|By Business Wire||
|February 20, 2014 02:01 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles A through L.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|Accellion, Inc. is an award-winning private company that provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world's leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs.|
|AFORE Solutions is a leading provider of advanced data security and encryption management solutions that protect sensitive customer information in multi-tenant private, public and hybrid clouds and virtualized infrastructures. AFORE’s award-winning CloudLink® platform is the industry’s most complete encryption management platform for protecting workloads deployed in the cloud. The innovative platform provides customers the security foundation to protect mission-critical data with a rich suite of encryption modules to meet the diverse deployment and security customer needs. AFORE is a RSA Technology Partner and EMC® Select Business Partner.|
|Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, provides solutions to secure the application and infrastructure stack. By integrating advanced security tools with 24×7 Security Operations Center expertise, customers can defend against security threats and address compliance mandates. With an “as-a-Service” delivery model, Alert Logic solutions include day-to-day security infrastructure management, security experts translating complex data into actionable insight, and flexible deployment options. Built from the ground up to address public and private cloud challenges, Alert Logic partners with over half of the largest cloud and hosting service providers for over 2,400 enterprises.|
|AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1000 of the world's leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.|
|AlgoSec's application-centric approach orchestrates the management of complex policies across firewalls and related network devices, aligning IT teams for improved business agility.|
|AlgoSec is committed to the success of every single customer, and offers the industry's only money-back guarantee. For more information, visit www.AlgoSec.com.|
|Company:||AMAX Information Technologies|
|AMAX is a global leader in x86 OEM appliance design and manufacturing. For companies that have a winning software product and want to increase their ROI by selling a complete integrated platform, AMAX offers a full menu of services, including:|
|•Product Lifecycle & Supply Chain Management|
|•Compliance & Regulatory Consulting|
|•Try & Buy Program Support and Refurbishing Services|
|In addition, AMAX offers:|
|•NPI Services, including Design and Prototyping|
|AMAX designs, manufactures and supports your appliance needs from NPI to global support allowing companies to focus on their core business while going to market with a complete product.|
|Appthority's App Risk Management Service automates the discovery, analysis, and approval of apps present on employee devices. By combining the largest global database of millions of previously analyzed public and enterprise apps with a policy management engine, Appthority automates app review and approval of new apps and enables custom, acceptable use policies for thousands of employees within minutes. Appthority enables companies to leverage mobility and empower a smarter, safer, mobile workforce. Appthority has scanned over 2 million Android and iOS mobile apps for global organizations and currently has over 188 organizations worldwide evaluating and using the Appthority Service.|
|Booth:||3237 North Hall|
|Ticker Symbol & Exchange:||NYSE: CUDA|
|Barracuda provides cloud-connected security and storage solutions that simplify IT. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda’s customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security. For additional information, please visit http://www.barracuda.com.|
|BehavioSec offers Behavioural biometric solutions in order to create a-multi layered approach for authentication & verification purposes. The solution is designed to tackle the demands for greater security without impacting user experience.|
|The technology analyzes behavior such as keystroke and/or mobile interface dynamics. The user’s behavior is mapped against their digital ‘fingerprint’ to verify the identity and prevent fraudsters from accessing throughout the session.|
|BehavioSec’s technology has been deployed to millions of mobile and internet banking customers in Europe.|
|BlueCat IP Address Management (IPAM) solutions provide a smarter way to connect mobile devices, applications, virtual environments and clouds. With unified mobile security, address management, automation and self-service, BlueCat offers a rich source of network intelligence that can be put into action to protect your network, reduce IT costs and ensure reliable service delivery. Enterprises and government agencies worldwide trust BlueCat to manage millions of network-connected devices and solve real business and IT challenges – from secure, risk-free BYOD to virtualization, cloud automation and IPv6.|
|Founded in 2000, Brainloop, The Secure Enterprise Information Company, is the market-leading provider of highly intuitive SaaS solutions that enable customers to securely manage and collaborate on confidential documents and information, whether inside or outside of their IT environments.|
|Brainloop's customers comprise numerous Fortune, FTSE and DAX companies across a wide range of sectors, both private and public. They rely on the software's regulatory and corporate compliance, collaboration and process capabilities of Brainloop, as well its complete portfolio of security features including full encryption, audit trail, two-factor authentication and provider shielding, all with a convenient and easy to use interface.|
|Ticker Symbol & Exchange:||NASDAQ: CA|
|CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data, identities and access, from the data center to the cloud. Specializing in identity and access management, data and API protection, CA Technologies solutions help protect the open enterprise and find the balance between protecting the business and enabling the business for transformative growth.|
|Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled in all major coding languages and identify its security vulnerabilities.|
|With Checkmarx's CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.|
|Checkmarx's customers include hundreds of Fortune 500, government and SMB organizations in over 30 countries. Checkmarx has been Ranked 69th Fastest Growing Tech Company in EMEA and 8th in Israel by Deloitte.|
|From government installations to corporate PKI applications, enhance your access control and identity management systems with CHERRY. Choose from our selection of FIPS 201 compliant, low cost keyboards and stand-alone devices. From biometrics to high-performance PCSC/EMV smart card readers, CHERRY has the products to meet your needs.|
|CHERRY is a brand of ZF Electronic Systems Pleasant Prairie, LLC, a leader in the design and manufacture of computer keyboards, standard and custom electrical switches, sensors and controls for the worldwide automotive, computer and consumer/commercial OEM markets.|
|Cigital is the world's largest consulting firm specializing in software security and is the global leader in helping organizations design, build, and maintain secure software. We provide a comprehensive range of software security services including consulting, training in both instructor-led and eLearning, mobile application security, and managed services aimed at addressing the potential software and application security risks.|
|Whether it's a simple penetration test or deploying an end-to-end software security program, our experts have both the depth of knowledge and breadth of real-world experience to understand the risks and challenges our clients face each day.|
|Booth:||South Expo, 2115|
|CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, data loss prevention, malware detection, data discovery and activity monitoring. CipherCloud’s ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.|
|Clearswift is trusted by organizations globally to protect their critical information, giving them the freedom to securely collaborate and drive business growth. Built on an innovative Deep Content Inspection engine, our unique Adaptive Redaction technology enables deploying a data loss prevention solution simply and easily, forming the foundation of an Information Governance vision, for organizations to have 100% visibility of their critical information 100% of the time.|
|Clearswift operates world-wide, having regional headquarters in Europe, Asia Pacific and the United States. Clearswift has a partner network of more than 900 resellers across the globe.|
|More information is available at www.clearswift.com.|
|Company:||Cloud Security Alliance|
|Booth:||2433 (South Hall)|
|The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.|
|Company:||Corero Network Security|
|Ticker Symbol & Exchange:||London Stock Exchange: CNS|
|Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide Online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended.|
|Booth:||South Expo 1129|
|As the experts in advanced threat protection and containment, Damballa discovers active threats that bypass all security prevention layers. Damballa identifies evidence of malicious network traffic in real time, rapidly pinpointing the compromised devices that represent the highest risk to a business. Damballa protects any device or OS including PCs, Macs, Unix, iOS, Android, and embedded systems. Damballa protects more than 400 million endpoints globally at enterprises in every major market and for the world's largest ISP and telecommunications providers. For more information, visit www.damballa.com, or follow us on Twitter @DamballaInc.|
|Booth:||901 South Hall|
|DB Networks is an innovating behavioral analysis technology provider in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks. Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures. DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack.|
|Company:||Deja vu Security|
|Deja vu Security is a trusted provider of information security testing products and consulting services to the world’s leading technology companies. It is a recognized industry leader in embedded device security, security fuzz testing, application security, and penetration testing. Its widely adopted security fuzzing product, Peach Fuzzer™, discovers complex, unknown vulnerabilities in software. Security researchers and product testers leverage Peach Fuzzer to find zero – day vulnerabilities in an automated manner. Deja vu Security is based in Seattle and was founded by a group of information security veterans.|
|DeviceLock, Inc., a leader in endpoint data security for 18 years, provides world class enterprise Data Leak Prevention (DLP) software used by financial firms, health care providers, retail entities, Universities, manufacturing firms, government agencies, diplomatic posts, military units, and more. DeviceLock®, ContentLockTM, NetworkLockTM, and the DeviceLock Search ServerTM comprise the DeviceLock Endpoint DLP Suite, an Active Directory Group Policy-managed solution for applying granular, contextual, and content-aware controls to peripheral ports, devices, and network protocols of managed endpoints to any scale. DeviceLock supports Microsoft Windows, Apple OS, and any virtualized Windows hosts or sessions used by “BYOD” devices of any make.|
|Company:||Digital Defense, Inc.|
|Founded in 1999, Digital Defense, Inc. (DDI) is a premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and decisive security intelligence. This proven method bolsters the capability to reduce risk and keep assets and reputations secure. The combination of DDI’s certified security analysts, patent-pending technology and proprietary cloud-based vulnerability management system, Frontline™ Solutions Platform, delivers one of the most powerful assessment results and remediation management solutions available.|
|Booth:||1838 - South Hall|
|Easy Solutions delivers Total Fraud Protection® to over 200 clients, with over 50 million end users. The company’s products protect against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and deliver multifactor authentication and transaction anomaly detection. The company witnessed 80% subscription revenue growth in 2013, marking the best year-over-year growth rate since the company was founded. Easy Solutions is projecting another year of rapid growth with internal forecasts calling for 150% growth in 2014 as the company further expands in the North America and EMEA markets.|
|For more information, visit http://www.easysol.net, or follow us on Twitter @goeasysol.|
|Ticker Symbol & Exchange:||NYSE: EMC|
|Syncplicity is an easy-to-use, enterprise-grade file sync and share solution that is redefining files for the mobile workforce. We give users access to all their files—no matter they reside— on all their devices, online or offline, with no hassles. With a rich and secure mobile, web and desktop experience, our customers can collaborate inside and outside their organization easily, while giving IT professionals the security, manageability, and control they need.|
|Rated a market leader by Forrester Research and other leading analyst firms, Syncplicity is uniquely positioned to lead the next wave of innovation in mobile collaboration for the enterprise.|
|Booth:||2235 South Hall|
|Emerging Threats is a world-leading provider of commercial and open source threat intelligence.|
|Founded in 2003 as a cybersecurity research community, Emerging Threats has become the de facto standard in network-based malware threat detection.|
|The company’s ETOpen Ruleset, ETPro™ Ruleset, and IQRisk™ suite of threat intelligence are platform agnostic for easy integration with Suricata, SNORT®, and other network intrusion protection and detection systems.|
|With ETPro Ruleset, organizations can achieve the highest standards of malicious threat detection with world-class support and research for extended vulnerability coverage. ETPro Ruleset is ideal for enterprises, government agencies, financial institutions, SMBs, higher education, and service providers.|
|For more information, please visit http://www.emergingthreats.net.|
|Company:||Endace division of Emulex|
|Ticker Symbol & Exchange:||NYSE: ELX|
|Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions enabling unrivaled end-to-end application visibility, optimization and acceleration for global networks that support enterprise, cloud, government and telecommunications. The Endace division of Emulex provides network visibility products that deliver complete network performance management at speeds up to 100Gb Ethernet.|
|Company:||ESET North America|
|Booth:||South Expo 1926|
|ESET®, the pioneer of proactive protection and the maker of the award-winning ESET NOD32® technology, is a global provider of security solutions for businesses and consumers. For over 26 years, the Company continues to lead the industry in proactive threat detection. At RSA, ESET will be showcasing the newest version of its two-factor authentication (2FA) application, ESET Secure Authentication. The new release continues to provide the potent combination of ultra-secure access to online applications, while introducing even greater ease of installation and support, for a superior overall user experience.|
|FileTrek (www.filetrek.com), the leader in advance behavioral analytics for threat detection, will debut its new enterprise threat detection platform at the RSA Conference 2014. The FileTrek Platform leverages a patent-pending behavioral analytics engine and detection algorithms to proactively surface attacks against valuable data assets, alert managers to their existence and deliver immediate risk forensics, providing fast and accurate threat detection and on-demand investigations for companies of all sizes. The FileTrek solution is available as a cloud or on-premise solution.|
|Booth:||North Expo 2813|
|Ticker Symbol & Exchange:||NASDAQ FEYE|
|FireEye is disrupting the security industry with a purpose-built, virtual machine-based security platform that provides real-time threat protection against the next generation of cyber attacks. The core of the platform is the FireEye Multi-Vector Virtual Execution (MVX) engine, complemented by FireEye Dynamic Threat Intelligence, which identify and block cyber attacks in real time without the use of threat signatures. In 2013 FireEye acquired Mandiant and is now the only company that delivers one solution to detect, contain, resolve, and prevent threats. FireEye has become the go-to company for some of the largest enterprises and government agencies across the globe with over 1,500 customers across over 40 countries, including over 100 of the Fortune 500.|
|FireMon is the industry leader in providing enterprises, government and managed services providers with proactive security intelligence solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.|
|HBGary provides Incident Response and Threat Intel Management products and services, enabling organizations to rapidly manage the growing volume, variety and complexity of their cyber security events. With HBGary products, customers can proactively detect zero-days, rootkits and other advanced persistent threats, aggregate and correlate threat data from intel feeds, and manage the lifecycle of incidents by automating their response processes. Customers include Fortune 50 corporations and U.S. government agencies. HBGary is located in Sacramento, Calif. and is part of ManTech International Corporation.|
|Ken Silva, President of ManTech Cyber Solutions International, Inc. will be in attendance at RSA.|
|HID Global is the trusted leader in products, services, solutions, and know-how related to the creation, use, and management of secure identities for millions of customers around the world. Recognized for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators, and developers serving a variety of markets. These markets include physical access control; logical access control including strong authentication and credential management; card personalization; visitor management; government ID; and identification technologies for animal ID and industry and logistics applications. Headquartered in Austin, TX, HID Global has over 2,000 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand.|
|Company:||Hillstone Networks, Inc.|
|Hillstone Networks builds intelligent next generation firewalls to protect against Advanced Persistent Threats (ADP) and zero-day attacks. Built from ground up for today’s virtual and cloud-based data centers, Hillstone Network’s fully distributed, intelligent next-generation firewall platform overcomes performance and deployment limitations of legacy firewalls, providing granular visibility and control of network traffic, based on real-time behavioral anomaly detection and advanced data analytics. Established in 2006 by NetScreen, Cisco and Juniper executives, over 5,000 customers worldwide use our proven high-performance, network security solutions, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks is headquartered in Sunnyvale, California.|
|HyTrust is the Cloud Security Automation company. Its virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of catastrophic failure — especially in light of the concentration of risk that occurs within virtualization and cloud environments. Organizations can now confidently take full advantage of the cloud, and even broaden deployment to mission-critical applications. The Company is backed by top tier investors VMware, Cisco, Intel, In-Q-Tel, Fortinet, Granite Ventures, Trident Capital and Epic Ventures; its partners include VMware, VCE, Symantec, CA, McAfee, Splunk; HP Arcsight, Accuvant, RSA and Intel.|
|Company:||iboss Network Security|
|iboss Network Security engineers highly scalable Web security solutions providing layer 7 defense across HTTP, SSL, threat and applications securing mobile devices on or off network. iboss enables organizations to safely adapt social media, SaaS, and mobile devices while expanding access to technology. By incorporating unmatched network traffic visibility, organizations are able to identify high-risk user behavior and the Shadow IT to create more actionable policies.|
|Company:||Identity Finder, LLC|
|Booth:||3635, North Hall|
|Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. Identity Finder's award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. The software discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.|
|Booth:||(at Dell Booth 1301)|
|Invincea is the premier innovator in advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea is the market-leading solution that provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.|
|Company:||IronKey by Imation|
|Ticker Symbol & Exchange:||NYSE: IMN|
|Imation's IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile workspaces. The IronKey portfolio meets a variety of needs from simple encryption and compliance to the need for the World’s Most Secure Flash Drive™. The IronKey line includes the world’s leading hardware encrypted USB drives; PC on a Stick™ workspaces for Windows To Go, transforming any computer into a trusted IT-managed workstation; and cloud-based or on-premise centralized secure device management solutions.|
|With more than 20 years of experience in IT security, Keypasco’s founders are the minds behind some of the revolutionary two factor authentication technology solutions used by banks today.|
|Keypasco offers a hardware-free, patent-approved and software-based authentication solution. The service combines factors like device fingerprints, geographical locations, 2-channel structure, proximity of mobile devices, and a risk behaviour analysis to offer strong multi-factor authentication.|
|Keypasco deliver on society’s expanding needs for personal authentication services, and identity protection within Internet banking, online gaming, eCommerce, mobile Commerce, eGovernment, etc. Keypasco’s vision is to be a leading supplier of services for securing cloud services.|
|Booth:||3634 North Hall|
|Lancope is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team.|
|Company:||Lanner Electronics Inc.|
|Booth:||109 (South Expo)|
|Lanner Electronics Inc. is a world leading provider of engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers.|
|Lanner designs and manufactures a wide range of hardware platforms for gateway security, firewall, UTM, WAN acceleration and appliance-based software delivery solutions. What's more, Lanner offers a full range of industrial communications computing platforms for industrial automation, digital signage, power communications and telecom datacenters.|
|Light Cyber is a leading provider of predictive breach detection solutions that protect organizations from targeted threats and cyber-attacks. Light Cyber Magna™ is the first product to analyze both network traffic and endpoint information to understand the behavior of users, devices and applications and to detect compromised computers and stolen credentials early in the attack lifecycle, allowing the user to remediate breaches and stop attacks before damage is done.|
|Led by world-class cyber security experts and seasoned management team, the company's products have been successfully deployed by top tier customers in the financial, telecom, government, media and technology sectors.|
|LockPath’s Keylight platform provides a flexible infrastructure to effectively support governance, risk management and compliance programs. Correlate incident, threat and vulnerability data from multiple sources and tie to key assets. Industry-specific solutions scale to any size organization and provide keen insight for understanding risks, assuring compliance and preparing for audits.|
|LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and award-winning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jun. 29, 2016 05:30 PM EDT Reads: 1,003
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Jun. 29, 2016 04:23 PM EDT Reads: 228
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Jun. 29, 2016 04:15 PM EDT Reads: 346
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 29, 2016 04:15 PM EDT Reads: 333
The idea of comparing data in motion (at the sensor level) to data at rest (in a Big Data server warehouse) with predictive analytics in the cloud is very appealing to the industrial IoT sector. The problem Big Data vendors have, however, is access to that data in motion at the sensor location. In his session at @ThingsExpo, Scott Allen, CMO of FreeWave, discussed how as IoT is increasingly adopted by industrial markets, there is going to be an increased demand for sensor data from the outermos...
Jun. 29, 2016 04:00 PM EDT Reads: 289
UAS, drones or unmanned aircraft, no matter what you call them — this was their week. Our news stream was flooded with updates on the newly announced rules and regulations for commercial UAS from the FAA. So, naturally we have dedicated this week’s top news round up to highlight some of our favorite UAS stories.
Jun. 29, 2016 03:02 PM EDT Reads: 195
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Jun. 29, 2016 03:00 PM EDT Reads: 298
CenturyLink has announced that application server solutions from GENBAND are now available as part of CenturyLink’s Networx contracts. The General Services Administration (GSA)’s Networx program includes the largest telecommunications contract vehicles ever awarded by the federal government. CenturyLink recently secured an extension through spring 2020 of its offerings available to federal government agencies via GSA’s Networx Universal and Enterprise contracts. GENBAND’s EXPERiUS™ Application...
Jun. 29, 2016 02:00 PM EDT Reads: 340
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Jun. 29, 2016 02:00 PM EDT Reads: 628
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Jun. 29, 2016 01:15 PM EDT Reads: 300
When people aren’t talking about VMs and containers, they’re talking about serverless architecture. Serverless is about no maintenance. It means you are not worried about low-level infrastructural and operational details. An event-driven serverless platform is a great use case for IoT. In his session at @ThingsExpo, Animesh Singh, an STSM and Lead for IBM Cloud Platform and Infrastructure, will detail how to build a distributed serverless, polyglot, microservices framework using open source tec...
Jun. 29, 2016 12:30 PM EDT Reads: 537
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
Jun. 29, 2016 11:00 AM EDT Reads: 492
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Jun. 29, 2016 11:00 AM EDT Reads: 441
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Jun. 29, 2016 11:00 AM EDT Reads: 573
IoT offers a value of almost $4 trillion to the manufacturing industry through platforms that can improve margins, optimize operations & drive high performance work teams. By using IoT technologies as a foundation, manufacturing customers are integrating worker safety with manufacturing systems, driving deep collaboration and utilizing analytics to exponentially increased per-unit margins. However, as Benoit Lheureux, the VP for Research at Gartner points out, “IoT project implementers often ...
Jun. 29, 2016 10:45 AM EDT Reads: 552
"delaPlex is a software development company. We do team-based outsourcing development," explained Mark Rivers, COO and Co-founder of delaPlex Software, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jun. 29, 2016 10:30 AM EDT Reads: 489
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
Jun. 29, 2016 10:00 AM EDT Reads: 1,284
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Jun. 29, 2016 09:45 AM EDT Reads: 1,249
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jun. 29, 2016 09:45 AM EDT Reads: 928
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life sett...
Jun. 29, 2016 09:15 AM EDT Reads: 1,449