|By Business Wire||
|February 25, 2013 12:35 PM EST||
RSA Conference 2013, the world’s largest information security event, takes place February 25 through March 1, 2013 at the Moscone Center in San Francisco.
Links to important information:
RSA Conference Sponsor and Exhibitor News:
Follow the RSA Conference on twitter (official hashtag is #RSAC):
Listed below are RSA Conference 2013 exhibitor profiles.
Accellion, Inc. provides enterprise class mobile file sharing solutions to enable secure, anytime, anywhere access to information while ensuring enterprise security and compliance. More than 11 million users and 1,700 of the world’s leading organizations and government agencies use Accellion to protect intellectual property, ensure compliance, improve business productivity and reduce IT costs. Accellion file sharing solutions can be deployed in public, private and hybrid cloud environments and provide the ease-of-use business users need while giving the enterprise the flexibility, scalability and protection it needs. For more information, please visit www.accellion.com or call (650)-485-4300.
Becrypt, a leading supplier to national, federal and local governments, law enforcement agencies, and other organizations, announces the availability of DISK Protect Windows 8 for Tablet. This significantly extends the range of touch-screen tablets that run Becrypt’s full disk encryption solution. The solution includes on-screen, touch friendly pre-boot authentication, enabling login/authentication before the operating system boots, avoiding authenticating after a machine may already be compromised.
DISK Protect provides 256 bit encryption and is available in several different accredited versions including FIPS 140.2 making it suitable for U.S. and Canadian Federal governments and organizations requiring a FIPS compliant solution.
|Ticker Symbol & Exchange:||NASDAQ: CA|
|CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data, identities and access, from the data center to the cloud. Specializing in identity and access management and data protection, CA Technologies solutions help organizations find the balance between securing and protecting the business and enabling the business for transformative growth.|
|Core Security is the leading provider of predictive security intelligence solutions for enterprises and government organizations. We help more than 1,400 customers worldwide preempt critical security threats throughout their IT environments, and communicate the risk the threats pose to the business. Our patented, proven, award-winning enterprise solutions are backed by more than 15 years of applied expertise from CoreLabs, the company’s innovative security research center. For more information, visit www.coresecurity.com.|
|CounterTack, the industry’s first and only in-progress attack intelligence and response solution provider, was born out of the critical need to develop new security approaches for enterprise and government organizations. The detection gap persists despite massive investments and continuing advancements in security technologies, with cyber attacker innovations outpacing cyber defenses. CounterTack is leading the way on new approaches for deeper security intelligence monitoring and faster attack response. To learn more, visit www.CounterTack.com.|
Coverity, Inc., (www.coverity.com), the leader in development testing, is the trusted standard for companies that need to protect their brands and bottom lines from software failures. More than 1,100 Coverity customers use the Coverity® Development Testing Platform to automatically test source code for software defects that could lead to product crashes, unexpected behavior, security breaches or catastrophic failure. Coverity is a privately held company headquartered in San Francisco.
|Cyber-Ark® Software is a global information security company that specializes in protecting and managing privileged users, sessions, applications and sensitive information to improve compliance, productivity and protect organizations against insider threats and advanced external threats. With its award-winning Privileged Identity Management, Privileged Session Management and Sensitive Information Management Suites, organizations can more effectively manage and govern data center access and activities, whether on-premise, off-premise or in the cloud, while demonstrating returns on security investments. Cyber-Ark works with more than 1,200 customers, including more than 40 percent of the Fortune 100. Headquartered in Newton, Mass., Cyber-Ark has offices and authorized partners in North America, Europe and Asia Pacific.|
|Cypherbridge addresses the cyber threats to new devices flooding onto global networks every day.|
|Software development kits from Cypherbridge target embedded, small to medium memory applications in vertical markets, where space, power and performance are carefully balanced.|
|Our customized device software solutions include SSL/TSL public-key infrastructure, security and encryption SDK, SSH embedded SDK, and uLoad secure boot loader and distribution server. The VPN SDK implements IPsec/IKE for a cryptographically secure solution for IP packet and firewall defense. The new Cloud Device Kit launched with Express Logic lets users connect securely the cloud faster and simpler through JSON and XMPP.|
DB Networks is innovating behavioral analysis based database security equipment for organizations who need to protect their data from advanced attacks. DB Networks ADF-4200 Adaptive Database Firewall is an effective countermeasure against SQL Injection and database Denial of Service attacks. Unlike traditional database security solutions, which require extensive customization and time-consuming white list/black list maintenance, DB Networks ADF-4200 automatically learns each application's proper SQL behavior. Any SQL transaction which subsequently deviates from the model immediately raises an alarm as an attack. DB Networks is privately held and headquartered in San Diego, California. For additional information, please visit us at dbnetworks.com.
|Elliptic Technologies is a leading provider of embedded security hardware cores and software to SoC manufacturers, OEMs, service and content providers. Elliptic's highly-integrated solutions help secure products in markets such as mobile, networking, home entertainment, smart grid and automotive. Elliptic's hardware security cores enable designers to efficiently balance power, performance and silicon area and cover a wide variety of cryptographic cores, public key accelerators, true random generators and protocol processors. Elliptic features DRM and content protection solutions for downloading and sharing premium content between multiple devices, including DTCP-IP and HDCP SDKs built for "trusted execution environments" used in consumer electronics.|
|FireMon is the industry leader in providing enterprises, government and managed services providers with advanced security management solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite -- Security Manager, Policy Planner and Risk Analyzer -- enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.|
|Ticker Symbol & Exchange:||NASDAQ: FTNT|
|Fortinet (NASDAQ: FTNT) is a worldwide provider of network security appliances and a market leader in unified threat management (UTM). Our products and subscription services provide broad, integrated and high-performance protection against dynamic security threats while simplifying the IT security infrastructure. Customers include enterprises, service providers and the majority of the 2012 Fortune Global 100. Fortinet's FortiGate products delivers ASIC-accelerated performance and integrates multiple layers of security designed to protect against application and network threats. Fortinet's product line goes beyond UTM to help secure the extended enterprise - from endpoints, to the perimeter and the core, including databases and applications.|
|Company:||Global Knowledge Training|
|Global Knowledge is the worldwide leader in IT and business skills training, with more than 1,500 courses that span foundational and specialized training and certifications. Our core training is focused on Cisco, Microsoft, Avaya, VMware, Red Hat, business process improvement, and leadership development. We deliver via training centers, private facilities, and the Internet, enabling our customers to choose when, where, and how they want to receive training programs and learning services. Global Knowledge employs more than 1,300 people worldwide and is headquartered in Cary, N.C. The company is owned by New York-based investment firm MidOcean Partners. Learn more at www.globalknowledge.com.|
|Booth:||3107, Hall B|
|GreenSQL is the world’s #1 installed database security solution.|
|GreenSQL’s unified software solution provides database security, Database Activity Monitoring (DAM), and Dynamic Data Masking in one product that addresses today’s database security needs for all organizations. GreenSQL is easy to install and manage and can be up and running in your organization in a matter of minutes. As the leader of the largest community of database administrators, we ensure that our solutions are always suited and updated for the latest market needs. GreenSQL supports Microsoft Azure, SQL Server, MySQL, PostgreSQL, Amazon RDS and Maria DB database applications.|
|The International Association of Privacy Professionals (IAPP) is the largest and most comprehensive global information privacy community and resource, helping practitioners develop and advance their careers and organizations manage and protect their data. Founded in 2000, the IAPP is a not-for-profit association that helps define, support and improve the privacy profession through networking, education and certification. More than just a professional association, the IAPP provides a home for privacy professionals around the world to gather, share experiences and enrich their knowledge.|
|With more than 20 years of individual experience in IT security, Keypasco’s founders are the minds behind some of the revolutionary two factor authentication technology solutions used by leading Internet banks today. And they have brought their knowledge to their new business: Keypasco.|
Keypasco develops secure software based authentication solution, which is designed and customized to be used on trusted devices. Keypasco delivers on society’s expanding needs for personal authentication services, and identity protection within Internet banking, online gaming, eCommerce, mobile Commerce, mobile payment and eGovernment. Keypasco’s vision is to be a leading supplier of services for securing cloud services.
|Klocwork® helps developers create more secure software. Our tools analyze source code on-the-fly, simplify peer code reviews and extend the life of complex software. Over 1000 customers, including the biggest brands in the mobile device, consumer electronics, medical technologies, telecom, automotive, military and aerospace sectors, have made Klocwork part of their software development process. Tens of thousands of software developers, architects and development managers rely on our tools everyday to improve their productivity while creating better software.|
|Company:||Linoma Software | GoAnywhere|
|Founded in 1994, Linoma Software is a global provider of enterprise software solutions that keep data secure at rest and in motion to help companies meet compliance regulations such as HIPAA, PCI DSS, SOX, GLBA and state privacy regulations. Our GoAnywhere suite is an on-site, browser-based managed file transfer solution for the enterprise that can be installed on almost any platform using FTPS, SFTP, HTTPS, AS2 communication protocols, and popular encryption standards such as Open PGP, GPG, AES and FIPS 140-2. Visit http://www.GoAnywhereMFT.com for more information or to download a free trial.|
|NetIQ is a global, enterprise software company with a relentless focus on customer success. Our award-winning solution portfolio includes scalable, automated solutions for Identity, Security, Access, Governance, Systems and Application, Service, and Workload Management that help organizations intelligently secure, manage and measure across hybrid IT environments in a cost-effective manner.|
|OneLogin is the innovator in enterprise identity management with 700 enterprise customers in 34 countries, including AAA, Gensler, Netflix, News Corp International, Pandora, Red Hat, Steelcase and PBS. The company provides the industry’s most comprehensive solution for managing user identities in the cloud and behind the firewall. Unique capabilities like Cloud Search and OneLogin for iPad break down SaaS data silos and increase productivity. OneLogin’s cloud identity platform comes complete with secure single sign-on for web, mobile and iPad, federated search, user provisioning, deep directory integration with real-time user sync, out-of-band multi-factor authentication, VPN integration and compliance reporting. Follow @onelogin.|
|OPSWAT is the leading provider of software management technologies and multiple antivirus engine scanning solutions. OPSWAT’s OESIS Framework, an SDK for detecting and managing thousands of third-party software applications, is used by leading SSL VPN and NAC vendors and is showcased in the free OPSWAT Security Score tool (www.opswat.com/products/security-score). AppRemover SDK allows for easy uninstallation of security and file sharing applications. Try the free demo at www.appremover.com. OPSWAT’s Metascan technology allows enterprises, government agencies, and software vendors to integrate up to 30 anti-malware engine scanning into their workflows. Try www.metascan-online.com, the free online implementation of Metascan for scanning uploaded files.|
|Web:||www.phishnix.com / www.aujas.com|
|Phishnix is a Phishing Diagnostic Solution which enables organizations to enhance their security posture against social engineering attacks. Through assessment and awareness training, Phishnix provides valuable information regarding the health of your organization’s human firewall. A simulated phishing attack, coupled with a teaching moment that provides a customized educational experience, increases the effectiveness of remediation. Phishnix is powered by Aujas, a Global Information Risk Management (IRM) services company. Phishnix consultants are certified information security professionals and will work with you to create a realistic phishing scenario. Strengthen your human firewall with Phishnix.|
|Company:||PistolStar, Inc. dba PortalGuard|
|Are you avoiding two-factor authentication due to high cost and low user adoption? You might be interested in the unique way in which PortalGuard PassiveKey™ delivers two-factor which requires no hardware, no interaction from the user, no recurring costs, and no change to the user experience. It is 100% transparent to the user, offers strong authentication and is easy to deploy.|
|PortalGuard’s Authentication Platform delivers five complimentary authentication layers including two-factor (SMS, voice, printed, email) plus transparent user authentication, self-service password reset/recovery, SAML single sign-on, and password sync in one encompassing platform.|
|Portcullis is a leading international specialist in Cyber Security Services.|
|We provide Security testing services, Computer Forensics and Incident Response for both the public and private sectors.|
|Here at Portcullis, information security is our business. We provide our clients with the reassurance that their systems, networks and web sites are secure from threat of attack from unauthorized sources;|
|We are also proud to represent Mavituna Security and their web application scanning tool, Netsparker.|
|Mavituna together with Portcullis is launching ScanToSecure, the Saas version of Netsparker, this week at RSA. Come check it out at the Portcullis booth (3007).|
|Premio is a flexible US-based ODM/OEM global technology solution provider of design, assembly, test, manufacturing, system integration and supply chain services. We are unique in our ability to provide transparent end-to-end support that delivers the proven results that our OEM and ODM customers have come to expect. Unlike most contract manufacturers, our design experts are ready to work with our customers to increase product design and reliability, optimize efficiency and reduce costs. Premio can accommodate service level and volume requirements of any complexity. For more information about Premio, please contact the Marketing Department at 800.9.PREMIO or visit: premioinc.com.|
|Prolexic, the world’s largest, most trusted Distributed Denial of Service (DDoS) mitigation provider, restores mission-critical Internet-facing infrastructures within minutes. Ten of the world’s largest banks and the leading companies in e-Commerce, SaaS, payment processing, travel/hospitality, gaming and other at-risk industries work with Prolexic because DDoS Attacks End Here. www.prolexic.com.|
|Pwnie Express is the premier global provider of innovative, cost effective, rapid deployment penetration testing products. Their products are used by service providers, Fortune 50 companies and the federal government. Their newly released Enterprise Pentesting Appliance (EPA) enables coverage to large numbers of remote offices, persistent pentesting functionality and centralized management capabilities. They are announcing the release of the industry-re-defining Pwn Pad, a tablet, loaded with wired and external wireless pentesting tools (currently available for pre-order with 1 April ship date). Pwnie Express was selected as a 2012 Industry Innovator in Analysis and Testing by SC Magazine.|
|Founded in 2002, Secunia is the leading provider of IT security solutions that help businesses and private individuals globally manage and control vulnerability threats and risks across their networks and endpoints. Secunia’s proven, complementary portfolio aids businesses in their handling of complex IT security risks and compliance requirements across industries and sectors – a key component in corporate risk management assessment, strategy, and implementation. Secunia plays an important role in the IT security ecosystem, and is the preferred supplier for enterprises and government agencies worldwide, counting Fortune 500 and Global 2000 businesses among its customer base.|
|SilverSky is the expert provider of cloud security solutions. Born from our success as a managed services provider, our Security-as-a-Service platform delivers cloud-based software and managed services that protect critical information simply and cost effectively. By tirelessly safeguarding our customers’ most important information, we enable growth-minded leaders to pursue their business ambitions without security worry. Our growing customer base includes 6,000 organizations in the financial services, retail, healthcare, energy, critical infrastructure and manufacturing sectors. For more information, visit SilverSky.com.|
|More than 100 million users in 150 countries rely on Sophos’ complete security solutions as the best protection against complex threats and data loss. Simple to deploy, manage, and use, Sophos’ award-winning encryption, endpoint security, web, email, mobile and network security solutions are backed by SophosLabs - a global network of threat intelligence centers.|
|Sophos is headquartered in Boston, US and Oxford, UK. More information is available at www.sophos.com.|
|SPYRUS, Inc. develops and manufactures hardware-based encryption, authentication, and digital content security products. Featured products at RSA in 2013 include Secure Portable Workplace, our encrypted Microsoft certified Windows To Go drive that boots Windows 8; Rosetta hardware-based encryption devices in multiple form factors; and the cross-platform PocketVault Encryptor applications for computers, tablets, and phones.|
|SPYRUS holds patents in the U.S. and abroad. Secured by SPYRUS™ security technology is proudly designed, engineered, and manufactured in the USA to meet FIPS 140-2 Level 3 standards.|
|SPYRUS is a privately held company headquartered in San Jose, California.|
|Company:||Tenable Network Security|
|Tenable Network Security is relied on by security and compliance professionals at many of the world's largest companies and governments, to stay ahead of emerging vulnerabilities, threats, and compliance-related risks. Its Nessus and SecurityCenter solutions set the standard for identifying vulnerabilities, preventing attacks, and complying with regulatory requirements. http://www.tenable.com|
|TITUS is a leading provider of security and data governance software that helps organizations share information securely while meeting policy and compliance requirements. With over 2 million users worldwide, our solutions enable enterprises, military and government organizations to classify and secure unstructured information. Products include TITUS Classification, the leading message, document and file classification and labeling solutions that enhance data loss prevention by involving end users in identifying sensitive information; TITUS Mobile, a mobile email solution for securely sending email and viewing attachments on mobile devices; and the TITUS family of classification and security solutions for Microsoft SharePoint.|
|Trustwave is a leading provider of compliance, Web, application, network and data security solutions delivered through the cloud, managed security services, software and appliances. For organizations faced with today's challenging data security and compliance environment, Trustwave provides a unique approach with comprehensive solutions that include its TrustKeeper® portal and other proprietary security solutions. Trustwave has helped hundreds of thousands of organizations--ranging from Fortune 500 businesses and large financial institutions to small and medium-sized retailers--manage compliance and secure their network infrastructures, data communications and critical information assets. Trustwave is headquartered in Chicago with offices worldwide. For more information, visit https://www.trustwave.com.|
|Verdasys provides Enterprise Information Protection solutions and managed services to secure sensitive data and business processes, enabling midsize and global businesses to successfully compete in collaborative and mobile environments. Digital Guardian is a proven technology platform providing policy-based data lifecycle monitoring, classification, control and forensics on endpoints, servers, virtual machines, enterprise applications, networks, mobile devices and cloud environments. Digital Guardian protects IP and regulated data from compromise by insiders, contractors, partners and targeted cyberattacks. Since 2003, millions of Digital Guardian agents have been deployed to protect critical data for global leaders in financial services, insurance, technology, manufacturing and healthcare industries.|
|Company:||Wombat Security Technologies, Inc.|
|Wombat Security Technologies, Inc. is the first and only company to offer a complete suite of anti-phishing and security awareness products that leverage progressive training techniques of professional educators to effectively improve human response against cyber-attacks over 80%. Wombat’s breakthrough software-based training solutions teach users how to recognize and avoid the most advanced attacks involving phishing, social networking, smartphones, and working outside of the office. They also offer training for and PCI-DSS and PII compliance.|
|Fortune 1000 companies, large government agencies, and small to medium businesses around the world are successfully using Wombat’s training solutions to significantly improve their security posture.|
|Learn more at www.wombatsecurity.com.|
Business Wire is the official news wire & online press kit service for the RSA Conference 2013. Breaking news releases, press kits, and multimedia are available at Tradeshownews.com, Business Wire's trade show, conference, and event news resource.
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Public relations and investor relations professionals rely on Business Wire for both broad-based and targeted market reach. A recognized disclosure service in the United States, Canada and a dozen European countries, Business Wire handles document formatting and regulatory filing into EDGAR, SEDAR and other systems. Professional communicators from public and private companies, government agencies, advocacy groups and more rely on Business Wire for both broad-based and targeted reach -- with IR services for public companies and PR services that include Public Policy, LatinoWire and Corporate Social Responsibility. Business Wire provides online newsroom hosting and integration services as well as search engine optimization, mobile distribution and detailed measurement on every press release. Its patented NX delivery platform provides simultaneous full-text posting of Business Wire content to news systems and websites in virtually any country or language. With 31 bureaus worldwide, Business Wire offers local service and global reach.
- APM Convergence: Monitoring vs. Management
- RSA Conference USA 2014 Exhibitor Profiles (A through L)
- APM & MoM - Symbiotic Solution Sets
- RSA Conference USA 2014 Exhibitor Profiles (M Through Z)
- How to Performance Test Automation for GWT and SmartGWT
- Compuware APM Extends Leadership in Big Data
- Will These Five Websites Make the Same Mistake Twice During the Big Game?
- MicroStrategy Positioned in the "Leaders" Quadrant of 2014 Magic Quadrant for Business Intelligence and Analytics Platforms Report
- The Great Java 8 Debate
- Compuware APM Introduces Smart Network Packet Capture and Analysis
- Interop Las Vegas Previews Announcements From More Than 100 Exhibitors and Sponsors
- Software Quality Metrics for Your Continuous Delivery Pipeline | Part I
- Mainstream Business Applications and In-Memory Databases
- APM Convergence: Monitoring vs. Management
- Working with Project Management Software – Who Is Managing Who?
- Donald Fischer Joins General Catalyst as Venture Partner
- RSA Conference USA 2014 Exhibitor Profiles (A through L)
- APM & MoM - Symbiotic Solution Sets
- RSA Conference USA 2014 Exhibitor Profiles (M Through Z)
- How to Performance Test Automation for GWT and SmartGWT
- Compuware APM Extends Leadership in Big Data
- The Top Five Benefits of Cloud Computing
- Will These Five Websites Make the Same Mistake Twice During the Big Game?
- Achieving Agile Transformation with Kanban, Kotter, and Lean Startup
- Building a Drag-and-Drop Shopping Cart with AJAX
- What Is AJAX?
- Google Maps! AJAX-Style Web Development Using ASP.NET
- Where Are RIA Technologies Headed in 2008?
- How and Why AJAX, Not Java, Became the Favored Technology for Rich Internet Applications
- Flashback to January 2006: Exclusive SYS-CON.TV Interviews on "OpenAjax Alliance" Announcement
- "Real-World AJAX" One-Day Seminar Arrives in Silicon Valley
- AJAXWorld Conference & Expo to Take Place October 2-4, 2006, at the Santa Clara Convention Center, California
- AJAX Sponsor Webcasts Are Now Available at AJAXWorld Website
- AJAXWorld University Announces AJAX Developer Bootcamp
- Dolphin Announces Open API With Over 50 Add-ons Including Dropbox and Wikipedia
- AJAX Support In JadeLiquid WebRenderer v3.1
More and more enterprises today are doing business by opening up their data and applications through APIs. Though forward-thinking and strategic, exposing APIs also increases the surface area for potential attack by hackers. To benefit from APIs while staying secure, enterprises and security architects need to continue to develop a deep understanding about API security and how it differs from traditional web application security or mobile application security. In his session at 14th Cloud Expo, Sachin Agarwal, VP of Product Marketing and Strategy at SOA Software, will walk you through the various aspects of how an API could be potentially exploited. He will discuss the necessary best practices to secure your data and enterprise applications while continue continuing to support your business’s digital initiatives.
Apr. 16, 2014 03:26 PM EDT Reads: 583
The revolution that happened in the server universe over the past 15 years has resulted in an eco-system that is more open, more democratically innovative and produced better results in technically challenging dimensions like scale. The underpinnings of the revolution were common hardware, standards based APIs (ex. POSIX) and a strict adherence to layering and isolation between applications, daemons and kernel drivers/modules which allowed multiple types of development happen in parallel without hindering others. Put simply, today's server model is built on a consistent x86 platform with few surprises in its core components. A kernel abstracts away the platform, so that applications and daemons are decoupled from the hardware. In contrast, networking equipment is still stuck in the mainframe era. Today, networking equipment is a single appliance, including hardware, OS, applications and user interface come as a monolithic entity from a single vendor. Switching between different vendor'...
Apr. 16, 2014 12:26 PM EDT Reads: 634
You use an agile process; your goal is to make your organization more agile. What about your data infrastructure? The truth is, today’s databases are anything but agile – they are effectively static repositories that are cumbersome to work with, difficult to change, and cannot keep pace with application demands. Performance suffers as a result, and it takes far longer than it should to deliver on new features and capabilities needed to make your organization competitive. As your application and business needs change, data repositories and structures get outmoded rapidly, resulting in increased work for application developers and slow performance for end users. Further, as data sizes grow into the Big Data realm, this problem is exacerbated and becomes even more difficult to address. A seemingly simple schema change can take hours (or more) to perform, and as requirements evolve the disconnect between existing data structures and actual needs diverge.
Apr. 16, 2014 12:15 PM EDT Reads: 1,167
Cloud backup and recovery services are critical to safeguarding an organization’s data and ensuring business continuity when technical failures and outages occur. With so many choices, how do you find the right provider for your specific needs? In his session at 14th Cloud Expo, Daniel Jacobson, Technology Manager at BUMI, will outline the key factors including backup configurations, proactive monitoring, data restoration, disaster recovery drills, security, compliance and data center resources. Aside from the technical considerations, the secret sauce in identifying the best vendor is the level of focus, expertise and specialization of their engineering team and support group, and how they monitor your day-to-day backups, provide recommendations, and guide you through restores when necessary.
Apr. 16, 2014 09:45 AM EDT Reads: 1,170
Cloud scalability and performance should be at the heart of every successful Internet venture. The infrastructure needs to be resilient, flexible, and fast – it’s best not to get caught thinking about architecture until the middle of an emergency, when it's too late. In his interactive, no-holds-barred session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, will dive into how to design and build-out the right cloud infrastructure.
Apr. 16, 2014 08:00 AM EDT Reads: 1,151
SYS-CON Events announced today that SherWeb, a long-time leading provider of cloud services and Microsoft's 2013 World Hosting Partner of the Year, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. A worldwide hosted services leader ranking in the prestigious North American Deloitte Technology Fast 500TM, and Microsoft's 2013 World Hosting Partner of the Year, SherWeb provides competitive cloud solutions to businesses and partners around the world. Founded in 1998, SherWeb is a privately owned company headquartered in Quebec, Canada. Its service portfolio includes Microsoft Exchange, SharePoint, Lync, Dynamics CRM and more.
Apr. 15, 2014 10:30 AM EDT Reads: 1,366
The world of cloud and application development is not just for the hardened developer these days. In their session at 14th Cloud Expo, Phil Jackson, Development Community Advocate for SoftLayer, and Harold Hannon, Sr. Software Architect at SoftLayer, will pull back the curtain of the architecture of a fun demo application purpose-built for the cloud. They will focus on demonstrating how they leveraged compute, storage, messaging, and other cloud elements hosted at SoftLayer to lower the effort and difficulty of putting together a useful application. This will be an active demonstration and review of simple command-line tools and resources, so don’t be afraid if you are not a seasoned developer.
Apr. 15, 2014 10:00 AM EDT Reads: 1,684
SYS-CON Events announced today that BUMI, a premium managed service provider specializing in data backup and recovery, will exhibit at SYS-CON's 14th International Cloud Expo®, which will take place on June 10–12, 2014, at the Javits Center in New York City, New York. Manhattan-based BUMI (Backup My Info!) is a premium managed service provider specializing in data backup and recovery. Founded in 2002, the company’s Here, There and Everywhere data backup and recovery solutions are utilized by more than 500 businesses. BUMI clients include professional service organizations such as banking, financial, insurance, accounting, hedge funds and law firms. The company is known for its relentless passion for customer service and support, and has won numerous awards, including Customer Service Provider of the Year and 10 Best Companies to Work For.
Apr. 14, 2014 09:00 AM EDT Reads: 1,575
Chief Security Officers (CSO), CIOs and IT Directors are all concerned with providing a secure environment from which their business can innovate and customers can safely consume without the fear of Distributed Denial of Service attacks. To be successful in today's hyper-connected world, the enterprise needs to leverage the capabilities of the web and be ready to innovate without fear of DDoS attacks, concerns about application security and other threats. Organizations face great risk from increasingly frequent and sophisticated attempts to render web properties unavailable, and steal intellectual property or personally identifiable information. Layered security best practices extend security beyond the data center, delivering DDoS protection and maintaining site performance in the face of fast-changing threats.
Apr. 12, 2014 02:00 PM EDT Reads: 1,761
From data center to cloud to the network. In his session at 3rd SDDC Expo, Raul Martynek, CEO of Net Access, will identify the challenges facing both data center providers and enterprise IT as they relate to cross-platform automation. He will then provide insight into designing, building, securing and managing the technology as an integrated service offering. Topics covered include: High-density data center design Network (and SDN) integration and automation Cloud (and hosting) infrastructure considerations Monitoring and security Management approaches Self-service and automation
Apr. 12, 2014 01:00 PM EDT Reads: 1,568
In his session at 14th Cloud Expo, David Holmes, Vice President at OutSystems, will demonstrate the immense power that lives at the intersection of mobile apps and cloud application platforms. Attendees will participate in a live demonstration – an enterprise mobile app will be built and changed before their eyes – on their own devices. David Holmes brings over 20 years of high-tech marketing leadership to OutSystems. Prior to joining OutSystems, he was VP of Global Marketing for Damballa, a leading provider of network security solutions. Previously, he was SVP of Global Marketing for Jacada where his branding and positioning expertise helped drive the company from start-up days to a $55 million initial public offering on Nasdaq.
Apr. 11, 2014 08:30 AM EDT Reads: 1,764
Performance is the intersection of power, agility, control, and choice. If you value performance, and more specifically consistent performance, you need to look beyond simple virtualized compute. Many factors need to be considered to create a truly performant environment. In his General Session at 14th Cloud Expo, Marc Jones, Vice President of Product Innovation for SoftLayer, will explain how to take advantage of a multitude of compute options and platform features to make cloud the cornerstone of your online presence.
Apr. 8, 2014 11:00 AM EDT Reads: 2,002 Replies: 1
Are you interested in accelerating innovation, simplifying deployments, reducing complexity, and lowering development costs? The cloud is changing the face of application development and deployment, with enterprise-grade infrastructure and platform services making it possible for you to build and rapidly scale enterprise applications. In his session at 14th Cloud Expo, Gene Eun, Sr. Director, Oracle Cloud at Oracle, will discuss the latest solutions and strategies for application developers and enterprise IT organizations to leverage Infrastructure as a Service (IaaS) and Platform as a Service (PaaS) to build and deploy modern business applications in the cloud.
Apr. 8, 2014 08:00 AM EDT Reads: 2,139
Hybrid cloud refers to the federation of a public and private cloud environment for the purpose of extending the elastic and flexibility of compute, storage and network capabilities, in an on-demand, pay-as-you go basis. The hybrid approach allows a business to take advantage of the scalability and cost-effectiveness that a public cloud computing environment offers without exposing mission-critical applications and data to third-party vulnerabilities. Hybrid cloud environments involve complex management challenges. First, organizations struggle to maintain control over the resources that lie outside of their managed IT scope. They also need greater infrastructure visibility to help reduce maintenance costs and ensure that their company data and resources are properly handled and secured.
Apr. 8, 2014 08:00 AM EDT Reads: 1,959
As more applications and services move "to the cloud" (public or on-premise), cloud environments are increasingly adopting and building out traditional enterprise features. This in turn is enabling and encouraging cloud adoption from enterprise users. In many ways the definition is blurring as features like continuous operation, geo-distribution or on-demand capacity become the norm. At NuoDB we're involved in both building enterprise software and using enterprise cloud capabilities. In his session at 14th Cloud Expo, Seth Proctor, CTO of NuoDB, Inc., will cover experiences from building, deploying and using enterprise services and suggest some ways to approach moving enterprise applications into a cloud model.
Apr. 7, 2014 08:00 AM EDT Reads: 1,887