|By Business Wire||
|February 20, 2014 02:02 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles M through Z.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|The leader in Mobile IT, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. Available as an on-premise or cloud solution, MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls. For more information, please visit www.mobileiron.com.|
|Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is a pioneer in cybersecurity data analytics. The company's patented advanced analytics help enterprises, carriers and government customers proactively identify and accelerate the resolution of cyber threats. Using incisive intelligence culled from visual interactive and underlying data analytics, Narus nSystem identifies, predicts and characterizes the most advanced security threats, giving executives the visibility and context they need to make the right security decisions, right now, by letting them know what’s happening, why, and what to do about it. Narus boosts the ROI from existing IT investments.|
|NPCore, founded in 2008 in South Korea, is a premier network security solution provider, offering information security products such as ZombieZERO, for various customers in financial institutions, municipal offices, colleges, and small & mid-size companies. ZombieZERO is the only defense solution for the new APT (Advanced Persistent Threat) attack by offering behavior based security functions.|
|Ntrepid's Cyber Operations product suite has been enabling enterprises to securely conduct their online activities for nearly 20 years. From IP management tools to secure virtual browsing environments, our technologies and diverse global points of presence facilitate online research, investigations and data collection, while protecting identities and minimizing the spread of malware.|
|Introducing Passages by Ntrepid, a secure browser designed to mitigate malware and attribution concerns faced when conducting research and online activities. Passages isolates web browsing within a virtual machine and uses patented identity control technology to mask users true location and other identifying information. Learn more at GetPassages.com.|
|Ticker Symbol & Exchange:||Nasdaq: NXPI|
|NXP Semiconductors N.V. (Nasdaq: NXPI) provides High Performance Mixed Signal (HPMS) and Standard Product solutions that leverage its leading RF, Analog, Power Management, Interface, Security and Digital Processing expertise. It is a global semiconductor company with operations in more than 25 countries.|
|NXP is #1 in the overall, worldwide Identification market. NXP ID leads the way with complete solution expertise, world-class security and superior contactless performance. It delivers trusted mobile smart life solutions that authenticate identities, secure transactions and provide convenient interactions. These multi-application solutions are delivered without compromising security features, quality, convenience or design productivity.|
|Company:||OASIS Interoperability Showcase|
|Eleven companies demonstrate products that support the OASIS KMIP and PKCS #11 standards for encrypting data at rest, in-transit, and in the cloud. Cryptosense, Cryptsoft, Dell, Feitian, HP, IBM, P6R, Oracle, SafeNet, Thales e-Security, and Vormetric show standards-compliant enterprise key managers, storage appliances, HSMs, security tokens, and cryptographic toolkits all interoperating. See how the KMIP and PKCS #11 standards give CIOs, CSOs, and CTOs the freedom to select best-of-breed solutions.|
|OT is a world leader in digital security solutions for the mobility space. OT has always been at the heart of mobility, from the first smart cards to the latest contactless payment technologies which equip millions of smartphones. Present in the Payment, Telecommunications and Identity markets, OT offers end-to-end solutions in the Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control fields. OT employs over 6 000 employees worldwide, including 600 R&D people. With more than 50 sales offices across 5 continents and 10 facilities, OT’s international network serves clients in 140 countries.|
|For more information: www.oberthur.com.|
|Okta is an enterprise-grade identity management service, built from the ground up in the cloud and designed to address the challenges of a cloud, mobile and interconnected business world. Okta integrates with existing directories and identity systems, as well as thousands of on-premises, cloud-based and mobile applications, to enable IT to securely manage access anywhere, anytime and from any device. More than 550 enterprises worldwide use Okta to increase security and employee productivity, as well as lower IT costs and improve compliance.|
|The company is based in San Francisco, CA and is backed by venture capital firms Andreessen Horowitz, Greylock Partners, Khosla Ventures and Sequoia Capital. For more information, please visit www.okta.com.|
|Booth:||South Expo 252|
|OpenDNS delivers enterprise threat protection to reduce the risk and impact of security breaches. Unlike on-premises appliances that lack coverage for eroding network perimeters, OpenDNS' cloud-delivered platform protects all devices, anywhere, any time without sacrificing performance or manageability. OpenDNS' security intelligence leverages a unique satellite view of the Internet and uses big data, analytics and visualization techniques to predict and block attacks before they happen. The OpenDNS Global Network is the world's largest Internet security network and secures over 50 million active users daily through 22 globally distributed data centers.|
|Prevalent Networks is an IT security innovator that develops proven technologies and services to help organizations reduce and monitor threats and risks posed by third-party vendors.|
|Company:||Procera Networks Inc.|
|Ticker Symbol & Exchange:||PKT|
|Procera Networks Inc. (NASDAQ: PKT) delivers Internet Intelligence solutions to service providers and network equipment manufacturers for analytics and enforcement of broadband traffic worldwide. Procera’s solutions provide actionable intelligence and policy enforcement to ensure a high quality experience for any Internet and network connected device. For more information, visit http://www.proceranetworks.com or follow Procera on Twitter at @ProceraNetworks. Procera Networks will showcase its next-generation Deep Packet Inspection engine, NAVL, alongside two of its technology partners, Napatech and Intel in Booth #2321. Procera's NAVL offers industry leading, high performance Deep Packet Inspection technology for integration into third party platforms.|
|RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance-management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated.|
|Seccuris has been helping clients with business-driven information security solutions through professional consulting and managed services since 1999. We're the alternative because we help you uncover known and unknown risks that threaten not only your technology, but also your entire enterprise. Then we work with you to design exactly what you need; whether it’s Enterprise Security Architecture, Information Assurance Audits, IT Risk Management and Compliance, Security Response Services or our OneStone™ Information Assurance Portal. That way you can make effective risk-based decisions at every level. Call us at (866) 644-8442 to discuss the right solution for your needs.|
|Security Mentor®, pioneer of security awareness training that employees love to take, enables companies in every industry to reduce risk by creating a more secure workforce. Interactive, highly engaging lessons teach critical security skills in an easy-to-understand, fun format. Our Brief, Frequent, Focused™ training model of 10-minute lessons delivered monthly fits employees’ busy schedules and keeps security top of mind. Training is served from Security Mentor’s Cloud LMS or provided as SCORM-compliant modules. Founded in 2008, customers range from Fortune 500 enterprises to local and state governments, including the State of Michigan. To learn more, request a demo at www.securitymentor.com.|
|Seculert provides enterprises comprehensive protection from advanced persistent threats and malware. Its integrated platform technology analyzes malware communications, traffic logs, and suspicious files to identify both known and unknown advanced threats. Seculert’s proven cloud-based technology leverages crowdsourcing and Big Data analytics to identify and block attacks as they develop. Founded in 2010, Seculert has offices in the U.S., the U.K. and Israel. For more information, visit www.seculert.com.|
|Company:||Secure Access Technologies Inc.,|
|Booth:||2434 South Hall|
|Secure Access Technologies Inc. (SAT) is a Menlo Park, CA based start-up that provides the strongest data security on the market today with stepped-up authentication and real-time proximity monitoring.|
|SAT uses the user's smart phone with SAT MobileID to protect data on mobile devices and computers.|
|The user authenticates only once to any application on any device when SAT MobileID is in proximity. When the user walks away, the data locks automatically.|
SAT partnered with RSA and MobileIron and has more than 10 patents issued. Breakthrough security and user experience. For more information, visit www.secureaccesstechnologies.com.
|Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world’s first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley Networks, Palo Alto Networks, VMware, and Google.|
|Company:||Sims Recycling Solutions|
|Ticker Symbol & Exchange:||ASX: SGM|
|Sims Recycling Solutions (us.simsrecycling.com), the global leader in electronics reuse and recycling, offers customers comprehensive recycling services out of our 52 owned and operated sites across the globe.|
|Our customers rely on our global reach, expertise, and infrastructure to secure their data, process their electronic equipment in an environmentally responsible manner, protect their reputations, and eliminate their compliance risks.|
|In North America, Sims operates 14 sites enabling us to offer services anywhere you do business.|
|Booth:||South Expo 715|
|Skybox Security, Inc. provides the most powerful risk analytics for cyber security, giving security management and operations the tools they need to eliminate attack vectors and safeguard business data and services. Skybox solutions provide a context-aware view of the network and risks that drives effective vulnerability and threat management, firewall management, and continuous compliance monitoring. Organizations in Financial Services, Government, Energy, Defense, Retail, and Telecommunications rely on Skybox Security every day for automated, integrated security management solutions that lower risk exposure and optimize security management processes.|
|Company:||Software Diversified Services|
|Software Diversified Services (SDS) now provides all sales, support, and development for E-Business Server encryption and security software. SDS's E-Business Server is based on the McAfee product formerly marketed under the E-Business Server name, which McAfee has licensed to SDS.|
|SDS's commitment means this enterprise-scale encryption server will remain a trusted tool for years to come.|
|SDS teams the E-Business Server with its other security tools: VitalSigns for FTP automates secure file transfer; in collaboration with software from SSH Corporation, it encrypts data in transit.|
|Since 1982, SDS has provided software to hundreds of customers worldwide, including Global 500 companies.|
|Solarflare is the leading provider of application-intelligent networking I/O software and hardware that accelerate, monitor and secure network data. In January, Solarflare launched SolarSecure to provide a new level of server protection to mission-critical networks vulnerable to cyber security breaches. Without any need for additional hardware, Solarflare enables enterprises to implement security policies to guard servers at the network level. Solarflare protects hosts by implementing policies from the Norse Live Threat Intelligence dark list in the Solarflare DDOS filter engine. Visit Solarflare Booth #2220 to see the Solarflare+Norse demonstration of "Self-Protecting, Hardened Hosts."|
|Ticker Symbol & Exchange:||NYSE: SWI|
|SolarWinds provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses. In all of our market areas, our approach is consistent. We focus exclusively on IT pros and strive to eliminate the complexity that they have been forced to accept from traditional enterprise software vendors. SolarWinds delivers on this commitment with unexpected simplicity through products that are easy to find, buy, use and maintain while providing the power to address any IT management problem on any scale.|
|Company:||Solutionary / NTT Group Security Company|
|Ticker Symbol & Exchange:||NTT|
|Solutionary, a leading managed security services provider (MSSP), focuses on delivering managed security services, security consulting services and global threat intelligence. Solutionary services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Clients are able to optimize security programs, make informed decisions, achieve compliance, and reduce costs. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extensions of clients' internal teams, providing industry-leading client service to global enterprise and mid-market clients across all industries.|
|Thales e-Security is a leading global provider of data encryption and cyber security solutions to the financial services, high technology, manufacturing, government and technology sectors. Thales is showcasing its high assurance cryptographic solutions for protecting big data, public key infrastructures (PKIs), cloud and mobile payments at this year's RSA Conference. As organizations increasingly rely on cryptography as part of their data protection strategy and to protect their critical systems, the trustworthiness of these crypto systems becomes paramount, particularly in light of recent concerns over back doors, poorly implemented crypto systems and the increasing burdens arising from privacy mandates. Thales can help organizations re-assess and re-evaluate their crypto security and key management infrastructure and deliver solutions that ensure their integrity and trustworthiness.|
|Company:||ThreatTrack Security, Inc.|
|ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatSecure advanced malware protection platform, ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat intelligence service.|
|Thycotic Software deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end-users. A member of the Inc. 5000, Thycotic is recognized as the fastest growing, privately held PAM provider in the USA. Secret Server manages passwords and identity access across a company's entire IT infrastructure. Thycotic also provides end-user password rest and self-service AD group management tools. Trusted by over 2,500 organizations worldwide - including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers. To learn more, please visit www.thycotic.com.|
|Company:||TIBCO Software, INC|
|Ticker Symbol & Exchange:||TIBX|
|TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use on-premise or as part of cloud computing environments. The TIBCO LogLogic® product line provides organizations with security, compliance and IT optimization through enterprise-class log management and predictive intelligence for big data which enables companies to achieve the Two-Second Advantage® – the ability to capture the right information at the right time and act on it preemptively for a competitive advantage. Learn more at www.tibco.com/loglogic.|
|TITUS solutions enable organizations to classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS Classification Suite includes the leading email, document and file classification and marking solutions that enhance data loss prevention by involving end users in identifying sensitive information. TITUS solutions are trusted by over 2 million users within more than 600 organizations in 60 countries around the world. Our customers include Dell, Nokia, Dow Corning, United States Air Force, NATO, Pratt and Whitney, Canadian Department of National Defence, Australian Department of Defence, and the U.S. Department of Veterans Affairs.|
|TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT GRC management solutions that give decision makers a holistic view of their security posture, enable effective data protection and automate compliance. TraceSecurity's flagship software solution, TraceCSO, is the first platform to effectively transform IT GRC management into a unified and easy-to-use business application and can be deployed in a matter of weeks. With more than 1,700 customers, TraceSecurity supports organizations in financial services, healthcare, high-tech, insurance, government, education and other regulated sectors. Founded in 2004, the company has executive offices in Silicon Valley and offices in Baton Rouge, Louisiana.|
|Ticker Symbol & Exchange:||TSE: 4704; TYO 4704|
|Trend Micro Incorporated a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend MicroT Smart Protection NetworkT infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.|
|Booth:||3527, North Hall|
|Trustwave helps businesses fight cybercrime, protect data and reduce security risks. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs while safely embracing business imperatives including big data, BYOD and social media. More than two million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com|
|Tufin® is the leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organizations using the Tufin Orchestration SuiteT will have a positive impact on the business by reducing the time and cost spent implementing network changes by up to 80 percent. The Tufin Orchestration Suite helps organizations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,300 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals and partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software.|
|Ticker Symbol & Exchange:||NYSE: UIS|
|Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With approximately 23,000 employees, Unisys serves commercial organizations and government agencies throughout the world. For more information, visit http://www.unisys.com/unisys/.|
|Company:||University of Denver|
|University College, the college of professional and continuing studies at the University of Denver, offers cutting-edge master's degrees and certificates online and on campus in Information Systems Security. Students receive applied instruction from expert practitioners as they learn to navigate real-world security challenges. You will analyze security needs, provide viable solutions, and develop the breadth of knowledge needed for success in the global arena of information assurance. The curriculum covers such topics as network security, physical security, cryptography, cyber law, computer forensics, and application security. The University of Denver is a designated Center for Academic Excellence in Information Assurance Education.|
|Viewfinity is leveraging its core endpoint protection technology to meet the increased need for smarter, more agile security solutions, that not only detect but respond to threats. Our endpoint agent diligently monitors for and detects suspicious behavior, and responds by harnessing attacks before they permeate an IT infrastructure. Our visibility, detection and remediation, along with purposeful forensics, provide a structure that helps progress the level of cybersecurity that targets and adapts enterprise IT security mechanisms. Our endpoint protection encompasses forensics, prevention, visibility, and remediation, offering advanced protection against advanced targeted attacks.|
|wolfSSL, founded in 2004, is an open source Internet security company whose primary products include the CyaSSL lightweight SSL library and the yaSSL Embedded Web Server. Primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, offering products under the GPLv2 as well as a standard commercial license.|
|wolfSSL's products are designed to offer optimal performance, rapid integration, the ability to leverage hardware crypto, and support for the most current standards. All products are designed with clean APIs, and are backed by a dedicated and responsive support and development team.|
|With global operations, Wontok, Inc. (booth # 2502) delivers proven data security solutions that fill the gaps left by conventional security offerings. Wontok's added layer of security provides businesses, government organizations and consumers the confidence that their online commerce and communications are secure and their data is safe. During The RSA Conference February 24-28th, Wontok announces two new malware prevention products targeted for Retailers and Banks adding on its flagship product, Wontok™ SafeCentral, a proven endpoint cybersecurity solution that renders malware inoperable even on already infected PCs running Windows. Please contact us to arrange an interview with Wontok's CEO, Adam Tegg.|
|Zscaler is transforming enterprise networking and security with the world’s largest Direct-to-Cloud Network, which securely enables the productivity benefits of cloud, mobile and social technologies without the cost and complexity of traditional on-premise appliances and software.|
|The Zscaler Direct-to-Cloud Network processes daily more than 12 billion transactions from more than 12 million users in 180 countries across 100 global data centers with near-zero latency. Learn why more than 4,500 global enterprises choose Zscaler to enable end-user productivity, enforce security policy and streamline WAN performance.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
SYS-CON Events announced today that Interface Masters Technologies, a leader in Network Visibility and Uptime Solutions, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Interface Masters Technologies is a leading vendor in the network monitoring and high speed networking markets. Based in the heart of Silicon Valley, Interface Masters' expertise lies in Gigabit, 10 Gigabit and 40 Gigabit Eth...
Oct. 22, 2016 02:45 AM EDT Reads: 3,280
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and microservices. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your conta...
Oct. 22, 2016 02:00 AM EDT Reads: 1,380
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Oct. 22, 2016 01:30 AM EDT Reads: 9,607
SYS-CON Events announced today that Streamlyzer will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Streamlyzer is a powerful analytics for video streaming service that enables video streaming providers to monitor and analyze QoE (Quality-of-Experience) from end-user devices in real time.
Oct. 22, 2016 01:15 AM EDT Reads: 886
You have great SaaS business app ideas. You want to turn your idea quickly into a functional and engaging proof of concept. You need to be able to modify it to meet customers' needs, and you need to deliver a complete and secure SaaS application. How could you achieve all the above and yet avoid unforeseen IT requirements that add unnecessary cost and complexity? You also want your app to be responsive in any device at any time. In his session at 19th Cloud Expo, Mark Allen, General Manager of...
Oct. 22, 2016 01:15 AM EDT Reads: 800
@ThingsExpo has been named the Top 5 Most Influential Internet of Things Brand by Onalytica in the ‘The Internet of Things Landscape 2015: Top 100 Individuals and Brands.' Onalytica analyzed Twitter conversations around the #IoT debate to uncover the most influential brands and individuals driving the conversation. Onalytica captured data from 56,224 users. The PageRank based methodology they use to extract influencers on a particular topic (tweets mentioning #InternetofThings or #IoT in this ...
Oct. 22, 2016 01:00 AM EDT Reads: 8,143
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in Embedded and IoT solutions, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place on June 7-9, 2017, at the Javits Center in New York City, NY. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology, is a premier provider of advanced server Building Block Solutions® for Data Center, Cloud Computing, Enterprise IT, Hadoop/Big Data, HPC and ...
Oct. 22, 2016 12:30 AM EDT Reads: 3,486
Cloud based infrastructure deployment is becoming more and more appealing to customers, from Fortune 500 companies to SMEs due to its pay-as-you-go model. Enterprise storage vendors are able to reach out to these customers by integrating in cloud based deployments; this needs adaptability and interoperability of the products confirming to cloud standards such as OpenStack, CloudStack, or Azure. As compared to off the shelf commodity storage, enterprise storages by its reliability, high-availabil...
Oct. 22, 2016 12:15 AM EDT Reads: 956
The IoT industry is now at a crossroads, between the fast-paced innovation of technologies and the pending mass adoption by global enterprises. The complexity of combining rapidly evolving technologies and the need to establish practices for market acceleration pose a strong challenge to global enterprises as well as IoT vendors. In his session at @ThingsExpo, Clark Smith, senior product manager for Numerex, will discuss how Numerex, as an experienced, established IoT provider, has embraced a ...
Oct. 22, 2016 12:00 AM EDT Reads: 937
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Oct. 22, 2016 12:00 AM EDT Reads: 5,930
@DevOpsSummit has been named the ‘Top DevOps Influencer' by iTrend. iTrend processes millions of conversations, tweets, interactions, news articles, press releases, blog posts - and extract meaning form them and analyzes mobile and desktop software platforms used to communicate, various metadata (such as geo location), and automation tools. In overall placement, @DevOpsSummit ranked as the number one ‘DevOps Influencer' followed by @CloudExpo at third, and @MicroservicesE at 24th.
Oct. 22, 2016 12:00 AM EDT Reads: 3,815
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
Oct. 21, 2016 11:45 PM EDT Reads: 4,413
November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Penta Security is a leading vendor for data security solutions, including its encryption solution, D’Amo. By using FPE technology, D’Amo allows for the implementation of encryption technology to sensitive data fields without modification to schema in the database environment. With businesses having their data become increasingly more complicated in their mission-critical applications (such as ERP, CRM, HRM), continued ...
Oct. 21, 2016 11:45 PM EDT Reads: 869
SYS-CON Events announced today that Cloudbric, a leading website security provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Cloudbric is an elite full service website protection solution specifically designed for IT novices, entrepreneurs, and small and medium businesses. First launched in 2015, Cloudbric is based on the enterprise level Web Application Firewall by Penta Security Sys...
Oct. 21, 2016 11:45 PM EDT Reads: 985
You think you know what’s in your data. But do you? Most organizations are now aware of the business intelligence represented by their data. Data science stands to take this to a level you never thought of – literally. The techniques of data science, when used with the capabilities of Big Data technologies, can make connections you had not yet imagined, helping you discover new insights and ask new questions of your data. In his session at @ThingsExpo, Sarbjit Sarkaria, data science team lead ...
Oct. 21, 2016 10:00 PM EDT Reads: 4,220
A completely new computing platform is on the horizon. They’re called Microservers by some, ARM Servers by others, and sometimes even ARM-based Servers. No matter what you call them, Microservers will have a huge impact on the data center and on server computing in general. Although few people are familiar with Microservers today, their impact will be felt very soon. This is a new category of computing platform that is available today and is predicted to have triple-digit growth rates for some ...
Oct. 21, 2016 10:00 PM EDT Reads: 33,897
Effectively SMBs and government programs must address compounded regulatory compliance requirements. The most recent are Controlled Unclassified Information and the EU’s GDPR have Board Level implications. Managing sensitive data protection will likely result in acquisition criteria, demonstration requests and new requirements. Developers, as part of the pre-planning process and the associated supply chain, could benefit from updating their code libraries and design by incorporating changes.
Oct. 21, 2016 09:30 PM EDT Reads: 1,591
SYS-CON Events announced today that Enzu will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Enzu’s mission is to be the leading provider of enterprise cloud solutions worldwide. Enzu enables online businesses to use its IT infrastructure to their competitive advantage. By offering a suite of proven hosting and management services, Enzu wants companies to focus on the core of their online busine...
Oct. 21, 2016 09:15 PM EDT Reads: 1,200
SYS-CON Events announced today that Roundee / LinearHub will exhibit at the WebRTC Summit at @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LinearHub provides Roundee Service, a smart platform for enterprise video conferencing with enhanced features such as automatic recording and transcription service. Slack users can integrate Roundee to their team via Slack’s App Directory, and '/roundee' command lets your video conference ...
Oct. 21, 2016 09:15 PM EDT Reads: 1,983
SYS-CON Events announced today that SoftNet Solutions will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. SoftNet Solutions specializes in Enterprise Solutions for Hadoop and Big Data. It offers customers the most open, robust, and value-conscious portfolio of solutions, services, and tools for the shortest route to success with Big Data. The unique differentiator is the ability to architect and...
Oct. 21, 2016 08:15 PM EDT Reads: 365