals.
Dec. 7, 2016 03:48 PM EST Reads: 264
The 20th International Cloud Expo has announced that its Call for Papers is open. Cloud Expo, to be held June 6-8, 2017, at the Javits Center in New York City, brings together Cloud Computing, Big Data, Internet of Things, DevOps, Containers, Microservices and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal ...
Dec. 7, 2016 03:45 PM EST Reads: 2,254
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Dec. 7, 2016 03:30 PM EST Reads: 1,775
"IoT is going to be a huge industry with a lot of value for end users, for industries, for consumers, for manufacturers. How can we use cloud to effectively manage IoT applications," stated Ian Khan, Innovation & Marketing Manager at Solgeniakhela, in this SYS-CON.tv interview at @ThingsExpo, held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 7, 2016 02:30 PM EST Reads: 4,314
[slides] Agility for Digital Transformation | @CloudExpo @NewhouseConsult #Agile #DigitalTransformation
Successful digital transformation requires new organizational competencies and capabilities. Research tells us that the biggest impediment to successful transformation is human; consequently, the biggest enabler is a properly skilled and empowered workforce. In the digital age, new individual and collective competencies are required. In his session at 19th Cloud Expo, Bob Newhouse, CEO and founder of Agilitiv, drew together recent research and lessons learned from emerging and established compa...
Dec. 7, 2016 02:30 PM EST Reads: 941
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
Dec. 7, 2016 02:24 PM EST Reads: 323
Financial Technology has become a topic of intense interest throughout the cloud developer and enterprise IT communities. Accordingly, attendees at the upcoming 20th Cloud Expo at the Javits Center in New York, June 6-8, 2017, will find fresh new content in a new track called FinTech.
Dec. 7, 2016 02:15 PM EST Reads: 2,199