|By Business Wire||
|February 20, 2014 02:01 PM EST||
RSA Conference USA 2014, the world’s largest information security event, takes place February 24 - 28, 2014 at the Moscone Center in San Francisco. Listed below are RSA Conference USA 2014 exhibitor profiles A through L.
Links to important information:
RSA Conference USA Sponsor and Exhibitor News: http://www.tradeshownews.com/events/RSA-Conference-USA-2014/
Media Information: http://www.rsaconference.com/events/us14/press
Follow the RSA Conference USA on twitter (official hashtag is #RSAC): https://twitter.com/RSAConference
|Accellion, Inc. is an award-winning private company that provides mobile solutions to enterprise organizations to enable increased business productivity while ensuring data security and compliance. As the leading provider of private cloud solutions for secure file sharing, Accellion offers enterprise organizations the scalability, flexibility, control and security to enable a mobile workforce with the tools they need to create, access and share information securely, wherever work takes them. More than 12 million users and 2,000 of the world's leading corporations and government agencies use Accellion solutions to increase business productivity, protect intellectual property, ensure compliance and reduce IT costs.|
|AFORE Solutions is a leading provider of advanced data security and encryption management solutions that protect sensitive customer information in multi-tenant private, public and hybrid clouds and virtualized infrastructures. AFORE’s award-winning CloudLink® platform is the industry’s most complete encryption management platform for protecting workloads deployed in the cloud. The innovative platform provides customers the security foundation to protect mission-critical data with a rich suite of encryption modules to meet the diverse deployment and security customer needs. AFORE is a RSA Technology Partner and EMC® Select Business Partner.|
|Alert Logic, the leading provider of Security-as-a-Service solutions for the cloud, provides solutions to secure the application and infrastructure stack. By integrating advanced security tools with 24×7 Security Operations Center expertise, customers can defend against security threats and address compliance mandates. With an “as-a-Service” delivery model, Alert Logic solutions include day-to-day security infrastructure management, security experts translating complex data into actionable insight, and flexible deployment options. Built from the ground up to address public and private cloud challenges, Alert Logic partners with over half of the largest cloud and hosting service providers for over 2,400 enterprises.|
|AlgoSec is the market leader for security policy management, enabling organizations to simplify and automate security operations in evolving data centers and networks. More than 1000 of the world's leading organizations, including 15 of the Fortune 50, rely on AlgoSec for faster security provisioning of business applications, streamlined change management, continuous compliance and tighter security.|
|AlgoSec's application-centric approach orchestrates the management of complex policies across firewalls and related network devices, aligning IT teams for improved business agility.|
|AlgoSec is committed to the success of every single customer, and offers the industry's only money-back guarantee. For more information, visit www.AlgoSec.com.|
|Company:||AMAX Information Technologies|
|AMAX is a global leader in x86 OEM appliance design and manufacturing. For companies that have a winning software product and want to increase their ROI by selling a complete integrated platform, AMAX offers a full menu of services, including:|
|•Product Lifecycle & Supply Chain Management|
|•Compliance & Regulatory Consulting|
|•Try & Buy Program Support and Refurbishing Services|
|In addition, AMAX offers:|
|•NPI Services, including Design and Prototyping|
|AMAX designs, manufactures and supports your appliance needs from NPI to global support allowing companies to focus on their core business while going to market with a complete product.|
|Appthority's App Risk Management Service automates the discovery, analysis, and approval of apps present on employee devices. By combining the largest global database of millions of previously analyzed public and enterprise apps with a policy management engine, Appthority automates app review and approval of new apps and enables custom, acceptable use policies for thousands of employees within minutes. Appthority enables companies to leverage mobility and empower a smarter, safer, mobile workforce. Appthority has scanned over 2 million Android and iOS mobile apps for global organizations and currently has over 188 organizations worldwide evaluating and using the Appthority Service.|
|Booth:||3237 North Hall|
|Ticker Symbol & Exchange:||NYSE: CUDA|
|Barracuda provides cloud-connected security and storage solutions that simplify IT. These powerful, easy-to-use and affordable solutions are trusted by more than 150,000 organizations worldwide and are delivered in appliance, virtual appliance, cloud and hybrid deployments. Barracuda’s customer-centric business model focuses on delivering high-value, subscription-based IT solutions that provide end-to-end network and data security. For additional information, please visit http://www.barracuda.com.|
|BehavioSec offers Behavioural biometric solutions in order to create a-multi layered approach for authentication & verification purposes. The solution is designed to tackle the demands for greater security without impacting user experience.|
|The technology analyzes behavior such as keystroke and/or mobile interface dynamics. The user’s behavior is mapped against their digital ‘fingerprint’ to verify the identity and prevent fraudsters from accessing throughout the session.|
|BehavioSec’s technology has been deployed to millions of mobile and internet banking customers in Europe.|
|BlueCat IP Address Management (IPAM) solutions provide a smarter way to connect mobile devices, applications, virtual environments and clouds. With unified mobile security, address management, automation and self-service, BlueCat offers a rich source of network intelligence that can be put into action to protect your network, reduce IT costs and ensure reliable service delivery. Enterprises and government agencies worldwide trust BlueCat to manage millions of network-connected devices and solve real business and IT challenges – from secure, risk-free BYOD to virtualization, cloud automation and IPv6.|
|Founded in 2000, Brainloop, The Secure Enterprise Information Company, is the market-leading provider of highly intuitive SaaS solutions that enable customers to securely manage and collaborate on confidential documents and information, whether inside or outside of their IT environments.|
|Brainloop's customers comprise numerous Fortune, FTSE and DAX companies across a wide range of sectors, both private and public. They rely on the software's regulatory and corporate compliance, collaboration and process capabilities of Brainloop, as well its complete portfolio of security features including full encryption, audit trail, two-factor authentication and provider shielding, all with a convenient and easy to use interface.|
|Ticker Symbol & Exchange:||NASDAQ: CA|
|CA Technologies provides IT management solutions that help customers manage and secure complex IT environments to support agile business services. Organizations leverage CA Technologies software and SaaS solutions to accelerate innovation, transform infrastructure and secure data, identities and access, from the data center to the cloud. Specializing in identity and access management, data and API protection, CA Technologies solutions help protect the open enterprise and find the balance between protecting the business and enabling the business for transformative growth.|
|Checkmarx provides the best way for organizations to introduce security into their Software Development Lifecycle (SDLC). The product enables developers and auditors to easily scan un-compiled in all major coding languages and identify its security vulnerabilities.|
|With Checkmarx's CxSuite, auditors and developers have immediate access to the code analysis results and remediation advice. We provide user friendly, high productivity, flexible and accurate risk intelligence platform that ensures your application remains hacker-proof.|
|Checkmarx's customers include hundreds of Fortune 500, government and SMB organizations in over 30 countries. Checkmarx has been Ranked 69th Fastest Growing Tech Company in EMEA and 8th in Israel by Deloitte.|
|From government installations to corporate PKI applications, enhance your access control and identity management systems with CHERRY. Choose from our selection of FIPS 201 compliant, low cost keyboards and stand-alone devices. From biometrics to high-performance PCSC/EMV smart card readers, CHERRY has the products to meet your needs.|
|CHERRY is a brand of ZF Electronic Systems Pleasant Prairie, LLC, a leader in the design and manufacture of computer keyboards, standard and custom electrical switches, sensors and controls for the worldwide automotive, computer and consumer/commercial OEM markets.|
|Cigital is the world's largest consulting firm specializing in software security and is the global leader in helping organizations design, build, and maintain secure software. We provide a comprehensive range of software security services including consulting, training in both instructor-led and eLearning, mobile application security, and managed services aimed at addressing the potential software and application security risks.|
|Whether it's a simple penetration test or deploying an end-to-end software security program, our experts have both the depth of knowledge and breadth of real-world experience to understand the risks and challenges our clients face each day.|
|Booth:||South Expo, 2115|
|CipherCloud, the leader in cloud information protection, enables organizations to securely adopt cloud applications by overcoming data privacy, residency, security, and regulatory compliance risks. CipherCloud delivers an open platform with comprehensive security controls, including AES 256-bit encryption, tokenization, data loss prevention, malware detection, data discovery and activity monitoring. CipherCloud’s ground breaking technology protects sensitive information in real time, before it is sent to the cloud, while preserving application usability and functionality.|
|Clearswift is trusted by organizations globally to protect their critical information, giving them the freedom to securely collaborate and drive business growth. Built on an innovative Deep Content Inspection engine, our unique Adaptive Redaction technology enables deploying a data loss prevention solution simply and easily, forming the foundation of an Information Governance vision, for organizations to have 100% visibility of their critical information 100% of the time.|
|Clearswift operates world-wide, having regional headquarters in Europe, Asia Pacific and the United States. Clearswift has a partner network of more than 900 resellers across the globe.|
|More information is available at www.clearswift.com.|
|Company:||Cloud Security Alliance|
|Booth:||2433 (South Hall)|
|The Cloud Security Alliance is a not-for-profit organization with a mission to promote the use of best practices for providing security assurance within Cloud Computing, and to provide education on the uses of Cloud Computing to help secure all other forms of computing. The Cloud Security Alliance is led by a broad coalition of industry practitioners, corporations, associations and other key stakeholders. For further information, visit us at www.cloudsecurityalliance.org, and follow us on Twitter @cloudsa.|
|Company:||Corero Network Security|
|Ticker Symbol & Exchange:||London Stock Exchange: CNS|
|Corero Network Security, an organization’s First Line of Defense® against DDoS attacks and cyber threats, is a pioneer in global network security. Corero products and services provide Online Enterprises, Service Providers, Hosting Providers and Managed Security Service Providers with an additional layer of security capable of inspecting Internet traffic and enforcing real-time access and monitoring policies designed to match the needs of the protected business. Corero technology enhances any defense-in-depth security architecture with a scalable, flexible and responsive defense against DDoS attacks and cyber threats before they reach the targeted IT infrastructure allowing online services to perform as intended.|
|Booth:||South Expo 1129|
|As the experts in advanced threat protection and containment, Damballa discovers active threats that bypass all security prevention layers. Damballa identifies evidence of malicious network traffic in real time, rapidly pinpointing the compromised devices that represent the highest risk to a business. Damballa protects any device or OS including PCs, Macs, Unix, iOS, Android, and embedded systems. Damballa protects more than 400 million endpoints globally at enterprises in every major market and for the world's largest ISP and telecommunications providers. For more information, visit www.damballa.com, or follow us on Twitter @DamballaInc.|
|Booth:||901 South Hall|
|DB Networks is an innovating behavioral analysis technology provider in the field of database security. Developed for organizations that need to protect their data from advanced attacks, including Zero-Day attacks, DB Networks offers effective countermeasures against SQL injection and database Denial of Service attacks. Database attacks happen rapidly – in a matter of minutes – and bypass traditional perimeter security measures. DB Networks’ unique approach uses behavioral analysis technology to automatically learn each application’s proper SQL statement behavior. Any SQL statement dispatched from the application that deviates from the established behavioral model immediately raises an alarm as a possible attack.|
|Company:||Deja vu Security|
|Deja vu Security is a trusted provider of information security testing products and consulting services to the world’s leading technology companies. It is a recognized industry leader in embedded device security, security fuzz testing, application security, and penetration testing. Its widely adopted security fuzzing product, Peach Fuzzer™, discovers complex, unknown vulnerabilities in software. Security researchers and product testers leverage Peach Fuzzer to find zero – day vulnerabilities in an automated manner. Deja vu Security is based in Seattle and was founded by a group of information security veterans.|
|DeviceLock, Inc., a leader in endpoint data security for 18 years, provides world class enterprise Data Leak Prevention (DLP) software used by financial firms, health care providers, retail entities, Universities, manufacturing firms, government agencies, diplomatic posts, military units, and more. DeviceLock®, ContentLockTM, NetworkLockTM, and the DeviceLock Search ServerTM comprise the DeviceLock Endpoint DLP Suite, an Active Directory Group Policy-managed solution for applying granular, contextual, and content-aware controls to peripheral ports, devices, and network protocols of managed endpoints to any scale. DeviceLock supports Microsoft Windows, Apple OS, and any virtualized Windows hosts or sessions used by “BYOD” devices of any make.|
|Company:||Digital Defense, Inc.|
|Founded in 1999, Digital Defense, Inc. (DDI) is a premier provider of managed security risk assessment solutions protecting billions in assets for small businesses to Fortune companies in over 65 countries. DDI’s dedicated team of experts helps organizations establish a culture of security through regular information security assessments, awareness education and decisive security intelligence. This proven method bolsters the capability to reduce risk and keep assets and reputations secure. The combination of DDI’s certified security analysts, patent-pending technology and proprietary cloud-based vulnerability management system, Frontline™ Solutions Platform, delivers one of the most powerful assessment results and remediation management solutions available.|
|Booth:||1838 - South Hall|
|Easy Solutions delivers Total Fraud Protection® to over 200 clients, with over 50 million end users. The company’s products protect against phishing, pharming, malware, Man-in-the-Middle and Man-in-the-Browser attacks, and deliver multifactor authentication and transaction anomaly detection. The company witnessed 80% subscription revenue growth in 2013, marking the best year-over-year growth rate since the company was founded. Easy Solutions is projecting another year of rapid growth with internal forecasts calling for 150% growth in 2014 as the company further expands in the North America and EMEA markets.|
|For more information, visit http://www.easysol.net, or follow us on Twitter @goeasysol.|
|Ticker Symbol & Exchange:||NYSE: EMC|
|Syncplicity is an easy-to-use, enterprise-grade file sync and share solution that is redefining files for the mobile workforce. We give users access to all their files—no matter they reside— on all their devices, online or offline, with no hassles. With a rich and secure mobile, web and desktop experience, our customers can collaborate inside and outside their organization easily, while giving IT professionals the security, manageability, and control they need.|
|Rated a market leader by Forrester Research and other leading analyst firms, Syncplicity is uniquely positioned to lead the next wave of innovation in mobile collaboration for the enterprise.|
|Booth:||2235 South Hall|
|Emerging Threats is a world-leading provider of commercial and open source threat intelligence.|
|Founded in 2003 as a cybersecurity research community, Emerging Threats has become the de facto standard in network-based malware threat detection.|
|The company’s ETOpen Ruleset, ETPro™ Ruleset, and IQRisk™ suite of threat intelligence are platform agnostic for easy integration with Suricata, SNORT®, and other network intrusion protection and detection systems.|
|With ETPro Ruleset, organizations can achieve the highest standards of malicious threat detection with world-class support and research for extended vulnerability coverage. ETPro Ruleset is ideal for enterprises, government agencies, financial institutions, SMBs, higher education, and service providers.|
|For more information, please visit http://www.emergingthreats.net.|
|Company:||Endace division of Emulex|
|Ticker Symbol & Exchange:||NYSE: ELX|
|Emulex, a leader in network connectivity, monitoring and management, provides hardware and software solutions enabling unrivaled end-to-end application visibility, optimization and acceleration for global networks that support enterprise, cloud, government and telecommunications. The Endace division of Emulex provides network visibility products that deliver complete network performance management at speeds up to 100Gb Ethernet.|
|Company:||ESET North America|
|Booth:||South Expo 1926|
|ESET®, the pioneer of proactive protection and the maker of the award-winning ESET NOD32® technology, is a global provider of security solutions for businesses and consumers. For over 26 years, the Company continues to lead the industry in proactive threat detection. At RSA, ESET will be showcasing the newest version of its two-factor authentication (2FA) application, ESET Secure Authentication. The new release continues to provide the potent combination of ultra-secure access to online applications, while introducing even greater ease of installation and support, for a superior overall user experience.|
|FileTrek (www.filetrek.com), the leader in advance behavioral analytics for threat detection, will debut its new enterprise threat detection platform at the RSA Conference 2014. The FileTrek Platform leverages a patent-pending behavioral analytics engine and detection algorithms to proactively surface attacks against valuable data assets, alert managers to their existence and deliver immediate risk forensics, providing fast and accurate threat detection and on-demand investigations for companies of all sizes. The FileTrek solution is available as a cloud or on-premise solution.|
|Booth:||North Expo 2813|
|Ticker Symbol & Exchange:||NASDAQ FEYE|
|FireEye is disrupting the security industry with a purpose-built, virtual machine-based security platform that provides real-time threat protection against the next generation of cyber attacks. The core of the platform is the FireEye Multi-Vector Virtual Execution (MVX) engine, complemented by FireEye Dynamic Threat Intelligence, which identify and block cyber attacks in real time without the use of threat signatures. In 2013 FireEye acquired Mandiant and is now the only company that delivers one solution to detect, contain, resolve, and prevent threats. FireEye has become the go-to company for some of the largest enterprises and government agencies across the globe with over 1,500 customers across over 40 countries, including over 100 of the Fortune 500.|
|FireMon is the industry leader in providing enterprises, government and managed services providers with proactive security intelligence solutions that deliver deeper visibility and tighter control over their network security infrastructure. The integrated FireMon solution suite – Security Manager, Policy Planner and Risk Analyzer – enables customers to identify network risk, proactively prevent access to vulnerable assets, clean up firewall policies, automate compliance, strengthen security throughout the organization, and reduce the cost of security operations.|
|HBGary provides Incident Response and Threat Intel Management products and services, enabling organizations to rapidly manage the growing volume, variety and complexity of their cyber security events. With HBGary products, customers can proactively detect zero-days, rootkits and other advanced persistent threats, aggregate and correlate threat data from intel feeds, and manage the lifecycle of incidents by automating their response processes. Customers include Fortune 50 corporations and U.S. government agencies. HBGary is located in Sacramento, Calif. and is part of ManTech International Corporation.|
|Ken Silva, President of ManTech Cyber Solutions International, Inc. will be in attendance at RSA.|
|HID Global is the trusted leader in products, services, solutions, and know-how related to the creation, use, and management of secure identities for millions of customers around the world. Recognized for robust quality, innovative designs and industry leadership, HID Global is the supplier of choice for OEMs, system integrators, and developers serving a variety of markets. These markets include physical access control; logical access control including strong authentication and credential management; card personalization; visitor management; government ID; and identification technologies for animal ID and industry and logistics applications. Headquartered in Austin, TX, HID Global has over 2,000 employees worldwide and operates international offices that support more than 100 countries. HID Global is an ASSA ABLOY Group brand.|
|Company:||Hillstone Networks, Inc.|
|Hillstone Networks builds intelligent next generation firewalls to protect against Advanced Persistent Threats (ADP) and zero-day attacks. Built from ground up for today’s virtual and cloud-based data centers, Hillstone Network’s fully distributed, intelligent next-generation firewall platform overcomes performance and deployment limitations of legacy firewalls, providing granular visibility and control of network traffic, based on real-time behavioral anomaly detection and advanced data analytics. Established in 2006 by NetScreen, Cisco and Juniper executives, over 5,000 customers worldwide use our proven high-performance, network security solutions, including Fortune 500 companies, higher education, financial institutions and service providers. Hillstone Networks is headquartered in Sunnyvale, California.|
|HyTrust is the Cloud Security Automation company. Its virtual appliances provide the essential foundation for cloud control, visibility, data security, management and compliance. HyTrust mitigates the risk of catastrophic failure — especially in light of the concentration of risk that occurs within virtualization and cloud environments. Organizations can now confidently take full advantage of the cloud, and even broaden deployment to mission-critical applications. The Company is backed by top tier investors VMware, Cisco, Intel, In-Q-Tel, Fortinet, Granite Ventures, Trident Capital and Epic Ventures; its partners include VMware, VCE, Symantec, CA, McAfee, Splunk; HP Arcsight, Accuvant, RSA and Intel.|
|Company:||iboss Network Security|
|iboss Network Security engineers highly scalable Web security solutions providing layer 7 defense across HTTP, SSL, threat and applications securing mobile devices on or off network. iboss enables organizations to safely adapt social media, SaaS, and mobile devices while expanding access to technology. By incorporating unmatched network traffic visibility, organizations are able to identify high-risk user behavior and the Shadow IT to create more actionable policies.|
|Company:||Identity Finder, LLC|
|Booth:||3635, North Hall|
|Identity Finder is a global leader in security and privacy enterprise software focusing on sensitive data discovery, management, and protection. Identity Finder's award-winning sensitive data management solutions help enterprises make smarter information technology decisions, manage risk, and prevent data leakage. The software discovers, classifies, secures, monitors, and reports confidential information no matter where it exists within the enterprise.|
|Booth:||(at Dell Booth 1301)|
|Invincea is the premier innovator in advanced malware threat detection, breach prevention and forensic threat intelligence. Invincea is the market-leading solution that provides enterprise and small business networks with coverage against the largest attack surface for cyber-breach attacks aimed at end users in the form of spear phishing, drive-by download exploits, poisoned search results and user-initiated infections.|
|Company:||IronKey by Imation|
|Ticker Symbol & Exchange:||NYSE: IMN|
|Imation's IronKey solutions meet the challenge of protecting today’s mobile workforce, featuring secure USB solutions for data transport and mobile workspaces. The IronKey portfolio meets a variety of needs from simple encryption and compliance to the need for the World’s Most Secure Flash Drive™. The IronKey line includes the world’s leading hardware encrypted USB drives; PC on a Stick™ workspaces for Windows To Go, transforming any computer into a trusted IT-managed workstation; and cloud-based or on-premise centralized secure device management solutions.|
|With more than 20 years of experience in IT security, Keypasco’s founders are the minds behind some of the revolutionary two factor authentication technology solutions used by banks today.|
|Keypasco offers a hardware-free, patent-approved and software-based authentication solution. The service combines factors like device fingerprints, geographical locations, 2-channel structure, proximity of mobile devices, and a risk behaviour analysis to offer strong multi-factor authentication.|
|Keypasco deliver on society’s expanding needs for personal authentication services, and identity protection within Internet banking, online gaming, eCommerce, mobile Commerce, eGovernment, etc. Keypasco’s vision is to be a leading supplier of services for securing cloud services.|
|Booth:||3634 North Hall|
|Lancope is a leading provider of network visibility and security intelligence to defend enterprises against today’s top threats. By collecting and analyzing NetFlow, IPFIX and other types of flow data, Lancope’s StealthWatch System helps organizations quickly detect a wide range of attacks from APTs and DDoS to zero-day malware and insider threats. Through pervasive insight across distributed networks, including mobile, identity and application awareness, Lancope accelerates incident response, improves forensic investigations and reduces enterprise risk. Lancope’s security capabilities are continuously enhanced with threat intelligence from the StealthWatch Labs research team.|
|Company:||Lanner Electronics Inc.|
|Booth:||109 (South Expo)|
|Lanner Electronics Inc. is a world leading provider of engineering and manufacturing services for advanced network appliances and rugged applied computing platforms for system integrator, service providers and application developers.|
|Lanner designs and manufactures a wide range of hardware platforms for gateway security, firewall, UTM, WAN acceleration and appliance-based software delivery solutions. What's more, Lanner offers a full range of industrial communications computing platforms for industrial automation, digital signage, power communications and telecom datacenters.|
|Light Cyber is a leading provider of predictive breach detection solutions that protect organizations from targeted threats and cyber-attacks. Light Cyber Magna™ is the first product to analyze both network traffic and endpoint information to understand the behavior of users, devices and applications and to detect compromised computers and stolen credentials early in the attack lifecycle, allowing the user to remediate breaches and stop attacks before damage is done.|
|Led by world-class cyber security experts and seasoned management team, the company's products have been successfully deployed by top tier customers in the financial, telecom, government, media and technology sectors.|
|LockPath’s Keylight platform provides a flexible infrastructure to effectively support governance, risk management and compliance programs. Correlate incident, threat and vulnerability data from multiple sources and tie to key assets. Industry-specific solutions scale to any size organization and provide keen insight for understanding risks, assuring compliance and preparing for audits.|
|LogRhythm is the largest and fastest growing independent security intelligence company in the world. The company’s patented and award-winning Security Intelligence Platform, unifying SIEM, log management, file integrity monitoring, network forensics and host forensics, empowers organizations around the globe to detect breaches and the most sophisticated cyber threats of today, faster and with greater accuracy than ever before. LogRhythm also provides unparalleled compliance automation and assurance as well as IT predictive intelligence to Global 2000 organizations, government agencies and mid-sized businesses worldwide.|
About Business Wire
Business Wire, a Berkshire Hathaway company, is the global leader in press release distribution and regulatory disclosure. Investor relations, public relations, public policy and marketing professionals rely on Business Wire to accurately distribute market-moving news and multimedia, host online newsrooms and IR websites, build content marketing platforms, generate social engagements and provide audience analysis that improves interaction with specified target markets. Founded in 1961, Business Wire is a trusted source for news organizations, journalists, investment professionals and regulatory authorities, delivering news directly into editorial systems and leading online news sources via its multi-patented simultaneous NX Network. Business Wire has 32 offices worldwide to securely meet the varying needs of communications professionals and news consumers.
Internet of @ThingsExpo, taking place June 6-8, 2017 at the Javits Center in New York City, New York, is co-located with the 20th International Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. @ThingsExpo New York Call for Papers is now open.
Jan. 21, 2017 12:15 PM EST Reads: 3,730
In the next five to ten years, millions, if not billions of things will become smarter. This smartness goes beyond connected things in our homes like the fridge, thermostat and fancy lighting, and into heavily regulated industries including aerospace, pharmaceutical/medical devices and energy. “Smartness” will embed itself within individual products that are part of our daily lives. We will engage with smart products - learning from them, informing them, and communicating with them. Smart produc...
Jan. 21, 2017 12:15 PM EST Reads: 1,757
SYS-CON Events announced today that Catchpoint, a leading digital experience intelligence company, has been named “Silver Sponsor” of SYS-CON's 20th International Cloud Expo®, which will take place on June 6-8, 2017, at the Javits Center in New York City, NY. Catchpoint Systems is a leading Digital Performance Analytics company that provides unparalleled insight into your customer-critical services to help you consistently deliver an amazing customer experience. Designed for digital business, C...
Jan. 21, 2017 11:45 AM EST Reads: 1,845
More and more brands have jumped on the IoT bandwagon. We have an excess of wearables – activity trackers, smartwatches, smart glasses and sneakers, and more that track seemingly endless datapoints. However, most consumers have no idea what “IoT” means. Creating more wearables that track data shouldn't be the aim of brands; delivering meaningful, tangible relevance to their users should be. We're in a period in which the IoT pendulum is still swinging. Initially, it swung toward "smart for smart...
Jan. 21, 2017 11:30 AM EST Reads: 2,803
WebRTC sits at the intersection between VoIP and the Web. As such, it poses some interesting challenges for those developing services on top of it, but also for those who need to test and monitor these services. In his session at WebRTC Summit, Tsahi Levent-Levi, co-founder of testRTC, reviewed the various challenges posed by WebRTC when it comes to testing and monitoring and on ways to overcome them.
Jan. 21, 2017 11:15 AM EST Reads: 6,117
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions with...
Jan. 21, 2017 10:00 AM EST Reads: 5,665
Every successful software product evolves from an idea to an enterprise system. Notably, the same way is passed by the product owner's company. In his session at 20th Cloud Expo, Oleg Lola, CEO of MobiDev, will provide a generalized overview of the evolution of a software product, the product owner, the needs that arise at various stages of this process, and the value brought by a software development partner to the product owner as a response to these needs.
Jan. 21, 2017 07:30 AM EST Reads: 1,306
In 2014, Amazon announced a new form of compute called Lambda. We didn't know it at the time, but this represented a fundamental shift in what we expect from cloud computing. Now, all of the major cloud computing vendors want to take part in this disruptive technology. In his session at 20th Cloud Expo, John Jelinek IV, a web developer at Linux Academy, will discuss why major players like AWS, Microsoft Azure, IBM Bluemix, and Google Cloud Platform are all trying to sidestep VMs and containers...
Jan. 21, 2017 07:15 AM EST Reads: 939
SYS-CON Events announced today that MobiDev, a client-oriented software development company, will exhibit at SYS-CON's 20th International Cloud Expo®, which will take place June 6-8, 2017, at the Javits Center in New York City, NY, and the 21st International Cloud Expo®, which will take place October 31-November 2, 2017, at the Santa Clara Convention Center in Santa Clara, CA. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex softw...
Jan. 21, 2017 06:45 AM EST Reads: 1,954
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, discussed the best practices that will ensure a successful smart city journey.
Jan. 21, 2017 06:00 AM EST Reads: 2,097
Technology vendors and analysts are eager to paint a rosy picture of how wonderful IoT is and why your deployment will be great with the use of their products and services. While it is easy to showcase successful IoT solutions, identifying IoT systems that missed the mark or failed can often provide more in the way of key lessons learned. In his session at @ThingsExpo, Peter Vanderminden, Principal Industry Analyst for IoT & Digital Supply Chain to Flatiron Strategies, will focus on how IoT depl...
Jan. 21, 2017 03:45 AM EST Reads: 1,992
Big Data, cloud, analytics, contextual information, wearable tech, sensors, mobility, and WebRTC: together, these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at @ThingsExpo, Erik Perotti, Senior Manager of New Ventures on Plantronics’ Innovation team, provided an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it m...
Jan. 21, 2017 02:00 AM EST Reads: 5,829
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, discussed how leveraging the Industrial Internet and...
Jan. 21, 2017 01:30 AM EST Reads: 6,573
There will be new vendors providing applications, middleware, and connected devices to support the thriving IoT ecosystem. This essentially means that electronic device manufacturers will also be in the software business. Many will be new to building embedded software or robust software. This creates an increased importance on software quality, particularly within the Industrial Internet of Things where business-critical applications are becoming dependent on products controlled by software. Qua...
Jan. 21, 2017 01:15 AM EST Reads: 5,065
Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da...
Jan. 21, 2017 01:15 AM EST Reads: 2,894
"Tintri was started in 2008 with the express purpose of building a storage appliance that is ideal for virtualized environments. We support a lot of different hypervisor platforms from VMware to OpenStack to Hyper-V," explained Dan Florea, Director of Product Management at Tintri, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jan. 21, 2017 01:15 AM EST Reads: 4,923
A critical component of any IoT project is what to do with all the data being generated. This data needs to be captured, processed, structured, and stored in a way to facilitate different kinds of queries. Traditional data warehouse and analytical systems are mature technologies that can be used to handle certain kinds of queries, but they are not always well suited to many problems, particularly when there is a need for real-time insights.
Jan. 21, 2017 12:15 AM EST Reads: 6,383
In his General Session at 16th Cloud Expo, David Shacochis, host of The Hybrid IT Files podcast and Vice President at CenturyLink, investigated three key trends of the “gigabit economy" though the story of a Fortune 500 communications company in transformation. Narrating how multi-modal hybrid IT, service automation, and agile delivery all intersect, he will cover the role of storytelling and empathy in achieving strategic alignment between the enterprise and its information technology.
Jan. 21, 2017 12:00 AM EST Reads: 4,723
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
Jan. 20, 2017 10:45 PM EST Reads: 941
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, discussed the importance of WebRTC and how it enables companies to focus o...
Jan. 20, 2017 08:45 PM EST Reads: 4,406