|By Business Wire||
|February 20, 2014 02:02 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles M through Z.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|The leader in Mobile IT, MobileIron was purpose-built to secure and manage mobile apps, content, and devices for global companies. Available as an on-premise or cloud solution, MobileIron was the first to deliver key innovations such as multi-OS mobile device management (MDM), mobile application management (MAM), and BYOD privacy controls. For more information, please visit www.mobileiron.com.|
|Narus, a wholly owned subsidiary of The Boeing Company (NYSE:BA), is a pioneer in cybersecurity data analytics. The company's patented advanced analytics help enterprises, carriers and government customers proactively identify and accelerate the resolution of cyber threats. Using incisive intelligence culled from visual interactive and underlying data analytics, Narus nSystem identifies, predicts and characterizes the most advanced security threats, giving executives the visibility and context they need to make the right security decisions, right now, by letting them know what’s happening, why, and what to do about it. Narus boosts the ROI from existing IT investments.|
|NPCore, founded in 2008 in South Korea, is a premier network security solution provider, offering information security products such as ZombieZERO, for various customers in financial institutions, municipal offices, colleges, and small & mid-size companies. ZombieZERO is the only defense solution for the new APT (Advanced Persistent Threat) attack by offering behavior based security functions.|
|Ntrepid's Cyber Operations product suite has been enabling enterprises to securely conduct their online activities for nearly 20 years. From IP management tools to secure virtual browsing environments, our technologies and diverse global points of presence facilitate online research, investigations and data collection, while protecting identities and minimizing the spread of malware.|
|Introducing Passages by Ntrepid, a secure browser designed to mitigate malware and attribution concerns faced when conducting research and online activities. Passages isolates web browsing within a virtual machine and uses patented identity control technology to mask users true location and other identifying information. Learn more at GetPassages.com.|
|Ticker Symbol & Exchange:||Nasdaq: NXPI|
|NXP Semiconductors N.V. (Nasdaq: NXPI) provides High Performance Mixed Signal (HPMS) and Standard Product solutions that leverage its leading RF, Analog, Power Management, Interface, Security and Digital Processing expertise. It is a global semiconductor company with operations in more than 25 countries.|
|NXP is #1 in the overall, worldwide Identification market. NXP ID leads the way with complete solution expertise, world-class security and superior contactless performance. It delivers trusted mobile smart life solutions that authenticate identities, secure transactions and provide convenient interactions. These multi-application solutions are delivered without compromising security features, quality, convenience or design productivity.|
|Company:||OASIS Interoperability Showcase|
|Eleven companies demonstrate products that support the OASIS KMIP and PKCS #11 standards for encrypting data at rest, in-transit, and in the cloud. Cryptosense, Cryptsoft, Dell, Feitian, HP, IBM, P6R, Oracle, SafeNet, Thales e-Security, and Vormetric show standards-compliant enterprise key managers, storage appliances, HSMs, security tokens, and cryptographic toolkits all interoperating. See how the KMIP and PKCS #11 standards give CIOs, CSOs, and CTOs the freedom to select best-of-breed solutions.|
|OT is a world leader in digital security solutions for the mobility space. OT has always been at the heart of mobility, from the first smart cards to the latest contactless payment technologies which equip millions of smartphones. Present in the Payment, Telecommunications and Identity markets, OT offers end-to-end solutions in the Smart Transactions, Mobile Financial Services, Machine-to-Machine, Digital Identity and Transport & Access Control fields. OT employs over 6 000 employees worldwide, including 600 R&D people. With more than 50 sales offices across 5 continents and 10 facilities, OT’s international network serves clients in 140 countries.|
|For more information: www.oberthur.com.|
|Okta is an enterprise-grade identity management service, built from the ground up in the cloud and designed to address the challenges of a cloud, mobile and interconnected business world. Okta integrates with existing directories and identity systems, as well as thousands of on-premises, cloud-based and mobile applications, to enable IT to securely manage access anywhere, anytime and from any device. More than 550 enterprises worldwide use Okta to increase security and employee productivity, as well as lower IT costs and improve compliance.|
|The company is based in San Francisco, CA and is backed by venture capital firms Andreessen Horowitz, Greylock Partners, Khosla Ventures and Sequoia Capital. For more information, please visit www.okta.com.|
|Booth:||South Expo 252|
|OpenDNS delivers enterprise threat protection to reduce the risk and impact of security breaches. Unlike on-premises appliances that lack coverage for eroding network perimeters, OpenDNS' cloud-delivered platform protects all devices, anywhere, any time without sacrificing performance or manageability. OpenDNS' security intelligence leverages a unique satellite view of the Internet and uses big data, analytics and visualization techniques to predict and block attacks before they happen. The OpenDNS Global Network is the world's largest Internet security network and secures over 50 million active users daily through 22 globally distributed data centers.|
|Prevalent Networks is an IT security innovator that develops proven technologies and services to help organizations reduce and monitor threats and risks posed by third-party vendors.|
|Company:||Procera Networks Inc.|
|Ticker Symbol & Exchange:||PKT|
|Procera Networks Inc. (NASDAQ: PKT) delivers Internet Intelligence solutions to service providers and network equipment manufacturers for analytics and enforcement of broadband traffic worldwide. Procera’s solutions provide actionable intelligence and policy enforcement to ensure a high quality experience for any Internet and network connected device. For more information, visit http://www.proceranetworks.com or follow Procera on Twitter at @ProceraNetworks. Procera Networks will showcase its next-generation Deep Packet Inspection engine, NAVL, alongside two of its technology partners, Napatech and Intel in Booth #2321. Procera's NAVL offers industry leading, high performance Deep Packet Inspection technology for integration into third party platforms.|
|RSA, The Security Division of EMC, is the premier provider of security, risk, and compliance-management solutions for business acceleration. RSA helps the world's leading organizations succeed by solving their most complex and sensitive security challenges. These challenges include managing organizational risk, safeguarding mobile access and collaboration, proving compliance, and securing virtual and cloud environments. Combining business-critical controls in identity assurance, encryption & key management, SIEM, Data Loss Prevention, and Fraud Protection with industry-leading GRC capabilities and robust consulting services, RSA brings visibility and trust to millions of user identities, the transactions that they perform, and the data that is generated.|
|Seccuris has been helping clients with business-driven information security solutions through professional consulting and managed services since 1999. We're the alternative because we help you uncover known and unknown risks that threaten not only your technology, but also your entire enterprise. Then we work with you to design exactly what you need; whether it’s Enterprise Security Architecture, Information Assurance Audits, IT Risk Management and Compliance, Security Response Services or our OneStone™ Information Assurance Portal. That way you can make effective risk-based decisions at every level. Call us at (866) 644-8442 to discuss the right solution for your needs.|
|Security Mentor®, pioneer of security awareness training that employees love to take, enables companies in every industry to reduce risk by creating a more secure workforce. Interactive, highly engaging lessons teach critical security skills in an easy-to-understand, fun format. Our Brief, Frequent, Focused™ training model of 10-minute lessons delivered monthly fits employees’ busy schedules and keeps security top of mind. Training is served from Security Mentor’s Cloud LMS or provided as SCORM-compliant modules. Founded in 2008, customers range from Fortune 500 enterprises to local and state governments, including the State of Michigan. To learn more, request a demo at www.securitymentor.com.|
|Seculert provides enterprises comprehensive protection from advanced persistent threats and malware. Its integrated platform technology analyzes malware communications, traffic logs, and suspicious files to identify both known and unknown advanced threats. Seculert’s proven cloud-based technology leverages crowdsourcing and Big Data analytics to identify and block attacks as they develop. Founded in 2010, Seculert has offices in the U.S., the U.K. and Israel. For more information, visit www.seculert.com.|
|Company:||Secure Access Technologies Inc.,|
|Booth:||2434 South Hall|
|Secure Access Technologies Inc. (SAT) is a Menlo Park, CA based start-up that provides the strongest data security on the market today with stepped-up authentication and real-time proximity monitoring.|
|SAT uses the user's smart phone with SAT MobileID to protect data on mobile devices and computers.|
|The user authenticates only once to any application on any device when SAT MobileID is in proximity. When the user walks away, the data locks automatically.|
SAT partnered with RSA and MobileIron and has more than 10 patents issued. Breakthrough security and user experience. For more information, visit www.secureaccesstechnologies.com.
|Shape Security is a startup in Mountain View, California that has created a completely new approach to website defense. Its flagship product, the ShapeShifter, is the world’s first botwall: an advanced technology that disables the attack capability of malware, botnets, and scripts. This results in a comprehensive defense against the most serious website breaches, for which there are no other existing solutions. Shape is backed by top investors including Kleiner Perkins, Google Ventures, and Eric Schmidt. It is led by cybersecurity leaders from the Pentagon, Cisco, Mozilla, Oakley Networks, Palo Alto Networks, VMware, and Google.|
|Company:||Sims Recycling Solutions|
|Ticker Symbol & Exchange:||ASX: SGM|
|Sims Recycling Solutions (us.simsrecycling.com), the global leader in electronics reuse and recycling, offers customers comprehensive recycling services out of our 52 owned and operated sites across the globe.|
|Our customers rely on our global reach, expertise, and infrastructure to secure their data, process their electronic equipment in an environmentally responsible manner, protect their reputations, and eliminate their compliance risks.|
|In North America, Sims operates 14 sites enabling us to offer services anywhere you do business.|
|Booth:||South Expo 715|
|Skybox Security, Inc. provides the most powerful risk analytics for cyber security, giving security management and operations the tools they need to eliminate attack vectors and safeguard business data and services. Skybox solutions provide a context-aware view of the network and risks that drives effective vulnerability and threat management, firewall management, and continuous compliance monitoring. Organizations in Financial Services, Government, Energy, Defense, Retail, and Telecommunications rely on Skybox Security every day for automated, integrated security management solutions that lower risk exposure and optimize security management processes.|
|Company:||Software Diversified Services|
|Software Diversified Services (SDS) now provides all sales, support, and development for E-Business Server encryption and security software. SDS's E-Business Server is based on the McAfee product formerly marketed under the E-Business Server name, which McAfee has licensed to SDS.|
|SDS's commitment means this enterprise-scale encryption server will remain a trusted tool for years to come.|
|SDS teams the E-Business Server with its other security tools: VitalSigns for FTP automates secure file transfer; in collaboration with software from SSH Corporation, it encrypts data in transit.|
|Since 1982, SDS has provided software to hundreds of customers worldwide, including Global 500 companies.|
|Solarflare is the leading provider of application-intelligent networking I/O software and hardware that accelerate, monitor and secure network data. In January, Solarflare launched SolarSecure to provide a new level of server protection to mission-critical networks vulnerable to cyber security breaches. Without any need for additional hardware, Solarflare enables enterprises to implement security policies to guard servers at the network level. Solarflare protects hosts by implementing policies from the Norse Live Threat Intelligence dark list in the Solarflare DDOS filter engine. Visit Solarflare Booth #2220 to see the Solarflare+Norse demonstration of "Self-Protecting, Hardened Hosts."|
|Ticker Symbol & Exchange:||NYSE: SWI|
|SolarWinds provides powerful and affordable IT management software to customers worldwide from Fortune 500 enterprises to small businesses. In all of our market areas, our approach is consistent. We focus exclusively on IT pros and strive to eliminate the complexity that they have been forced to accept from traditional enterprise software vendors. SolarWinds delivers on this commitment with unexpected simplicity through products that are easy to find, buy, use and maintain while providing the power to address any IT management problem on any scale.|
|Company:||Solutionary / NTT Group Security Company|
|Ticker Symbol & Exchange:||NTT|
|Solutionary, a leading managed security services provider (MSSP), focuses on delivering managed security services, security consulting services and global threat intelligence. Solutionary services protect traditional and virtual IT infrastructures, cloud environments and mobile data. Clients are able to optimize security programs, make informed decisions, achieve compliance, and reduce costs. The Solutionary Security Engineering Research Team (SERT) researches the global threat landscape, providing actionable threat intelligence, enhanced threat detection and mitigating controls. Experienced, certified Solutionary security experts act as an extensions of clients' internal teams, providing industry-leading client service to global enterprise and mid-market clients across all industries.|
|Thales e-Security is a leading global provider of data encryption and cyber security solutions to the financial services, high technology, manufacturing, government and technology sectors. Thales is showcasing its high assurance cryptographic solutions for protecting big data, public key infrastructures (PKIs), cloud and mobile payments at this year's RSA Conference. As organizations increasingly rely on cryptography as part of their data protection strategy and to protect their critical systems, the trustworthiness of these crypto systems becomes paramount, particularly in light of recent concerns over back doors, poorly implemented crypto systems and the increasing burdens arising from privacy mandates. Thales can help organizations re-assess and re-evaluate their crypto security and key management infrastructure and deliver solutions that ensure their integrity and trustworthiness.|
|Company:||ThreatTrack Security, Inc.|
|ThreatTrack Security specializes in helping organizations identify and stop Advanced Persistent Threats (APTs), targeted attacks and other sophisticated malware that are designed to evade the traditional cyber-defenses deployed by enterprises, and small and medium-sized businesses (SMBs) around the world. The company develops advanced cybersecurity solutions that analyze, detect and remediate the latest malicious threats, including its ThreatSecure advanced malware protection platform, ThreatAnalyzer malware behavioral analysis sandbox, VIPRE business and consumer antivirus software, and ThreatIQ real-time threat intelligence service.|
|Thycotic Software deploys smart, reliable, IT security solutions that empower companies to control and monitor privileged account credentials and identity access for administrators and end-users. A member of the Inc. 5000, Thycotic is recognized as the fastest growing, privately held PAM provider in the USA. Secret Server manages passwords and identity access across a company's entire IT infrastructure. Thycotic also provides end-user password rest and self-service AD group management tools. Trusted by over 2,500 organizations worldwide - including members of the Fortune 500, enterprises, government agencies, technology firms, universities, non-profits, and managed service providers. To learn more, please visit www.thycotic.com.|
|Company:||TIBCO Software, INC|
|Ticker Symbol & Exchange:||TIBX|
|TIBCO Software Inc. (NASDAQ: TIBX) is a provider of infrastructure software for companies to use on-premise or as part of cloud computing environments. The TIBCO LogLogic® product line provides organizations with security, compliance and IT optimization through enterprise-class log management and predictive intelligence for big data which enables companies to achieve the Two-Second Advantage® – the ability to capture the right information at the right time and act on it preemptively for a competitive advantage. Learn more at www.tibco.com/loglogic.|
|TITUS solutions enable organizations to classify, protect and confidently share information, and meet regulatory compliance requirements by identifying and securing unstructured data. TITUS Classification Suite includes the leading email, document and file classification and marking solutions that enhance data loss prevention by involving end users in identifying sensitive information. TITUS solutions are trusted by over 2 million users within more than 600 organizations in 60 countries around the world. Our customers include Dell, Nokia, Dow Corning, United States Air Force, NATO, Pratt and Whitney, Canadian Department of National Defence, Australian Department of Defence, and the U.S. Department of Veterans Affairs.|
|TraceSecurity, a leading pioneer in cloud-based security solutions, provides IT GRC management solutions that give decision makers a holistic view of their security posture, enable effective data protection and automate compliance. TraceSecurity's flagship software solution, TraceCSO, is the first platform to effectively transform IT GRC management into a unified and easy-to-use business application and can be deployed in a matter of weeks. With more than 1,700 customers, TraceSecurity supports organizations in financial services, healthcare, high-tech, insurance, government, education and other regulated sectors. Founded in 2004, the company has executive offices in Silicon Valley and offices in Baton Rouge, Louisiana.|
|Ticker Symbol & Exchange:||TSE: 4704; TYO 4704|
|Trend Micro Incorporated a global leader in security software, rated number one in server security (IDC, 2013), strives to make the world safe for exchanging digital information. Built on 25 years of experience, our solutions for consumers, businesses and governments provide layered data security to protect information on mobile devices, endpoints, gateways, servers and the cloud. Trend Micro enables the smart protection of information, with innovative security technology that is simple to deploy and manage, and fits an evolving ecosystem. All of our solutions are powered by cloud-based global threat intelligence, the Trend MicroT Smart Protection NetworkT infrastructure, and are supported by over 1,200 threat experts around the globe. For more information, visit TrendMicro.com.|
|Booth:||3527, North Hall|
|Trustwave helps businesses fight cybercrime, protect data and reduce security risks. With cloud and managed security services, integrated technologies and a team of security experts, ethical hackers and researchers, Trustwave enables businesses to transform the way they manage their information security and compliance programs while safely embracing business imperatives including big data, BYOD and social media. More than two million businesses are enrolled in the Trustwave TrustKeeper® cloud platform, through which Trustwave delivers automated, efficient and cost-effective data protection, risk management and threat intelligence. Trustwave is a privately held company, headquartered in Chicago, with customers in 96 countries. For more information about Trustwave, visit www.trustwave.com|
|Tufin® is the leader in Security Policy Orchestration, automating and accelerating network infrastructure changes while maintaining security and compliance. By improving network change processes, organizations using the Tufin Orchestration SuiteT will have a positive impact on the business by reducing the time and cost spent implementing network changes by up to 80 percent. The Tufin Orchestration Suite helps organizations automate security and efficiency into day-to-day operations, enabling them to be more agile and leverage technology to gain a competitive advantage. Founded in 2005, Tufin serves more than 1,300 customers in industries from telecom and financial services to energy, transportation and pharmaceuticals and partners with leading vendors including Check Point, Cisco, Juniper Networks, Palo Alto Networks, Fortinet, F5, Stonesoft, Blue Coat, McAfee and BMC Software.|
|Ticker Symbol & Exchange:||NYSE: UIS|
|Unisys is a worldwide information technology company. We provide a portfolio of IT services, software, and technology that solves critical problems for clients. We specialize in helping clients secure their operations, increase the efficiency and utilization of their data centers, enhance support to their end users and constituents, and modernize their enterprise applications. To provide these services and solutions, we bring together offerings and capabilities in outsourcing services, systems integration and consulting services, infrastructure services, maintenance services, and high-end server technology. With approximately 23,000 employees, Unisys serves commercial organizations and government agencies throughout the world. For more information, visit http://www.unisys.com/unisys/.|
|Company:||University of Denver|
|University College, the college of professional and continuing studies at the University of Denver, offers cutting-edge master's degrees and certificates online and on campus in Information Systems Security. Students receive applied instruction from expert practitioners as they learn to navigate real-world security challenges. You will analyze security needs, provide viable solutions, and develop the breadth of knowledge needed for success in the global arena of information assurance. The curriculum covers such topics as network security, physical security, cryptography, cyber law, computer forensics, and application security. The University of Denver is a designated Center for Academic Excellence in Information Assurance Education.|
|Viewfinity is leveraging its core endpoint protection technology to meet the increased need for smarter, more agile security solutions, that not only detect but respond to threats. Our endpoint agent diligently monitors for and detects suspicious behavior, and responds by harnessing attacks before they permeate an IT infrastructure. Our visibility, detection and remediation, along with purposeful forensics, provide a structure that helps progress the level of cybersecurity that targets and adapts enterprise IT security mechanisms. Our endpoint protection encompasses forensics, prevention, visibility, and remediation, offering advanced protection against advanced targeted attacks.|
|wolfSSL, founded in 2004, is an open source Internet security company whose primary products include the CyaSSL lightweight SSL library and the yaSSL Embedded Web Server. Primary users are programmers building security functionality into their applications and devices. wolfSSL employs the dual licensing model, like MySQL, offering products under the GPLv2 as well as a standard commercial license.|
|wolfSSL's products are designed to offer optimal performance, rapid integration, the ability to leverage hardware crypto, and support for the most current standards. All products are designed with clean APIs, and are backed by a dedicated and responsive support and development team.|
|With global operations, Wontok, Inc. (booth # 2502) delivers proven data security solutions that fill the gaps left by conventional security offerings. Wontok's added layer of security provides businesses, government organizations and consumers the confidence that their online commerce and communications are secure and their data is safe. During The RSA Conference February 24-28th, Wontok announces two new malware prevention products targeted for Retailers and Banks adding on its flagship product, Wontok™ SafeCentral, a proven endpoint cybersecurity solution that renders malware inoperable even on already infected PCs running Windows. Please contact us to arrange an interview with Wontok's CEO, Adam Tegg.|
|Zscaler is transforming enterprise networking and security with the world’s largest Direct-to-Cloud Network, which securely enables the productivity benefits of cloud, mobile and social technologies without the cost and complexity of traditional on-premise appliances and software.|
|The Zscaler Direct-to-Cloud Network processes daily more than 12 billion transactions from more than 12 million users in 180 countries across 100 global data centers with near-zero latency. Learn why more than 4,500 global enterprises choose Zscaler to enable end-user productivity, enforce security policy and streamline WAN performance.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
Announcing @AlertLogic “Bronze Sponsor” of @CloudExpo & @DevOpsSummit | #IoT #DevOps #Docker #Microservices
SYS-CON Events announced today that Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, has been named “Bronze Sponsor” of SYS-CON's 17th International Cloud Expo® and DevOps Summit 2015 Silicon Valley, which will take place November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Alert Logic provides Security-as-a-Service for on-premises, cloud, and hybrid IT infrastructures, delivering deep security insight and continuous protection for cust...
Jul. 5, 2015 10:00 PM EDT Reads: 2,189
The 4th International Internet of @ThingsExpo, co-located with the 17th International Cloud Expo - to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA - announces that its Call for Papers is open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than
Jul. 5, 2015 08:00 PM EDT Reads: 1,384
Agile, which started in the development organization, has gradually expanded into other areas downstream - namely IT and Operations. Teams – then teams of teams – have streamlined processes, improved feedback loops and driven a much faster pace into IT departments which have had profound effects on the entire organization. In his session at DevOps Summit, Anders Wallgren, Chief Technology Officer of Electric Cloud, will discuss how DevOps and Continuous Delivery have emerged to help connect dev...
Jul. 5, 2015 07:15 PM EDT Reads: 1,790
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding bu...
Jul. 5, 2015 06:30 PM EDT Reads: 1,410
SYS-CON Events announced today that Harbinger Systems will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Harbinger Systems is a global company providing software technology services. Since 1990, Harbinger has developed a strong customer base worldwide. Its customers include software product companies ranging from hi-tech start-ups in Silicon Valley to leading product companies in the US a...
Jul. 5, 2015 06:00 PM EDT Reads: 2,193
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Jul. 5, 2015 06:00 PM EDT Reads: 1,556
The 5th International DevOps Summit, co-located with 17th International Cloud Expo – being held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA – announces that its Call for Papers is open. Born out of proven success in agile development, cloud computing, and process automation, DevOps is a macro trend you cannot afford to miss. From showcase success stories from early adopters and web-scale businesses, DevOps is expanding to organizations of all sizes, including the ...
Jul. 5, 2015 05:15 PM EDT Reads: 1,445
SYS-CON Events announced today that Secure Infrastructure & Services will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Secure Infrastructure & Services (SIAS) is a managed services provider of cloud computing solutions for the IBM Power Systems market. The company helps mid-market firms built on IBM hardware platforms to deploy new levels of reliable and cost-effective computing and hig...
Jul. 5, 2015 05:00 PM EDT Reads: 1,641
DevOps Summit, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long development...
Jul. 5, 2015 05:00 PM EDT Reads: 1,562
Announcing @ProfitBricksUSA to Exhibit at @CloudExpo Silicon Valley | #IoT #API #DevOps #Microservices
SYS-CON Events announced today that ProfitBricks, the provider of painless cloud infrastructure, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. ProfitBricks is the IaaS provider that offers a painless cloud experience for all IT users, with no learning curve. ProfitBricks boasts flexible cloud servers and networking, an integrated Data Center Designer tool for visual control over the...
Jul. 5, 2015 04:30 PM EDT Reads: 2,019
The cloud has transformed how we think about software quality. Instead of preventing failures, we must focus on automatic recovery from failure. In other words, resilience trumps traditional quality measures. Continuous delivery models further squeeze traditional notions of quality. Remember the venerable project management Iron Triangle? Among time, scope, and cost, you can only fix two or quality will suffer. Only in today's DevOps world, continuous testing, integration, and deployment upend...
Jul. 5, 2015 04:15 PM EDT Reads: 2,517
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and easy to use. MangoApps has been named a "Market Leader" by Ovum Research and a "Cool Vendor" by Gartner. 20,000+ business custome...
Jul. 5, 2015 04:00 PM EDT Reads: 1,994
SYS-CON Events announced today that JFrog, maker of Artifactory, the popular Binary Repository Manager, will exhibit at SYS-CON's @DevOpsSummit Silicon Valley, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Based in California, Israel and France, founded by longtime field-experts, JFrog, creator of Artifactory and Bintray, has provided the market with the first Binary Repository solution and a software distribution social platform.
Jul. 5, 2015 03:30 PM EDT Reads: 1,672
DevOps tends to focus on the relationship between Dev and Ops, putting an emphasis on the ops and application infrastructure. But that’s changing with microservices architectures. In her session at DevOps Summit, Lori MacVittie, Evangelist for F5 Networks, will focus on how microservices are changing the underlying architectures needed to scale, secure and deliver applications based on highly distributed (micro) services and why that means an expansion into “the network” for DevOps.
Jul. 5, 2015 03:00 PM EDT Reads: 2,870
17th Cloud Expo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, will feature technical sessions from a rock star conference faculty and the leading industry players in the world. Cloud computing is now being embraced by a majority of enterprises of all sizes. Yesterday's debate about public vs. private has transformed into the reality of hybrid cloud: a recent survey shows that 74% of enterprises have a hybrid cloud strategy. Meanwhile, 94% of enterprises ar...
Jul. 5, 2015 03:00 PM EDT Reads: 1,370
Internet of Things is moving from being a hype to a reality. Experts estimate that internet connected cars will grow to 152 million, while over 100 million internet connected wireless light bulbs and lamps will be operational by 2020. These and many other intriguing statistics highlight the importance of Internet powered devices and how market penetration is going to multiply many times over in the next few years.
Jul. 5, 2015 03:00 PM EDT Reads: 2,415
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet condit...
Jul. 5, 2015 02:30 PM EDT Reads: 1,995
[video] Logging and Monitoring with @Sematext Founder @OtisG | @DevOpsSummit #DevOps #Logging #Monitoring
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Jul. 5, 2015 02:30 PM EDT Reads: 1,533
The basic integration architecture, as defined by ESBs, hasn’t changed for more than a decade. Most cloud integration providers still rely on an ESB architecture and their proprietary connectors. As a result, enterprise integration projects suffer from constraints of availability and reliability of these connectors that are not re-usable across other integration vendors. However, the rapid adoption of APIs and almost ubiquitous availability of APIs amongst most SaaS and Cloud applications are ra...
Jul. 5, 2015 02:30 PM EDT Reads: 1,293
In his session at 16th Cloud Expo, Simone Brunozzi, VP and Chief Technologist of Cloud Services at VMware, reviewed the changes that the cloud computing industry has gone through over the last five years and shared insights into what the next five will bring. He also chronicled the challenges enterprise companies are facing as they move to the public cloud. He delved into the "Hybrid Cloud" space and explained why every CIO should consider ‘hybrid cloud' as part of their future strategy to achie...
Jul. 5, 2015 02:30 PM EDT Reads: 1,623