|By Business Wire||
|February 20, 2014 02:01 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles A through L.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|Accellion, Inc. is an award-winning private company that provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world's leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs.|
|AFORE Solutions is a leading provider of advanced data security and encryption management solutions that protect sensitive customer information in multi-tenant private, public and hybrid clouds and virtualized infrastructures. AFORE’s award-winning CloudLink® platform is the industry’s most complete encryption management platform for protecting workloads deployed in the cloud. The innovative platform provides customers the security foundation to protect mission-critical data with a rich suite of encryption modules to meet the diverse deployment and security customer needs. AFORE is a RSA Technology Partner and EMC® Select Business Partner.|
|Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, provides solutions to secure the application and infrastructure stack. By integrating advanced security tools with 24×7 Security Operations Center expertise, customers can defend against security threats and address compliance mandates. With an “as-a-Service” delivery model, Alert Logic solutions include day-to-day security infrastructure management, security experts translating complex data into actionable insight, and flexible deployment options. Built from the ground up to address public and private cloud challenges, Alert Logic partners with over half of the largest cloud and hosting service providers for over 2,400 enterprises.|
|AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1000 of the world's leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.|
|AlgoSec's application-centric approach orchestrates the management of complex policies across firewalls and related network devices, aligning IT teams for improved business agility.|
|AlgoSec is committed to the success of every single customer, and offers the industry's only money-back guarantee. For more information, visit www.AlgoSec.com.|
|Company:||AMAX Information Technologies|
|AMAX is a global leader in x86 OEM appliance design and manufacturing. For companies that have a winning software product and want to increase their ROI by selling a complete integrated platform, AMAX offers a full menu of services, including:|
|•Product Lifecycle & Supply Chain Management|
|•Compliance & Regulatory Consulting|
|•Try & Buy Program Support and Refurbishing Services|
|In addition, AMAX offers:|
|•NPI Services, including Design and Prototyping|
|AMAX designs, manufactures and supports your appliance needs from NPI to global support allowing companies to focus on their core business while going to market with a complete product.|
|Appthority's App Risk Management Service automates the discovery, analysis, and approval of apps present on employee devices. By combining the largest global database of millions of previously analyzed public and enterprise apps with a policy management engine, Appthority automates app review and approval of new apps and enables custom, acceptable use policies for thousands of employees within minutes. Appthority enables companies to leverage mobility and empower a smarter, safer, mobile workforce. Appthority has scanned over 2 million Android and iOS mobile apps for global organizations and currently has over 188 organizations worldwide evaluating and using the Appthority Service.|
|Booth:||3237 North Hall|
|Ticker Symbol & Exchange:||NYSE: CUDA|
|Barracuda provides cloud-connected security and storage solutions that simplify IT. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda’s customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security. For additional information, please visit http://www.barracuda.com.|
|BehavioSec offers Behavioural biometric solutions in order to create a-multi layered approach for authentication & verification purposes. The solution is designed to tackle the demands for greater security without impacting user experience.|
|The technology analyzes behavior such as keystroke and/or mobile interface dynamics. The user’s behavior is mapped against their digital ‘fingerprint’ to verify the identity and prevent fraudsters from accessing throughout the session.|
|BehavioSec’s technology has been deployed to millions of mobile and internet banking customers in Europe.|
|BlueCat IP Address Management (IPAM) solutions provide a smarter way to connect mobile devices, applications, virtual environments and clouds. With unified mobile security, address management, automation and self-service, BlueCat offers a rich source of network intelligence that can be put into action to protect your network, reduce IT costs and ensure reliable service delivery. Enterprises and government agencies worldwide trust BlueCat to manage millions of network-connected devices and solve real business and IT challenges – from secure, risk-free BYOD to virtualization, cloud automation and IPv6.|
|Founded in 2000, Brainloop, The Secure Enterprise Information Company, is the market-leading provider of highly intuitive SaaS solutions that enable customers to securely manage and collaborate on confidential documents and information, whether inside or outside of their IT environments.|
|Brainloop's customers comprise numerous Fortune, FTSE and DAX companies across a wide range of sectors, both private and public. They rely on the software's regulatory and corporate compliance, collaboration and process capabilities of Brainloop, as well its complete portfolio of security features including full encryption, audit trail, two-factor authentication and provider shielding, all with a convenient and easy to use interface.|
|Ticker Symbol & Exchange:||NASDAQ: CA|
|CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data, identities and access, from the data center to the cloud. Specializing in identity and access management, data and API protection, CA Technologies solutions help protect the open enterprise and find the balance between protecting the business and enabling the business for transformative growth.|
|Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled in all major coding languages and identify its security vulnerabilities.|
|With Checkmarx's CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.|
|Checkmarx's customers include hundreds of Fortune 500, government and SMB organizations in over 30 countries. Checkmarx has been Ranked 69th Fastest Growing Tech Company in EMEA and 8th in Israel by Deloitte.|
|From government installations to corporate PKI applications, enhance your access control and identity management systems with CHERRY. Choose from our selection of FIPS 201 compliant, low cost keyboards and stand-alone devices. From biometrics to high-performance PCSC/EMV smart card readers, CHERRY has the products to meet your needs.|
|CHERRY is a brand of ZF Electronic Systems Pleasant Prairie, LLC, a leader in the design and manufacture of computer keyboards, standard and custom electrical switches, sensors and controls for the worldwide automotive, computer and consumer/commercial OEM markets.|
|Cigital is the world's largest consulting firm specializing in software security and is the global leader in helping organizations design, build, and maintain secure software. We provide a comprehensive range of software security services including consulting, training in both instructor-led and eLearning, mobile application security, and managed services aimed at addressing the potential software and application security risks.|
|Whether it's a simple penetration test or deploying an end-to-end software security program, our experts have both the depth of knowledge and breadth of real-world experience to understand the risks and challenges our clients face each day.|
|Booth:||South Expo, 2115|
|CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, data loss prevention, malware detection, data discovery and activity monitoring. CipherCloud’s ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.|
|Clearswift is trusted by organizations globally to protect their critical information, giving them the freedom to securely collaborate and drive business growth. Built on an innovative Deep Content Inspection engine, our unique Adaptive Redaction technology enables deploying a data loss prevention solution simply and easily, forming the foundation of an Information Governance vision, for organizations to have 100% visibility of their critical information 100% of the time.|
|Clearswift operates world-wide, having regional headquarters in Europe, Asia Pacific and the United States. Clearswift has a partner network of more than 900 resellers across the globe.|
|More information is available at www.clearswift.com.|
|Company:||Cloud Security Alliance|
|Booth:||2433 (South Hall)|
|The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.|
|Company:||Corero Network Security|
|Ticker Symbol & Exchange:||London Stock Exchange: CNS|
|Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide Online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended.|
|Booth:||South Expo 1129|
|As the experts in advanced threat protection and containment, Damballa discovers active threats that bypass all security prevention layers. Damballa identifies evidence of malicious network traffic in real time, rapidly pinpointing the compromised devices that represent the highest risk to a business. Damballa protects any device or OS including PCs, Macs, Unix, iOS, Android, and embedded systems. Damballa protects more than 400 million endpoints globally at enterprises in every major market and for the world's largest ISP and telecommunications providers. For more information, visit www.damballa.com, or follow us on Twitter @DamballaInc.|
|Booth:||901 South Hall|
|DB Networks is an innovating behavioral analysis technology provider in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks. Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures. DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack.|
|Company:||Deja vu Security|
|Deja vu Security is a trusted provider of information security testing products and consulting services to the world’s leading technology companies. It is a recognized industry leader in embedded device security, security fuzz testing, application security, and penetration testing. Its widely adopted security fuzzing product, Peach Fuzzer™, discovers complex, unknown vulnerabilities in software. Security researchers and product testers leverage Peach Fuzzer to find zero – day vulnerabilities in an automated manner. Deja vu Security is based in Seattle and was founded by a group of information security veterans.|
|DeviceLock, Inc., a leader in endpoint data security for 18 years, provides world class enterprise Data Leak Prevention (DLP) software used by financial firms, health care providers, retail entities, Universities, manufacturing firms, government agencies, diplomatic posts, military units, and more. DeviceLock®, ContentLockTM, NetworkLockTM, and the DeviceLock Search ServerTM comprise the DeviceLock Endpoint DLP Suite, an Active Directory Group Policy-managed solution for applying granular, contextual, and content-aware controls to peripheral ports, devices, and network protocols of managed endpoints to any scale. DeviceLock supports Microsoft Windows, Apple OS, and any virtualized Windows hosts or sessions used by “BYOD” devices of any make.|
|Company:||Digital Defense, Inc.|
|Founded in 1999, Digital Defense, Inc. (DDI) is a premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and decisive security intelligence. This proven method bolsters the capability to reduce risk and keep assets and reputations secure. The combination of DDI’s certified security analysts, patent-pending technology and proprietary cloud-based vulnerability management system, Frontline™ Solutions Platform, delivers one of the most powerful assessment results and remediation management solutions available.|
|Booth:||1838 - South Hall|
|Easy Solutions delivers Total Fraud Protection® to over 200 clients, with over 50 million end users. The company’s products protect against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and deliver multifactor authentication and transaction anomaly detection. The company witnessed 80% subscription revenue growth in 2013, marking the best year-over-year growth rate since the company was founded. Easy Solutions is projecting another year of rapid growth with internal forecasts calling for 150% growth in 2014 as the company further expands in the North America and EMEA markets.|
|For more information, visit http://www.easysol.net, or follow us on Twitter @goeasysol.|
|Ticker Symbol & Exchange:||NYSE: EMC|
|Syncplicity is an easy-to-use, enterprise-grade file sync and share solution that is redefining files for the mobile workforce. We give users access to all their files—no matter they reside— on all their devices, online or offline, with no hassles. With a rich and secure mobile, web and desktop experience, our customers can collaborate inside and outside their organization easily, while giving IT professionals the security, manageability, and control they need.|
|Rated a market leader by Forrester Research and other leading analyst firms, Syncplicity is uniquely positioned to lead the next wave of innovation in mobile collaboration for the enterprise.|
|Booth:||2235 South Hall|
|Emerging Threats is a world-leading provider of commercial and open source threat intelligence.|
|Founded in 2003 as a cybersecurity research community, Emerging Threats has become the de facto standard in network-based malware threat detection.|
|The company’s ETOpen Ruleset, ETPro™ Ruleset, and IQRisk™ suite of threat intelligence are platform agnostic for easy integration with Suricata, SNORT®, and other network intrusion protection and detection systems.|
|With ETPro Ruleset, organizations can achieve the highest standards of malicious threat detection with world-class support and research for extended vulnerability coverage. ETPro Ruleset is ideal for enterprises, government agencies, financial institutions, SMBs, higher education, and service providers.|
|For more information, please visit http://www.emergingthreats.net.|
|Company:||Endace division of Emulex|
|Ticker Symbol & Exchange:||NYSE: ELX|
|Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions enabling unrivaled end-to-end application visibility, optimization and acceleration for global networks that support enterprise, cloud, government and telecommunications. The Endace division of Emulex provides network visibility products that deliver complete network performance management at speeds up to 100Gb Ethernet.|
|Company:||ESET North America|
|Booth:||South Expo 1926|
|ESET®, the pioneer of proactive protection and the maker of the award-winning ESET NOD32® technology, is a global provider of security solutions for businesses and consumers. For over 26 years, the Company continues to lead the industry in proactive threat detection. At RSA, ESET will be showcasing the newest version of its two-factor authentication (2FA) application, ESET Secure Authentication. The new release continues to provide the potent combination of ultra-secure access to online applications, while introducing even greater ease of installation and support, for a superior overall user experience.|
|FileTrek (www.filetrek.com), the leader in advance behavioral analytics for threat detection, will debut its new enterprise threat detection platform at the RSA Conference 2014. The FileTrek Platform leverages a patent-pending behavioral analytics engine and detection algorithms to proactively surface attacks against valuable data assets, alert managers to their existence and deliver immediate risk forensics, providing fast and accurate threat detection and on-demand investigations for companies of all sizes. The FileTrek solution is available as a cloud or on-premise solution.|
|Booth:||North Expo 2813|
|Ticker Symbol & Exchange:||NASDAQ FEYE|
|FireEye is disrupting the security industry with a purpose-built, virtual machine-based security platform that provides real-time threat protection against the next generation of cyber attacks. The core of the platform is the FireEye Multi-Vector Virtual Execution (MVX) engine, complemented by FireEye Dynamic Threat Intelligence, which identify and block cyber attacks in real time without the use of threat signatures. In 2013 FireEye acquired Mandiant and is now the only company that delivers one solution to detect, contain, resolve, and prevent threats. FireEye has become the go-to company for some of the largest enterprises and government agencies across the globe with over 1,500 customers across over 40 countries, including over 100 of the Fortune 500.|
|FireMon is the industry leader in providing enterprises, government and managed services providers with proactive security intelligence solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.|
|HBGary provides Incident Response and Threat Intel Management products and services, enabling organizations to rapidly manage the growing volume, variety and complexity of their cyber security events. With HBGary products, customers can proactively detect zero-days, rootkits and other advanced persistent threats, aggregate and correlate threat data from intel feeds, and manage the lifecycle of incidents by automating their response processes. Customers include Fortune 50 corporations and U.S. government agencies. HBGary is located in Sacramento, Calif. and is part of ManTech International Corporation.|
|Ken Silva, President of ManTech Cyber Solutions International, Inc. will be in attendance at RSA.|
|HID Global is the trusted leader in products, services, solutions, and know-how related to the creation, use, and management of secure identities for millions of customers around the world. Recognized for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators, and developers serving a variety of markets. These markets include physical access control; logical access control including strong authentication and credential management; card personalization; visitor management; government ID; and identification technologies for animal ID and industry and logistics applications. Headquartered in Austin, TX, HID Global has over 2,000 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand.|
|Company:||Hillstone Networks, Inc.|
|Hillstone Networks builds intelligent next generation firewalls to protect against Advanced Persistent Threats (ADP) and zero-day attacks. Built from ground up for today’s virtual and cloud-based data centers, Hillstone Network’s fully distributed, intelligent next-generation firewall platform overcomes performance and deployment limitations of legacy firewalls, providing granular visibility and control of network traffic, based on real-time behavioral anomaly detection and advanced data analytics. Established in 2006 by NetScreen, Cisco and Juniper executives, over 5,000 customers worldwide use our proven high-performance, network security solutions, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks is headquartered in Sunnyvale, California.|
|HyTrust is the Cloud Security Automation company. Its virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of catastrophic failure — especially in light of the concentration of risk that occurs within virtualization and cloud environments. Organizations can now confidently take full advantage of the cloud, and even broaden deployment to mission-critical applications. The Company is backed by top tier investors VMware, Cisco, Intel, In-Q-Tel, Fortinet, Granite Ventures, Trident Capital and Epic Ventures; its partners include VMware, VCE, Symantec, CA, McAfee, Splunk; HP Arcsight, Accuvant, RSA and Intel.|
|Company:||iboss Network Security|
|iboss Network Security engineers highly scalable Web security solutions providing layer 7 defense across HTTP, SSL, threat and applications securing mobile devices on or off network. iboss enables organizations to safely adapt social media, SaaS, and mobile devices while expanding access to technology. By incorporating unmatched network traffic visibility, organizations are able to identify high-risk user behavior and the Shadow IT to create more actionable policies.|
|Company:||Identity Finder, LLC|
|Booth:||3635, North Hall|
|Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. Identity Finder's award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. The software discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.|
|Booth:||(at Dell Booth 1301)|
|Invincea is the premier innovator in advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea is the market-leading solution that provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.|
|Company:||IronKey by Imation|
|Ticker Symbol & Exchange:||NYSE: IMN|
|Imation's IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile workspaces. The IronKey portfolio meets a variety of needs from simple encryption and compliance to the need for the World’s Most Secure Flash Drive™. The IronKey line includes the world’s leading hardware encrypted USB drives; PC on a Stick™ workspaces for Windows To Go, transforming any computer into a trusted IT-managed workstation; and cloud-based or on-premise centralized secure device management solutions.|
|With more than 20 years of experience in IT security, Keypasco’s founders are the minds behind some of the revolutionary two factor authentication technology solutions used by banks today.|
|Keypasco offers a hardware-free, patent-approved and software-based authentication solution. The service combines factors like device fingerprints, geographical locations, 2-channel structure, proximity of mobile devices, and a risk behaviour analysis to offer strong multi-factor authentication.|
|Keypasco deliver on society’s expanding needs for personal authentication services, and identity protection within Internet banking, online gaming, eCommerce, mobile Commerce, eGovernment, etc. Keypasco’s vision is to be a leading supplier of services for securing cloud services.|
|Booth:||3634 North Hall|
|Lancope is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team.|
|Company:||Lanner Electronics Inc.|
|Booth:||109 (South Expo)|
|Lanner Electronics Inc. is a world leading provider of engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers.|
|Lanner designs and manufactures a wide range of hardware platforms for gateway security, firewall, UTM, WAN acceleration and appliance-based software delivery solutions. What's more, Lanner offers a full range of industrial communications computing platforms for industrial automation, digital signage, power communications and telecom datacenters.|
|Light Cyber is a leading provider of predictive breach detection solutions that protect organizations from targeted threats and cyber-attacks. Light Cyber Magna™ is the first product to analyze both network traffic and endpoint information to understand the behavior of users, devices and applications and to detect compromised computers and stolen credentials early in the attack lifecycle, allowing the user to remediate breaches and stop attacks before damage is done.|
|Led by world-class cyber security experts and seasoned management team, the company's products have been successfully deployed by top tier customers in the financial, telecom, government, media and technology sectors.|
|LockPath’s Keylight platform provides a flexible infrastructure to effectively support governance, risk management and compliance programs. Correlate incident, threat and vulnerability data from multiple sources and tie to key assets. Industry-specific solutions scale to any size organization and provide keen insight for understanding risks, assuring compliance and preparing for audits.|
|LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and award-winning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
The WebRTC Summit 2014 New York, to be held June 9-11, 2015, at the Javits Center in New York, NY, announces that its Call for Papers is open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 16th International Cloud Expo, @ThingsExpo, Big Data Expo, and DevOps Summit.
Mar. 29, 2015 09:00 AM EDT Reads: 1,539
Even though it’s now Microservices Journal, long-time fans of SOA World Magazine can take comfort in the fact that the URL – soa.sys-con.com – remains unchanged. And that’s no mistake, as microservices are really nothing more than a new and improved take on the Service-Oriented Architecture (SOA) best practices we struggled to hammer out over the last decade. Skeptics, however, might say that this change is nothing more than an exercise in buzzword-hopping. SOA is passé, and now that people are ...
Mar. 29, 2015 09:00 AM EDT Reads: 1,213
SOA Software has changed its name to Akana. With roots in Web Services and SOA Governance, Akana has established itself as a leader in API Management and is expanding into cloud integration as an alternative to the traditional heavyweight enterprise service bus (ESB). The company recently announced that it achieved more than 90% year-over-year growth. As Akana, the company now addresses the evolution and diversification of SOA, unifying security, management, and DevOps across SOA, APIs, microser...
Mar. 29, 2015 08:30 AM EDT Reads: 2,036
The webinar, hosted by XebiaLabs, will feature 4 experts including Special Host Gene Kim, author of The Phoenix Project, along with IT thought leaders Gary Gruver, Randy Shoup and XebiaLabs' Andrew Phillips. The panel brings more than 30 years of collective experience surrounding microservices transformations at major companies including Google, eBay and Tripwire. "The story around microservices and containers is pretty compelling and the attraction of more flexibility is obviously alluring,"...
Mar. 29, 2015 08:00 AM EDT Reads: 1,234
SYS-CON Events announced today that Creative Business Solutions will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Creative Business Solutions is the top stocking authorized HP Renew Distributor in the U.S. Based out of Long Island, NY, Creative Business Solutions offers a one-stop shop for a diverse range of products including Proliant, Blade and Industry Standard Servers, Networking, Server Options and...
Mar. 29, 2015 06:30 AM EDT Reads: 3,818
WHOA.com has announced the newest addition to its data center footprint with the expansion into Equinix's newest state-of-the-art facility: DC-11 Washington, DC IBX+. Located in Ashburn, VA, this data center expands Whoa.com's presence to meet rapidly expanding customer demand for secure cloud solutions. Equinix, Inc. operates International Business Exchange™ (IBX®) data centers in 32 markets across 15 countries in the Americas, EMEA, and Asia-Pacific. Equinix is committed to operating faciliti...
Mar. 29, 2015 05:00 AM EDT Reads: 1,106
SYS-CON Events announced today that FierceDevOps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. FierceDevOps keeps software developers and IT operations personnel updated on the latest news and trends around the rapidly evolving role of the traditional IT worker.
Mar. 29, 2015 02:45 AM EDT Reads: 1,412
GENBAND has announced that SageNet is leveraging the Nuvia platform to deliver Unified Communications as a Service (UCaaS) to its large base of retail and enterprise customers. Nuvia’s cloud-based solution provides SageNet’s customers with a full suite of business communications and collaboration tools. Two large national SageNet retail customers have recently signed up to deploy the Nuvia platform and the company will continue to sell the service to new and existing customers. Nuvia’s capabili...
Mar. 29, 2015 01:00 AM EDT Reads: 1,447
Hosted PaaS providers have given independent developers and startups huge advantages in efficiency and reduced time-to-market over their more process-bound counterparts in enterprises. Software frameworks are now available that allow enterprise IT departments to provide these same advantages for developers in their own organization. In his workshop session at DevOps Summit, Troy Topnik, ActiveState’s Technical Product Manager, will show how on-prem or cloud-hosted Private PaaS can enable organ...
Mar. 28, 2015 11:45 PM EDT Reads: 1,171
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Mar. 28, 2015 08:00 PM EDT Reads: 1,778
WSM International is launching a DevOps services division that offers assessment, consulting and implementation to large enterprises and organizations with complex infrastructures. This is the first independent services company to create a dedicated practice to help organizations looking to transition to the DevOps model. The concept of DevOps is to blend information technology (IT) software development with operations to optimize the computing infrastructure according to the specific needs of ...
Mar. 28, 2015 07:00 PM EDT Reads: 1,498
SYS-CON Events announced today that Cisco, the worldwide leader in IT that transforms how people connect, communicate and collaborate, has been named “Gold Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Cisco makes amazing things happen by connecting the unconnected. Cisco has shaped the future of the Internet by becoming the worldwide leader in transforming how people connect, communicate and collaborat...
Mar. 28, 2015 07:00 PM EDT Reads: 5,181
SYS-CON Events announced today that the DevOps Institute has been named “Association Sponsor” of SYS-CON's DevOps Summit, which will take place on June 9–11, 2015, at the Javits Center in New York City, NY. The DevOps Institute provides enterprise level training and certification. Working with thought leaders from the DevOps community, the IT Service Management field and the IT training market, the DevOps Institute is setting the standard in quality for DevOps education and training.
Mar. 28, 2015 06:30 PM EDT Reads: 1,026
SYS-CON Events announced today that robomq.io will exhibit at SYS-CON's @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. robomq.io is an interoperable and composable platform that connects any device to any application. It helps systems integrators and the solution providers build new and innovative products and service for industries requiring monitoring or intelligence from devices and sensors.
Mar. 28, 2015 06:00 PM EDT Reads: 1,455
Temasys has announced senior management additions to its team. Joining are David Holloway as Vice President of Commercial and Nadine Yap as Vice President of Product. Over the past 12 months Temasys has doubled in size as it adds new customers and expands the development of its Skylink platform. Skylink leads the charge to move WebRTC, traditionally seen as a desktop, browser based technology, to become a ubiquitous web communications technology on web and mobile, as well as Internet of Things...
Mar. 28, 2015 06:00 PM EDT Reads: 1,822
Today, IT is not just a cost center. IT is an enabler and driver of business. With the emergence of the hybrid cloud paradigm, IT now has increasingly more capabilities to create new strategic opportunities for a business. Hybrid cloud allows an organization to utilize multi-tenant public clouds, dedicated private clouds, bare metal hosting, and the associated support and services for the right use cases through an on-demand, XaaS model. This model of IT creates tremendous opportunities for busi...
Mar. 28, 2015 05:00 PM EDT Reads: 3,090
Docker is an excellent platform for organizations interested in running microservices. It offers portability and consistency between development and production environments, quick provisioning times, and a simple way to isolate services. In his session at DevOps Summit at 16th Cloud Expo, Shannon Williams, co-founder of Rancher Labs, will walk through these and other benefits of using Docker to run microservices, and provide an overview of RancherOS, a minimalist distribution of Linux designed...
Mar. 28, 2015 04:15 PM EDT Reads: 2,418
Business as usual for IT is evolving into a “Make or Buy” decision on a service-by-service conversation with input from the LOBs. How does your organization move forward with cloud? In his general session at 16th Cloud Expo, Paul Maravei, Regional Sales Manager, Hybrid Cloud and Managed Services at Cisco, discusses how Cisco and its partners offer a market-leading portfolio and ecosystem of cloud infrastructure and application services that allow you to uniquely and securely combine cloud busi...
Mar. 28, 2015 04:15 PM EDT Reads: 1,321
SYS-CON Events announced today that Akana, formerly SOA Software, has been named “Bronze Sponsor” of SYS-CON's 16th International Cloud Expo® New York, which will take place June 9-11, 2015, at the Javits Center in New York City, NY. Akana’s comprehensive suite of API Management, API Security, Integrated SOA Governance, and Cloud Integration solutions helps businesses accelerate digital transformation by securely extending their reach across multiple channels – mobile, cloud and Internet of Thi...
Mar. 28, 2015 04:15 PM EDT Reads: 1,522
Businesses are looking to empower employees and departments to do more, go faster, and streamline their processes. For all workers – but mobile workers especially – utilizing the cloud to reconnect documents and improve processes without destructing existing workflows can have a dramatic impact on productivity. In his session at 16th Cloud Expo, Mark Grilli, vice president of Acrobat Solutions marketing at Adobe Systems Incorporated, will outline new ways that the cloud is changing the way peo...
Mar. 28, 2015 04:00 PM EDT Reads: 1,301