|By Business Wire||
|February 20, 2014 02:01 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles A through L.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|Accellion, Inc. is an award-winning private company that provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world's leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs.|
|AFORE Solutions is a leading provider of advanced data security and encryption management solutions that protect sensitive customer information in multi-tenant private, public and hybrid clouds and virtualized infrastructures. AFORE’s award-winning CloudLink® platform is the industry’s most complete encryption management platform for protecting workloads deployed in the cloud. The innovative platform provides customers the security foundation to protect mission-critical data with a rich suite of encryption modules to meet the diverse deployment and security customer needs. AFORE is a RSA Technology Partner and EMC® Select Business Partner.|
|Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, provides solutions to secure the application and infrastructure stack. By integrating advanced security tools with 24×7 Security Operations Center expertise, customers can defend against security threats and address compliance mandates. With an “as-a-Service” delivery model, Alert Logic solutions include day-to-day security infrastructure management, security experts translating complex data into actionable insight, and flexible deployment options. Built from the ground up to address public and private cloud challenges, Alert Logic partners with over half of the largest cloud and hosting service providers for over 2,400 enterprises.|
|AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1000 of the world's leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.|
|AlgoSec's application-centric approach orchestrates the management of complex policies across firewalls and related network devices, aligning IT teams for improved business agility.|
|AlgoSec is committed to the success of every single customer, and offers the industry's only money-back guarantee. For more information, visit www.AlgoSec.com.|
|Company:||AMAX Information Technologies|
|AMAX is a global leader in x86 OEM appliance design and manufacturing. For companies that have a winning software product and want to increase their ROI by selling a complete integrated platform, AMAX offers a full menu of services, including:|
|•Product Lifecycle & Supply Chain Management|
|•Compliance & Regulatory Consulting|
|•Try & Buy Program Support and Refurbishing Services|
|In addition, AMAX offers:|
|•NPI Services, including Design and Prototyping|
|AMAX designs, manufactures and supports your appliance needs from NPI to global support allowing companies to focus on their core business while going to market with a complete product.|
|Appthority's App Risk Management Service automates the discovery, analysis, and approval of apps present on employee devices. By combining the largest global database of millions of previously analyzed public and enterprise apps with a policy management engine, Appthority automates app review and approval of new apps and enables custom, acceptable use policies for thousands of employees within minutes. Appthority enables companies to leverage mobility and empower a smarter, safer, mobile workforce. Appthority has scanned over 2 million Android and iOS mobile apps for global organizations and currently has over 188 organizations worldwide evaluating and using the Appthority Service.|
|Booth:||3237 North Hall|
|Ticker Symbol & Exchange:||NYSE: CUDA|
|Barracuda provides cloud-connected security and storage solutions that simplify IT. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda’s customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security. For additional information, please visit http://www.barracuda.com.|
|BehavioSec offers Behavioural biometric solutions in order to create a-multi layered approach for authentication & verification purposes. The solution is designed to tackle the demands for greater security without impacting user experience.|
|The technology analyzes behavior such as keystroke and/or mobile interface dynamics. The user’s behavior is mapped against their digital ‘fingerprint’ to verify the identity and prevent fraudsters from accessing throughout the session.|
|BehavioSec’s technology has been deployed to millions of mobile and internet banking customers in Europe.|
|BlueCat IP Address Management (IPAM) solutions provide a smarter way to connect mobile devices, applications, virtual environments and clouds. With unified mobile security, address management, automation and self-service, BlueCat offers a rich source of network intelligence that can be put into action to protect your network, reduce IT costs and ensure reliable service delivery. Enterprises and government agencies worldwide trust BlueCat to manage millions of network-connected devices and solve real business and IT challenges – from secure, risk-free BYOD to virtualization, cloud automation and IPv6.|
|Founded in 2000, Brainloop, The Secure Enterprise Information Company, is the market-leading provider of highly intuitive SaaS solutions that enable customers to securely manage and collaborate on confidential documents and information, whether inside or outside of their IT environments.|
|Brainloop's customers comprise numerous Fortune, FTSE and DAX companies across a wide range of sectors, both private and public. They rely on the software's regulatory and corporate compliance, collaboration and process capabilities of Brainloop, as well its complete portfolio of security features including full encryption, audit trail, two-factor authentication and provider shielding, all with a convenient and easy to use interface.|
|Ticker Symbol & Exchange:||NASDAQ: CA|
|CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data, identities and access, from the data center to the cloud. Specializing in identity and access management, data and API protection, CA Technologies solutions help protect the open enterprise and find the balance between protecting the business and enabling the business for transformative growth.|
|Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled in all major coding languages and identify its security vulnerabilities.|
|With Checkmarx's CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.|
|Checkmarx's customers include hundreds of Fortune 500, government and SMB organizations in over 30 countries. Checkmarx has been Ranked 69th Fastest Growing Tech Company in EMEA and 8th in Israel by Deloitte.|
|From government installations to corporate PKI applications, enhance your access control and identity management systems with CHERRY. Choose from our selection of FIPS 201 compliant, low cost keyboards and stand-alone devices. From biometrics to high-performance PCSC/EMV smart card readers, CHERRY has the products to meet your needs.|
|CHERRY is a brand of ZF Electronic Systems Pleasant Prairie, LLC, a leader in the design and manufacture of computer keyboards, standard and custom electrical switches, sensors and controls for the worldwide automotive, computer and consumer/commercial OEM markets.|
|Cigital is the world's largest consulting firm specializing in software security and is the global leader in helping organizations design, build, and maintain secure software. We provide a comprehensive range of software security services including consulting, training in both instructor-led and eLearning, mobile application security, and managed services aimed at addressing the potential software and application security risks.|
|Whether it's a simple penetration test or deploying an end-to-end software security program, our experts have both the depth of knowledge and breadth of real-world experience to understand the risks and challenges our clients face each day.|
|Booth:||South Expo, 2115|
|CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, data loss prevention, malware detection, data discovery and activity monitoring. CipherCloud’s ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.|
|Clearswift is trusted by organizations globally to protect their critical information, giving them the freedom to securely collaborate and drive business growth. Built on an innovative Deep Content Inspection engine, our unique Adaptive Redaction technology enables deploying a data loss prevention solution simply and easily, forming the foundation of an Information Governance vision, for organizations to have 100% visibility of their critical information 100% of the time.|
|Clearswift operates world-wide, having regional headquarters in Europe, Asia Pacific and the United States. Clearswift has a partner network of more than 900 resellers across the globe.|
|More information is available at www.clearswift.com.|
|Company:||Cloud Security Alliance|
|Booth:||2433 (South Hall)|
|The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.|
|Company:||Corero Network Security|
|Ticker Symbol & Exchange:||London Stock Exchange: CNS|
|Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide Online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended.|
|Booth:||South Expo 1129|
|As the experts in advanced threat protection and containment, Damballa discovers active threats that bypass all security prevention layers. Damballa identifies evidence of malicious network traffic in real time, rapidly pinpointing the compromised devices that represent the highest risk to a business. Damballa protects any device or OS including PCs, Macs, Unix, iOS, Android, and embedded systems. Damballa protects more than 400 million endpoints globally at enterprises in every major market and for the world's largest ISP and telecommunications providers. For more information, visit www.damballa.com, or follow us on Twitter @DamballaInc.|
|Booth:||901 South Hall|
|DB Networks is an innovating behavioral analysis technology provider in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks. Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures. DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack.|
|Company:||Deja vu Security|
|Deja vu Security is a trusted provider of information security testing products and consulting services to the world’s leading technology companies. It is a recognized industry leader in embedded device security, security fuzz testing, application security, and penetration testing. Its widely adopted security fuzzing product, Peach Fuzzer™, discovers complex, unknown vulnerabilities in software. Security researchers and product testers leverage Peach Fuzzer to find zero – day vulnerabilities in an automated manner. Deja vu Security is based in Seattle and was founded by a group of information security veterans.|
|DeviceLock, Inc., a leader in endpoint data security for 18 years, provides world class enterprise Data Leak Prevention (DLP) software used by financial firms, health care providers, retail entities, Universities, manufacturing firms, government agencies, diplomatic posts, military units, and more. DeviceLock®, ContentLockTM, NetworkLockTM, and the DeviceLock Search ServerTM comprise the DeviceLock Endpoint DLP Suite, an Active Directory Group Policy-managed solution for applying granular, contextual, and content-aware controls to peripheral ports, devices, and network protocols of managed endpoints to any scale. DeviceLock supports Microsoft Windows, Apple OS, and any virtualized Windows hosts or sessions used by “BYOD” devices of any make.|
|Company:||Digital Defense, Inc.|
|Founded in 1999, Digital Defense, Inc. (DDI) is a premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and decisive security intelligence. This proven method bolsters the capability to reduce risk and keep assets and reputations secure. The combination of DDI’s certified security analysts, patent-pending technology and proprietary cloud-based vulnerability management system, Frontline™ Solutions Platform, delivers one of the most powerful assessment results and remediation management solutions available.|
|Booth:||1838 - South Hall|
|Easy Solutions delivers Total Fraud Protection® to over 200 clients, with over 50 million end users. The company’s products protect against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and deliver multifactor authentication and transaction anomaly detection. The company witnessed 80% subscription revenue growth in 2013, marking the best year-over-year growth rate since the company was founded. Easy Solutions is projecting another year of rapid growth with internal forecasts calling for 150% growth in 2014 as the company further expands in the North America and EMEA markets.|
|For more information, visit http://www.easysol.net, or follow us on Twitter @goeasysol.|
|Ticker Symbol & Exchange:||NYSE: EMC|
|Syncplicity is an easy-to-use, enterprise-grade file sync and share solution that is redefining files for the mobile workforce. We give users access to all their files—no matter they reside— on all their devices, online or offline, with no hassles. With a rich and secure mobile, web and desktop experience, our customers can collaborate inside and outside their organization easily, while giving IT professionals the security, manageability, and control they need.|
|Rated a market leader by Forrester Research and other leading analyst firms, Syncplicity is uniquely positioned to lead the next wave of innovation in mobile collaboration for the enterprise.|
|Booth:||2235 South Hall|
|Emerging Threats is a world-leading provider of commercial and open source threat intelligence.|
|Founded in 2003 as a cybersecurity research community, Emerging Threats has become the de facto standard in network-based malware threat detection.|
|The company’s ETOpen Ruleset, ETPro™ Ruleset, and IQRisk™ suite of threat intelligence are platform agnostic for easy integration with Suricata, SNORT®, and other network intrusion protection and detection systems.|
|With ETPro Ruleset, organizations can achieve the highest standards of malicious threat detection with world-class support and research for extended vulnerability coverage. ETPro Ruleset is ideal for enterprises, government agencies, financial institutions, SMBs, higher education, and service providers.|
|For more information, please visit http://www.emergingthreats.net.|
|Company:||Endace division of Emulex|
|Ticker Symbol & Exchange:||NYSE: ELX|
|Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions enabling unrivaled end-to-end application visibility, optimization and acceleration for global networks that support enterprise, cloud, government and telecommunications. The Endace division of Emulex provides network visibility products that deliver complete network performance management at speeds up to 100Gb Ethernet.|
|Company:||ESET North America|
|Booth:||South Expo 1926|
|ESET®, the pioneer of proactive protection and the maker of the award-winning ESET NOD32® technology, is a global provider of security solutions for businesses and consumers. For over 26 years, the Company continues to lead the industry in proactive threat detection. At RSA, ESET will be showcasing the newest version of its two-factor authentication (2FA) application, ESET Secure Authentication. The new release continues to provide the potent combination of ultra-secure access to online applications, while introducing even greater ease of installation and support, for a superior overall user experience.|
|FileTrek (www.filetrek.com), the leader in advance behavioral analytics for threat detection, will debut its new enterprise threat detection platform at the RSA Conference 2014. The FileTrek Platform leverages a patent-pending behavioral analytics engine and detection algorithms to proactively surface attacks against valuable data assets, alert managers to their existence and deliver immediate risk forensics, providing fast and accurate threat detection and on-demand investigations for companies of all sizes. The FileTrek solution is available as a cloud or on-premise solution.|
|Booth:||North Expo 2813|
|Ticker Symbol & Exchange:||NASDAQ FEYE|
|FireEye is disrupting the security industry with a purpose-built, virtual machine-based security platform that provides real-time threat protection against the next generation of cyber attacks. The core of the platform is the FireEye Multi-Vector Virtual Execution (MVX) engine, complemented by FireEye Dynamic Threat Intelligence, which identify and block cyber attacks in real time without the use of threat signatures. In 2013 FireEye acquired Mandiant and is now the only company that delivers one solution to detect, contain, resolve, and prevent threats. FireEye has become the go-to company for some of the largest enterprises and government agencies across the globe with over 1,500 customers across over 40 countries, including over 100 of the Fortune 500.|
|FireMon is the industry leader in providing enterprises, government and managed services providers with proactive security intelligence solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.|
|HBGary provides Incident Response and Threat Intel Management products and services, enabling organizations to rapidly manage the growing volume, variety and complexity of their cyber security events. With HBGary products, customers can proactively detect zero-days, rootkits and other advanced persistent threats, aggregate and correlate threat data from intel feeds, and manage the lifecycle of incidents by automating their response processes. Customers include Fortune 50 corporations and U.S. government agencies. HBGary is located in Sacramento, Calif. and is part of ManTech International Corporation.|
|Ken Silva, President of ManTech Cyber Solutions International, Inc. will be in attendance at RSA.|
|HID Global is the trusted leader in products, services, solutions, and know-how related to the creation, use, and management of secure identities for millions of customers around the world. Recognized for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators, and developers serving a variety of markets. These markets include physical access control; logical access control including strong authentication and credential management; card personalization; visitor management; government ID; and identification technologies for animal ID and industry and logistics applications. Headquartered in Austin, TX, HID Global has over 2,000 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand.|
|Company:||Hillstone Networks, Inc.|
|Hillstone Networks builds intelligent next generation firewalls to protect against Advanced Persistent Threats (ADP) and zero-day attacks. Built from ground up for today’s virtual and cloud-based data centers, Hillstone Network’s fully distributed, intelligent next-generation firewall platform overcomes performance and deployment limitations of legacy firewalls, providing granular visibility and control of network traffic, based on real-time behavioral anomaly detection and advanced data analytics. Established in 2006 by NetScreen, Cisco and Juniper executives, over 5,000 customers worldwide use our proven high-performance, network security solutions, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks is headquartered in Sunnyvale, California.|
|HyTrust is the Cloud Security Automation company. Its virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of catastrophic failure — especially in light of the concentration of risk that occurs within virtualization and cloud environments. Organizations can now confidently take full advantage of the cloud, and even broaden deployment to mission-critical applications. The Company is backed by top tier investors VMware, Cisco, Intel, In-Q-Tel, Fortinet, Granite Ventures, Trident Capital and Epic Ventures; its partners include VMware, VCE, Symantec, CA, McAfee, Splunk; HP Arcsight, Accuvant, RSA and Intel.|
|Company:||iboss Network Security|
|iboss Network Security engineers highly scalable Web security solutions providing layer 7 defense across HTTP, SSL, threat and applications securing mobile devices on or off network. iboss enables organizations to safely adapt social media, SaaS, and mobile devices while expanding access to technology. By incorporating unmatched network traffic visibility, organizations are able to identify high-risk user behavior and the Shadow IT to create more actionable policies.|
|Company:||Identity Finder, LLC|
|Booth:||3635, North Hall|
|Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. Identity Finder's award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. The software discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.|
|Booth:||(at Dell Booth 1301)|
|Invincea is the premier innovator in advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea is the market-leading solution that provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.|
|Company:||IronKey by Imation|
|Ticker Symbol & Exchange:||NYSE: IMN|
|Imation's IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile workspaces. The IronKey portfolio meets a variety of needs from simple encryption and compliance to the need for the World’s Most Secure Flash Drive™. The IronKey line includes the world’s leading hardware encrypted USB drives; PC on a Stick™ workspaces for Windows To Go, transforming any computer into a trusted IT-managed workstation; and cloud-based or on-premise centralized secure device management solutions.|
|With more than 20 years of experience in IT security, Keypasco’s founders are the minds behind some of the revolutionary two factor authentication technology solutions used by banks today.|
|Keypasco offers a hardware-free, patent-approved and software-based authentication solution. The service combines factors like device fingerprints, geographical locations, 2-channel structure, proximity of mobile devices, and a risk behaviour analysis to offer strong multi-factor authentication.|
|Keypasco deliver on society’s expanding needs for personal authentication services, and identity protection within Internet banking, online gaming, eCommerce, mobile Commerce, eGovernment, etc. Keypasco’s vision is to be a leading supplier of services for securing cloud services.|
|Booth:||3634 North Hall|
|Lancope is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team.|
|Company:||Lanner Electronics Inc.|
|Booth:||109 (South Expo)|
|Lanner Electronics Inc. is a world leading provider of engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers.|
|Lanner designs and manufactures a wide range of hardware platforms for gateway security, firewall, UTM, WAN acceleration and appliance-based software delivery solutions. What's more, Lanner offers a full range of industrial communications computing platforms for industrial automation, digital signage, power communications and telecom datacenters.|
|Light Cyber is a leading provider of predictive breach detection solutions that protect organizations from targeted threats and cyber-attacks. Light Cyber Magna™ is the first product to analyze both network traffic and endpoint information to understand the behavior of users, devices and applications and to detect compromised computers and stolen credentials early in the attack lifecycle, allowing the user to remediate breaches and stop attacks before damage is done.|
|Led by world-class cyber security experts and seasoned management team, the company's products have been successfully deployed by top tier customers in the financial, telecom, government, media and technology sectors.|
|LockPath’s Keylight platform provides a flexible infrastructure to effectively support governance, risk management and compliance programs. Correlate incident, threat and vulnerability data from multiple sources and tie to key assets. Industry-specific solutions scale to any size organization and provide keen insight for understanding risks, assuring compliance and preparing for audits.|
|LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and award-winning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Jul. 30, 2016 05:00 PM EDT Reads: 1,292
[webcast] Continuous Delivery in the Enterprise | @DevOpsSummit @IBMDevOps #IBM #DevOps #ContinuousDelivery
To leverage Continuous Delivery, enterprises must consider impacts that span functional silos, as well as applications that touch older, slower moving components. Managing the many dependencies can cause slowdowns. See how to achieve continuous delivery in the enterprise.
Jul. 30, 2016 04:30 PM EDT Reads: 556
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 30, 2016 04:30 PM EDT Reads: 2,269
Up until last year, enterprises that were looking into cloud services usually undertook a long-term pilot with one of the large cloud providers, running test and dev workloads in the cloud. With cloud’s transition to mainstream adoption in 2015, and with enterprises migrating more and more workloads into the cloud and in between public and private environments, the single-provider approach must be revisited. In his session at 18th Cloud Expo, Yoav Mor, multi-cloud solution evangelist at Cloudy...
Jul. 30, 2016 04:15 PM EDT Reads: 627
Aspose.Total for .NET is the most complete package of all file format APIs for .NET as offered by Aspose. It empowers developers to create, edit, render, print and convert between a wide range of popular document formats within any .NET, C#, ASP.NET and VB.NET applications. Aspose compiles all .NET APIs on a daily basis to ensure that it contains the most up to date versions of each of Aspose .NET APIs. If a new .NET API or a new version of existing APIs is released during the subscription peri...
Jul. 30, 2016 02:30 PM EDT Reads: 1,059
Security, data privacy, reliability, and regulatory compliance are critical factors when evaluating whether to move business applications from in-house, client-hosted environments to a cloud platform. Quality assurance plays a vital role in ensuring that the appropriate level of risk assessment, verification, and validation takes place to ensure business continuity during the migration to a new cloud platform.
Jul. 30, 2016 02:00 PM EDT Reads: 525
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Jul. 30, 2016 01:30 PM EDT Reads: 972
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Jul. 30, 2016 01:00 PM EDT Reads: 1,856
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Jul. 30, 2016 01:00 PM EDT Reads: 2,123
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Jul. 30, 2016 12:00 PM EDT Reads: 1,364
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
Jul. 30, 2016 11:30 AM EDT Reads: 1,404
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
Jul. 30, 2016 11:00 AM EDT Reads: 550
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
Jul. 30, 2016 10:15 AM EDT Reads: 1,057
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
Jul. 30, 2016 10:15 AM EDT Reads: 1,518
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...
Jul. 30, 2016 10:00 AM EDT Reads: 545
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jul. 30, 2016 10:00 AM EDT Reads: 2,182
[webcast] Mastering DevOps Automation | @DevOpsSummit @IBMDevOps #IBM #Cloud #DevOps #ContinuousDelivery
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Jul. 30, 2016 09:45 AM EDT Reads: 537
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Jul. 30, 2016 09:30 AM EDT Reads: 833
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
Jul. 30, 2016 09:30 AM EDT Reads: 834
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...
Jul. 30, 2016 09:15 AM EDT Reads: 1,660