|By Business Wire||
|February 20, 2014 02:01 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles A through L.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|Accellion, Inc. is an award-winning private company that provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world's leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs.|
|AFORE Solutions is a leading provider of advanced data security and encryption management solutions that protect sensitive customer information in multi-tenant private, public and hybrid clouds and virtualized infrastructures. AFORE’s award-winning CloudLink® platform is the industry’s most complete encryption management platform for protecting workloads deployed in the cloud. The innovative platform provides customers the security foundation to protect mission-critical data with a rich suite of encryption modules to meet the diverse deployment and security customer needs. AFORE is a RSA Technology Partner and EMC® Select Business Partner.|
|Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, provides solutions to secure the application and infrastructure stack. By integrating advanced security tools with 24×7 Security Operations Center expertise, customers can defend against security threats and address compliance mandates. With an “as-a-Service” delivery model, Alert Logic solutions include day-to-day security infrastructure management, security experts translating complex data into actionable insight, and flexible deployment options. Built from the ground up to address public and private cloud challenges, Alert Logic partners with over half of the largest cloud and hosting service providers for over 2,400 enterprises.|
|AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1000 of the world's leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.|
|AlgoSec's application-centric approach orchestrates the management of complex policies across firewalls and related network devices, aligning IT teams for improved business agility.|
|AlgoSec is committed to the success of every single customer, and offers the industry's only money-back guarantee. For more information, visit www.AlgoSec.com.|
|Company:||AMAX Information Technologies|
|AMAX is a global leader in x86 OEM appliance design and manufacturing. For companies that have a winning software product and want to increase their ROI by selling a complete integrated platform, AMAX offers a full menu of services, including:|
|•Product Lifecycle & Supply Chain Management|
|•Compliance & Regulatory Consulting|
|•Try & Buy Program Support and Refurbishing Services|
|In addition, AMAX offers:|
|•NPI Services, including Design and Prototyping|
|AMAX designs, manufactures and supports your appliance needs from NPI to global support allowing companies to focus on their core business while going to market with a complete product.|
|Appthority's App Risk Management Service automates the discovery, analysis, and approval of apps present on employee devices. By combining the largest global database of millions of previously analyzed public and enterprise apps with a policy management engine, Appthority automates app review and approval of new apps and enables custom, acceptable use policies for thousands of employees within minutes. Appthority enables companies to leverage mobility and empower a smarter, safer, mobile workforce. Appthority has scanned over 2 million Android and iOS mobile apps for global organizations and currently has over 188 organizations worldwide evaluating and using the Appthority Service.|
|Booth:||3237 North Hall|
|Ticker Symbol & Exchange:||NYSE: CUDA|
|Barracuda provides cloud-connected security and storage solutions that simplify IT. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda’s customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security. For additional information, please visit http://www.barracuda.com.|
|BehavioSec offers Behavioural biometric solutions in order to create a-multi layered approach for authentication & verification purposes. The solution is designed to tackle the demands for greater security without impacting user experience.|
|The technology analyzes behavior such as keystroke and/or mobile interface dynamics. The user’s behavior is mapped against their digital ‘fingerprint’ to verify the identity and prevent fraudsters from accessing throughout the session.|
|BehavioSec’s technology has been deployed to millions of mobile and internet banking customers in Europe.|
|BlueCat IP Address Management (IPAM) solutions provide a smarter way to connect mobile devices, applications, virtual environments and clouds. With unified mobile security, address management, automation and self-service, BlueCat offers a rich source of network intelligence that can be put into action to protect your network, reduce IT costs and ensure reliable service delivery. Enterprises and government agencies worldwide trust BlueCat to manage millions of network-connected devices and solve real business and IT challenges – from secure, risk-free BYOD to virtualization, cloud automation and IPv6.|
|Founded in 2000, Brainloop, The Secure Enterprise Information Company, is the market-leading provider of highly intuitive SaaS solutions that enable customers to securely manage and collaborate on confidential documents and information, whether inside or outside of their IT environments.|
|Brainloop's customers comprise numerous Fortune, FTSE and DAX companies across a wide range of sectors, both private and public. They rely on the software's regulatory and corporate compliance, collaboration and process capabilities of Brainloop, as well its complete portfolio of security features including full encryption, audit trail, two-factor authentication and provider shielding, all with a convenient and easy to use interface.|
|Ticker Symbol & Exchange:||NASDAQ: CA|
|CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data, identities and access, from the data center to the cloud. Specializing in identity and access management, data and API protection, CA Technologies solutions help protect the open enterprise and find the balance between protecting the business and enabling the business for transformative growth.|
|Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled in all major coding languages and identify its security vulnerabilities.|
|With Checkmarx's CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.|
|Checkmarx's customers include hundreds of Fortune 500, government and SMB organizations in over 30 countries. Checkmarx has been Ranked 69th Fastest Growing Tech Company in EMEA and 8th in Israel by Deloitte.|
|From government installations to corporate PKI applications, enhance your access control and identity management systems with CHERRY. Choose from our selection of FIPS 201 compliant, low cost keyboards and stand-alone devices. From biometrics to high-performance PCSC/EMV smart card readers, CHERRY has the products to meet your needs.|
|CHERRY is a brand of ZF Electronic Systems Pleasant Prairie, LLC, a leader in the design and manufacture of computer keyboards, standard and custom electrical switches, sensors and controls for the worldwide automotive, computer and consumer/commercial OEM markets.|
|Cigital is the world's largest consulting firm specializing in software security and is the global leader in helping organizations design, build, and maintain secure software. We provide a comprehensive range of software security services including consulting, training in both instructor-led and eLearning, mobile application security, and managed services aimed at addressing the potential software and application security risks.|
|Whether it's a simple penetration test or deploying an end-to-end software security program, our experts have both the depth of knowledge and breadth of real-world experience to understand the risks and challenges our clients face each day.|
|Booth:||South Expo, 2115|
|CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, data loss prevention, malware detection, data discovery and activity monitoring. CipherCloud’s ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.|
|Clearswift is trusted by organizations globally to protect their critical information, giving them the freedom to securely collaborate and drive business growth. Built on an innovative Deep Content Inspection engine, our unique Adaptive Redaction technology enables deploying a data loss prevention solution simply and easily, forming the foundation of an Information Governance vision, for organizations to have 100% visibility of their critical information 100% of the time.|
|Clearswift operates world-wide, having regional headquarters in Europe, Asia Pacific and the United States. Clearswift has a partner network of more than 900 resellers across the globe.|
|More information is available at www.clearswift.com.|
|Company:||Cloud Security Alliance|
|Booth:||2433 (South Hall)|
|The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.|
|Company:||Corero Network Security|
|Ticker Symbol & Exchange:||London Stock Exchange: CNS|
|Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide Online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended.|
|Booth:||South Expo 1129|
|As the experts in advanced threat protection and containment, Damballa discovers active threats that bypass all security prevention layers. Damballa identifies evidence of malicious network traffic in real time, rapidly pinpointing the compromised devices that represent the highest risk to a business. Damballa protects any device or OS including PCs, Macs, Unix, iOS, Android, and embedded systems. Damballa protects more than 400 million endpoints globally at enterprises in every major market and for the world's largest ISP and telecommunications providers. For more information, visit www.damballa.com, or follow us on Twitter @DamballaInc.|
|Booth:||901 South Hall|
|DB Networks is an innovating behavioral analysis technology provider in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks. Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures. DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack.|
|Company:||Deja vu Security|
|Deja vu Security is a trusted provider of information security testing products and consulting services to the world’s leading technology companies. It is a recognized industry leader in embedded device security, security fuzz testing, application security, and penetration testing. Its widely adopted security fuzzing product, Peach Fuzzer™, discovers complex, unknown vulnerabilities in software. Security researchers and product testers leverage Peach Fuzzer to find zero – day vulnerabilities in an automated manner. Deja vu Security is based in Seattle and was founded by a group of information security veterans.|
|DeviceLock, Inc., a leader in endpoint data security for 18 years, provides world class enterprise Data Leak Prevention (DLP) software used by financial firms, health care providers, retail entities, Universities, manufacturing firms, government agencies, diplomatic posts, military units, and more. DeviceLock®, ContentLockTM, NetworkLockTM, and the DeviceLock Search ServerTM comprise the DeviceLock Endpoint DLP Suite, an Active Directory Group Policy-managed solution for applying granular, contextual, and content-aware controls to peripheral ports, devices, and network protocols of managed endpoints to any scale. DeviceLock supports Microsoft Windows, Apple OS, and any virtualized Windows hosts or sessions used by “BYOD” devices of any make.|
|Company:||Digital Defense, Inc.|
|Founded in 1999, Digital Defense, Inc. (DDI) is a premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and decisive security intelligence. This proven method bolsters the capability to reduce risk and keep assets and reputations secure. The combination of DDI’s certified security analysts, patent-pending technology and proprietary cloud-based vulnerability management system, Frontline™ Solutions Platform, delivers one of the most powerful assessment results and remediation management solutions available.|
|Booth:||1838 - South Hall|
|Easy Solutions delivers Total Fraud Protection® to over 200 clients, with over 50 million end users. The company’s products protect against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and deliver multifactor authentication and transaction anomaly detection. The company witnessed 80% subscription revenue growth in 2013, marking the best year-over-year growth rate since the company was founded. Easy Solutions is projecting another year of rapid growth with internal forecasts calling for 150% growth in 2014 as the company further expands in the North America and EMEA markets.|
|For more information, visit http://www.easysol.net, or follow us on Twitter @goeasysol.|
|Ticker Symbol & Exchange:||NYSE: EMC|
|Syncplicity is an easy-to-use, enterprise-grade file sync and share solution that is redefining files for the mobile workforce. We give users access to all their files—no matter they reside— on all their devices, online or offline, with no hassles. With a rich and secure mobile, web and desktop experience, our customers can collaborate inside and outside their organization easily, while giving IT professionals the security, manageability, and control they need.|
|Rated a market leader by Forrester Research and other leading analyst firms, Syncplicity is uniquely positioned to lead the next wave of innovation in mobile collaboration for the enterprise.|
|Booth:||2235 South Hall|
|Emerging Threats is a world-leading provider of commercial and open source threat intelligence.|
|Founded in 2003 as a cybersecurity research community, Emerging Threats has become the de facto standard in network-based malware threat detection.|
|The company’s ETOpen Ruleset, ETPro™ Ruleset, and IQRisk™ suite of threat intelligence are platform agnostic for easy integration with Suricata, SNORT®, and other network intrusion protection and detection systems.|
|With ETPro Ruleset, organizations can achieve the highest standards of malicious threat detection with world-class support and research for extended vulnerability coverage. ETPro Ruleset is ideal for enterprises, government agencies, financial institutions, SMBs, higher education, and service providers.|
|For more information, please visit http://www.emergingthreats.net.|
|Company:||Endace division of Emulex|
|Ticker Symbol & Exchange:||NYSE: ELX|
|Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions enabling unrivaled end-to-end application visibility, optimization and acceleration for global networks that support enterprise, cloud, government and telecommunications. The Endace division of Emulex provides network visibility products that deliver complete network performance management at speeds up to 100Gb Ethernet.|
|Company:||ESET North America|
|Booth:||South Expo 1926|
|ESET®, the pioneer of proactive protection and the maker of the award-winning ESET NOD32® technology, is a global provider of security solutions for businesses and consumers. For over 26 years, the Company continues to lead the industry in proactive threat detection. At RSA, ESET will be showcasing the newest version of its two-factor authentication (2FA) application, ESET Secure Authentication. The new release continues to provide the potent combination of ultra-secure access to online applications, while introducing even greater ease of installation and support, for a superior overall user experience.|
|FileTrek (www.filetrek.com), the leader in advance behavioral analytics for threat detection, will debut its new enterprise threat detection platform at the RSA Conference 2014. The FileTrek Platform leverages a patent-pending behavioral analytics engine and detection algorithms to proactively surface attacks against valuable data assets, alert managers to their existence and deliver immediate risk forensics, providing fast and accurate threat detection and on-demand investigations for companies of all sizes. The FileTrek solution is available as a cloud or on-premise solution.|
|Booth:||North Expo 2813|
|Ticker Symbol & Exchange:||NASDAQ FEYE|
|FireEye is disrupting the security industry with a purpose-built, virtual machine-based security platform that provides real-time threat protection against the next generation of cyber attacks. The core of the platform is the FireEye Multi-Vector Virtual Execution (MVX) engine, complemented by FireEye Dynamic Threat Intelligence, which identify and block cyber attacks in real time without the use of threat signatures. In 2013 FireEye acquired Mandiant and is now the only company that delivers one solution to detect, contain, resolve, and prevent threats. FireEye has become the go-to company for some of the largest enterprises and government agencies across the globe with over 1,500 customers across over 40 countries, including over 100 of the Fortune 500.|
|FireMon is the industry leader in providing enterprises, government and managed services providers with proactive security intelligence solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.|
|HBGary provides Incident Response and Threat Intel Management products and services, enabling organizations to rapidly manage the growing volume, variety and complexity of their cyber security events. With HBGary products, customers can proactively detect zero-days, rootkits and other advanced persistent threats, aggregate and correlate threat data from intel feeds, and manage the lifecycle of incidents by automating their response processes. Customers include Fortune 50 corporations and U.S. government agencies. HBGary is located in Sacramento, Calif. and is part of ManTech International Corporation.|
|Ken Silva, President of ManTech Cyber Solutions International, Inc. will be in attendance at RSA.|
|HID Global is the trusted leader in products, services, solutions, and know-how related to the creation, use, and management of secure identities for millions of customers around the world. Recognized for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators, and developers serving a variety of markets. These markets include physical access control; logical access control including strong authentication and credential management; card personalization; visitor management; government ID; and identification technologies for animal ID and industry and logistics applications. Headquartered in Austin, TX, HID Global has over 2,000 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand.|
|Company:||Hillstone Networks, Inc.|
|Hillstone Networks builds intelligent next generation firewalls to protect against Advanced Persistent Threats (ADP) and zero-day attacks. Built from ground up for today’s virtual and cloud-based data centers, Hillstone Network’s fully distributed, intelligent next-generation firewall platform overcomes performance and deployment limitations of legacy firewalls, providing granular visibility and control of network traffic, based on real-time behavioral anomaly detection and advanced data analytics. Established in 2006 by NetScreen, Cisco and Juniper executives, over 5,000 customers worldwide use our proven high-performance, network security solutions, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks is headquartered in Sunnyvale, California.|
|HyTrust is the Cloud Security Automation company. Its virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of catastrophic failure — especially in light of the concentration of risk that occurs within virtualization and cloud environments. Organizations can now confidently take full advantage of the cloud, and even broaden deployment to mission-critical applications. The Company is backed by top tier investors VMware, Cisco, Intel, In-Q-Tel, Fortinet, Granite Ventures, Trident Capital and Epic Ventures; its partners include VMware, VCE, Symantec, CA, McAfee, Splunk; HP Arcsight, Accuvant, RSA and Intel.|
|Company:||iboss Network Security|
|iboss Network Security engineers highly scalable Web security solutions providing layer 7 defense across HTTP, SSL, threat and applications securing mobile devices on or off network. iboss enables organizations to safely adapt social media, SaaS, and mobile devices while expanding access to technology. By incorporating unmatched network traffic visibility, organizations are able to identify high-risk user behavior and the Shadow IT to create more actionable policies.|
|Company:||Identity Finder, LLC|
|Booth:||3635, North Hall|
|Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. Identity Finder's award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. The software discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.|
|Booth:||(at Dell Booth 1301)|
|Invincea is the premier innovator in advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea is the market-leading solution that provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.|
|Company:||IronKey by Imation|
|Ticker Symbol & Exchange:||NYSE: IMN|
|Imation's IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile workspaces. The IronKey portfolio meets a variety of needs from simple encryption and compliance to the need for the World’s Most Secure Flash Drive™. The IronKey line includes the world’s leading hardware encrypted USB drives; PC on a Stick™ workspaces for Windows To Go, transforming any computer into a trusted IT-managed workstation; and cloud-based or on-premise centralized secure device management solutions.|
|With more than 20 years of experience in IT security, Keypasco’s founders are the minds behind some of the revolutionary two factor authentication technology solutions used by banks today.|
|Keypasco offers a hardware-free, patent-approved and software-based authentication solution. The service combines factors like device fingerprints, geographical locations, 2-channel structure, proximity of mobile devices, and a risk behaviour analysis to offer strong multi-factor authentication.|
|Keypasco deliver on society’s expanding needs for personal authentication services, and identity protection within Internet banking, online gaming, eCommerce, mobile Commerce, eGovernment, etc. Keypasco’s vision is to be a leading supplier of services for securing cloud services.|
|Booth:||3634 North Hall|
|Lancope is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team.|
|Company:||Lanner Electronics Inc.|
|Booth:||109 (South Expo)|
|Lanner Electronics Inc. is a world leading provider of engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers.|
|Lanner designs and manufactures a wide range of hardware platforms for gateway security, firewall, UTM, WAN acceleration and appliance-based software delivery solutions. What's more, Lanner offers a full range of industrial communications computing platforms for industrial automation, digital signage, power communications and telecom datacenters.|
|Light Cyber is a leading provider of predictive breach detection solutions that protect organizations from targeted threats and cyber-attacks. Light Cyber Magna™ is the first product to analyze both network traffic and endpoint information to understand the behavior of users, devices and applications and to detect compromised computers and stolen credentials early in the attack lifecycle, allowing the user to remediate breaches and stop attacks before damage is done.|
|Led by world-class cyber security experts and seasoned management team, the company's products have been successfully deployed by top tier customers in the financial, telecom, government, media and technology sectors.|
|LockPath’s Keylight platform provides a flexible infrastructure to effectively support governance, risk management and compliance programs. Correlate incident, threat and vulnerability data from multiple sources and tie to key assets. Industry-specific solutions scale to any size organization and provide keen insight for understanding risks, assuring compliance and preparing for audits.|
|LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and award-winning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Oct. 7, 2015 03:30 AM EDT Reads: 454
The modern software development landscape consists of best practices and tools that allow teams to deliver software in a near-continuous manner. By adopting a culture of automation, measurement and sharing, the time to ship code has been greatly reduced, allowing for shorter release cycles and quicker feedback from customers and users. Still, with all of these tools and methods, how can teams stay on top of what is taking place across their infrastructure and codebase? Hopping between services a...
Oct. 7, 2015 03:00 AM EDT Reads: 400
SYS-CON Events announced today that G2G3 will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based on a collective appreciation for user experience, design, and technology, G2G3 is uniquely qualified and motivated to redefine how organizations and people engage in an increasingly digital world.
Oct. 7, 2015 03:00 AM EDT Reads: 366
The cloud has reached mainstream IT. Those 18.7 million data centers out there (server closets to corporate data centers to colocation deployments) are moving to the cloud. In his session at 17th Cloud Expo, Achim Weiss, CEO & co-founder of ProfitBricks, will share how two companies – one in the U.S. and one in Germany – are achieving their goals with cloud infrastructure. More than a case study, he will share the details of how they prioritized their cloud computing infrastructure deployments ...
Oct. 7, 2015 03:00 AM EDT Reads: 691
NHK, Japan Broadcasting will feature upcoming @ThingsExpo Silicon Valley in a special IoT documentary which will be filmed on the expo floor November 3 to 5, 2015 in Santa Clara. NHK is the sole public TV network in Japan equivalent to BBC in UK and the largest in Asia with many award winning science and technology programs. Japanese TV is producing a documentary about IoT and Smart technology covering @ThingsExpo Silicon Valley. The program will be aired during the highest viewership season of ...
Oct. 7, 2015 02:45 AM EDT
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
Oct. 7, 2015 02:00 AM EDT Reads: 508
SYS-CON Events announced today that Luxoft Holding, Inc., a leading provider of software development services and innovative IT solutions, has been named “Bronze Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Luxoft’s software development services consist of core and mission-critical custom software development and support, product engineering and testing, and technology consulting.
Oct. 7, 2015 01:15 AM EDT Reads: 505
Developing software for the Internet of Things (IoT) comes with its own set of challenges. Security, privacy, and unified standards are a few key issues. In addition, each IoT product is comprised of at least three separate application components: the software embedded in the device, the backend big-data service, and the mobile application for the end user's controls. Each component is developed by a different team, using different technologies and practices, and deployed to a different stack/...
Oct. 7, 2015 12:45 AM EDT Reads: 127
Data loss happens, even in the cloud. In fact, if your company has adopted a cloud application in the past three years, data loss has probably happened, whether you know it or not. In his session at 17th Cloud Expo, Bryan Forrester, Senior Vice President of Sales at eFolder, will present how common and costly cloud application data loss is and what measures you can take to protect your organization from data loss.
Oct. 7, 2015 12:00 AM EDT Reads: 504
SYS-CON Events announced today that IBM Cloud Data Services has been named “Bronze Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. IBM Cloud Data Services offers a portfolio of integrated, best-of-breed cloud data services for developers focused on mobile computing and analytics use cases.
Oct. 6, 2015 10:00 PM EDT Reads: 660
In his session at @ThingsExpo, Tony Shan, Chief Architect at CTS, will explore the synergy of Big Data and IoT. First he will take a closer look at the Internet of Things and Big Data individually, in terms of what, which, why, where, when, who, how and how much. Then he will explore the relationship between IoT and Big Data. Specifically, he will drill down to how the 4Vs aspects intersect with IoT: Volume, Variety, Velocity and Value. In turn, Tony will analyze how the key components of IoT ...
Oct. 6, 2015 08:00 PM EDT Reads: 313
When it comes to IoT in the enterprise, namely the commercial building and hospitality markets, a benefit not getting the attention it deserves is energy efficiency, and IoT’s direct impact on a cleaner, greener environment when installed in smart buildings. Until now clean technology was offered piecemeal and led with point solutions that require significant systems integration to orchestrate and deploy. There didn't exist a 'top down' approach that can manage and monitor the way a Smart Buildi...
Oct. 6, 2015 05:00 PM EDT Reads: 257
SYS-CON Events announced today that Cloud Raxak has been named “Media & Session Sponsor” of SYS-CON's 17th Cloud Expo, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Raxak Protect automates security compliance across private and public clouds. Using the SaaS tool or managed service, developers can deploy cloud apps quickly, cost-effectively, and without error.
Oct. 6, 2015 04:40 PM EDT Reads: 112
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...
Oct. 6, 2015 03:00 PM EDT Reads: 125
“All our customers are looking at the cloud ecosystem as an important part of their overall product strategy. Some see it evolve as a multi-cloud / hybrid cloud strategy, while others are embracing all forms of cloud offerings like PaaS, IaaS and SaaS in their solutions,” noted Suhas Joshi, Vice President – Technology, at Harbinger Group, in this exclusive Q&A with Cloud Expo Conference Chair Roger Strukhoff.
Oct. 6, 2015 02:45 PM EDT Reads: 370
SYS-CON Events announced today that ProfitBricks, the provider of painless cloud infrastructure, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the...
Oct. 6, 2015 01:00 PM EDT Reads: 741
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Oct. 6, 2015 12:45 PM EDT Reads: 459
Clearly the way forward is to move to cloud be it bare metal, VMs or containers. One aspect of the current public clouds that is slowing this cloud migration is cloud lock-in. Every cloud vendor is trying to make it very difficult to move out once a customer has chosen their cloud. In his session at 17th Cloud Expo, Naveen Nimmu, CEO of Clouber, Inc., will advocate that making the inter-cloud migration as simple as changing airlines would help the entire industry to quickly adopt the cloud wit...
Oct. 6, 2015 12:30 PM EDT Reads: 587
As the world moves towards more DevOps and microservices, application deployment to the cloud ought to become a lot simpler. The microservices architecture, which is the basis of many new age distributed systems such as OpenStack, NetFlix and so on, is at the heart of Cloud Foundry - a complete developer-oriented Platform as a Service (PaaS) that is IaaS agnostic and supports vCloud, OpenStack and AWS. In his session at 17th Cloud Expo, Raghavan "Rags" Srinivas, an Architect/Developer Evangeli...
Oct. 6, 2015 12:15 PM EDT Reads: 120
Secure Cloud through Automated Compliance | @CloudExpo @CloudRaxak #Cloud #BigData #DevOps #Microservices
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Oct. 6, 2015 12:00 PM EDT Reads: 251