SYS-CON Events announced today that MangoApps will exhibit at SYS-CON’s 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA.
MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and easy to use. MangoApps has been named a “Market Leader” by Ovum Research and a “Cool Vendor” by Gartner. 20,000+ business customers worldwide.
Monthly Archives: January 2015
Cloud Portability and Interoperability By @JohnSavageau | @CloudExpo [#Cloud]
Cloud Computing has helped us understand both the opportunity, and the need, to decouple physical IT infrastructure from the requirements of business. In theory cloud computing greatly enhances an organization’s ability to not only decommission inefficient data center resources, but even more importantly eases the process an organization needs to develop when moving to integration and service-orientation within supporting IT systems.
Current cloud computing standards, such as published by the US National Institute of Standards and Technology (NIST) have provided very good definitions, and solid reference architecture for understanding at a high level a vision of cloud computing.
Putting the Year of the Data Breach to Rest By @Vormetric | @CloudExpo [#Cloud]
Tis’ the season – the season where I look back at predictions I made last year, the season where I evaluate and take a deep dive into the breach landscape and the season where I look into where 2015 is headed. In a March 2014 blog post, I discussed how the sheer amount of data breaches (i.e. Target, Adobe, Korea Credit Bureau, Neiman Marcus) is a clear sign cybercrime will continue to rise. We will dive into those predictions, stepping through where we stand today. But before we do so, we’ll provide a quick review on where we stand within the data breach landscape.
Insider Security Threats By @Vormetric | @CloudExpo [#Cloud]
Simply by having access, privileged users may unwittingly put data at risk – or be used by an outside actor as a conduit for siphoning data. Unsurprisingly, privileged accounts are very attractive targets for attackers seeking to leverage access privileges for their own nefarious purposes. Therefore, it’s completely accurate to say that all privileged users – regardless of whether or not they have bad intentions – can be considered an “insider threat.”
The post What We Talk About When We Talk About Insider Threats appeared first on Data Security Blog | Vormetric.
Recurring Revenue and the ‘Internet of Things’ By @AriaSystemsInc | @ThingsExpo [#IoT]
2014 was a big year for Aria. Most notably, the company announced a record-setting year with revenue best across the board. While this is indicative of Aria’s success as a company, the findings are even more indicative of the space Aria occupies – recurring revenue, now estimated to be a $300 billion market across all industries and companies, is on the fast track with no signs of slowing down.
So now that we know the space is hot, let’s look back to the top read blog posts* of 2014 and identify the key takeaways to bring into the new year.
451 Research Names @IndependenceIT Key Vendor | @CloudExpo [#Cloud]
According to the 451 Research report, “IndependenceIT’s strategy is focused on technology innovation, especially for multi-tenant and multi-cloud/datacenter scenarios. Its approach to rapid provisioning at scale, platform-agnostic service broker and out-of-the-box application and platform support simplifies the often-complex task of WaaS set up and application provisioning and de-provisioning. Its focus on service provider scenarios and agility at delivering new functionality will make it an attractive alternative for many service providers. Enterprises truly interested in a hybrid cloud approach with on-premises and hosted WaaS infrastructure are a unique opportunity also.”
Securing the SDDC By @TufinTech | @CloudExpo [#SDDC #Cloud]
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016.
Security is a key component and benefit of the SDDC, and offers an opportunity to build security ‘from the ground up’ and weave it into the environment from day one.
In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin, will discuss the main security considerations enterprises face when rolling out SDDCs and how they can harness key functionality of a virtual environment to achieve more granular security controls across hybrid environments.
What, Why, and How of IaaS and PaaS By @Microsoft | @CloudExpo [#Cloud]
The essence of cloud computing is that all consumable IT resources are delivered as services.
In his session at 15th Cloud Expo, Yung Chou, Technology Evangelist at Microsoft, will demonstrate the concepts and implementations of two important cloud computing deliveries: Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). He will discuss from business and technical viewpoints what exactly they are, why we care, how they are different and in what ways, and the strategies for IT to transition into and take advantages of these emerging service models.
Cloud Video Delivery Platform with @HarbingerSys | @CloudExpo [#Cloud]
At 15th Cloud Expo, Shrikant Pattathil, Executive Vice President at Harbinger Systems, demos a video delivery platform that helps you do interactive videos. He discusses how Harbinger is accomplishing it in the cloud world, the problems they faced and the choices they made to get around these problems.
Zen of Analytics and Transaction Processing | @CloudExpo [#BigData]
Existing Big Data solutions are mainly focused on the discovery and analysis of data. The solutions are scalable and highly available but they don’t provide ACID transactions and full SQL query support. Organizations, which have been collecting large customer data, are increasingly seeing the need to use the data for transaction processing. Therefore, there is a growing need for support transactional systems in “Big Data.”