|By Business Wire||
|December 15, 2010 08:08 AM EST||
SecureAuth Corporation, the leading provider of Identity Enforcement solutions, today announced a strategic alliance with FishNet Security, the number one provider of information security solutions that combine technology, services, support and training. Through this agreement, FishNet Security worldwide consultants will resell and implement the SecureAuth Identity Enforcement Platform (IEP). By partnering with FishNet Security, SecureAuth further extends the availability of its patented, world-renowned Identity Enforcement Platform to secure and simplify access to cloud, web and VPN resources with integrated 2-Factor Authentication, SSO, and IdM.
“We are committed to helping our clients address all of their security challenges and are there for them as they transition applications to the cloud,” said Gary Fish, FishNet Security president and CEO. "SecureAuth is an important component of our cloud security strategy and by partnering with them our customers gain access to some of the world's most advanced technology to protect their cloud, web and VPN resources from unauthorized access and the misuse of portable identities. In one solution, SecureAuth’s identity management and enforcement platform enhances our ability to secure and simplify remote access for our client’s applications on-premise and in the cloud."
“Partnering with FishNet Security allows us to quickly expand our horizons and extend our reach to many more customers,” stated Craig Lund, SecureAuth chief executive officer. “FishNet is known for their expertise in security and cloud computing and will be instrumental in helping many customers make the transition smoothly and securely. The FishNet team and our innovative approach to identity enforcement is a powerful combination. The timing is perfect. The need to secure and simplify access is in high demand with security, network and application teams, especially those tasked with extending their enterprise to the cloud."
FishNet Security has industry recognized security consultants, support and training services, and sales professionals who can assist clients in deploying, configuring and integrating SecureAuth IEP into their infrastructure.
About SecureAuth Corporation
SecureAuth is the market leader in identity enforcement for cloud, web, and VPN resources. SecureAuth makes it safe for organizations of any size to extend their enterprise to the cloud by simplifying access, reducing the risk of unauthorized access, phishing, and the misuse of portable enterprise identities. Known world-wide for SecureAuth IEP, its all-in-one Identity Enforcement Platform, SecureAuth delivers integrated 2-Factor Authentication, SSO, and IdM for less than the cost of a token-based solution. Strategic partners and customers include leaders in finance, government, healthcare, manufacturing, retail, technology, and services. Visit www.gosecureauth.com for additional information.
About FishNet Security
FishNet Security is the #1 provider of information security solutions that combine technology, services, support and training. Organizations are opening their computing environments to accelerate business initiatives. Unfortunately, with limited budget and resources to manage risk, uninformed decisions result in data breaches, negative publicity, decreased revenue, and disruption of services. Providing the most comprehensive security offering, FishNet Security enables clients to manage risk, meet compliance requirements, and reduce costs while maximizing security effectiveness and operational efficiency. Unlike Systems Integrators, Technology Resellers, and VARS, FishNet Security is committed to information security excellence and has a track record of delivering quality solutions to over 4,500 clients nationwide. For more information, please visit http://www.fishnetsecurity.com.
SecureAuth, SecureAuth IEP and the SecureAuth logo are registered trademarks of SecureAuth Corporation. All other products or company names mentioned herein are trademarks or registered trademarks of their respective owners.
Most companies hope for rapid growth so it's important to invest in scalable core technologies that won't demand a complete overhaul when a business goes through a growth spurt. Cloud technology enables previously difficult-to-scale solutions like phone, network infrastructure or billing systems to automatically scale based on demand. For example, with a virtual PBX service, a single-user cloud phone service can easily transition into an advanced VoIP system that supports hundreds of phones and ...
May. 28, 2015 07:00 AM EDT Reads: 2,842
Containers Expo Blog covers the world of containers, as this lightweight alternative to virtual machines enables developers to work with identical dev environments and stacks. Containers Expo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Bookmark Containers Expo Blog ▸ Here Follow new article posts on Twitter at @ContainersExpo
May. 28, 2015 06:00 AM EDT Reads: 1,136
The worldwide cellular network will be the backbone of the future IoT, and the telecom industry is clamoring to get on board as more than just a data pipe. In his session at @ThingsExpo, Evan McGee, CTO of Ring Plus, Inc., discussed what service operators can offer that would benefit IoT entrepreneurs, inventors, and consumers. Evan McGee is the CTO of RingPlus, a leading innovative U.S. MVNO and wireless enabler. His focus is on combining web technologies with traditional telecom to create a ...
May. 28, 2015 06:00 AM EDT Reads: 4,701
Disruptive macro trends in technology are impacting and dramatically changing the "art of the possible" relative to supply chain management practices through the innovative use of IoT, cloud, machine learning and Big Data to enable connected ecosystems of engagement. Enterprise informatics can now move beyond point solutions that merely monitor the past and implement integrated enterprise fabrics that enable end-to-end supply chain visibility to improve customer service delivery and optimize sup...
May. 28, 2015 05:00 AM EDT Reads: 5,887
Over the last few years the healthcare ecosystem has revolved around innovations in Electronic Health Record (HER) based systems. This evolution has helped us achieve much desired interoperability. Now the focus is shifting to other equally important aspects - scalability and performance. While applying cloud computing environments to the EHR systems, a special consideration needs to be given to the cloud enablement of Veterans Health Information Systems and Technology Architecture (VistA), i.e....
May. 28, 2015 05:00 AM EDT Reads: 4,102
SYS-CON Events announced today that MetraTech, now part of Ericsson, has been named “Silver Sponsor” of SYS-CON's 16th International Cloud Expo®, which will take place on June 9–11, 2015, at the Javits Center in New York, NY. Ericsson is the driving force behind the Networked Society- a world leader in communications infrastructure, software and services. Some 40% of the world’s mobile traffic runs through networks Ericsson has supplied, serving more than 2.5 billion subscribers.
May. 28, 2015 05:00 AM EDT Reads: 1,358
From telemedicine to smart cars, digital homes and industrial monitoring, the explosive growth of IoT has created exciting new business opportunities for real time calls and messaging. In his session at @ThingsExpo, Ivelin Ivanov, CEO and Co-Founder of Telestax, shared some of the new revenue sources that IoT created for Restcomm – the open source telephony platform from Telestax. Ivelin Ivanov is a technology entrepreneur who founded Mobicents, an Open Source VoIP Platform, to help create, de...
May. 28, 2015 04:00 AM EDT Reads: 6,343
The Internet of Things (IoT) promises to evolve the way the world does business; however, understanding how to apply it to your company can be a mystery. Most people struggle with understanding the potential business uses or tend to get caught up in the technology, resulting in solutions that fail to meet even minimum business goals. In his session at @ThingsExpo, Jesse Shiah, CEO / President / Co-Founder of AgilePoint Inc., showed what is needed to leverage the IoT to transform your business. ...
May. 28, 2015 04:00 AM EDT Reads: 6,707
Grow your business with enterprise wearable apps using SAP Platforms and Google Glass. SAP and Google just launched the SAP and Google Glass Challenge, an opportunity for you to innovate and develop the best Enterprise Wearable App using SAP Platforms and Google Glass and gain valuable market exposure. In his session at @ThingsExpo, Brian McPhail, Senior Director of Business Development, ISVs & Digital Commerce at SAP, outlined the timeline of the SAP Google Glass Challenge and the opportunity...
May. 28, 2015 03:00 AM EDT Reads: 5,002
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. Enterprises must protect their data from (i) system administrators who don't need to see the data in the clear and (ii) adversaries who become system administrators from stolen credentials. In short, enterprises must take control of their data: The best way to do this is by using advanced encryption, centralized key management and...
May. 28, 2015 02:00 AM EDT Reads: 4,454
What are the benefits of using an enterprise-grade orchestration platform? In their session at 15th Cloud Expo, Nate Gordon, Director of Technology at Appcore, and Kedar Poduri, Senior Director of Product Management at Citrix Systems, took a closer look at the architectural design factors needed to support diverse workloads and how to run these workloads efficiently as a service provider. They also discussed how to deploy private cloud environments in 15 minutes or less.
May. 28, 2015 01:00 AM EDT Reads: 3,601
In his session at DevOps Summit, Andrei Yurkevich, CTO at Altoros, provided an overview of all the benefits and opportunities, as well as drawbacks of deploying Cloud Foundry PaaS with Juju and compared it to BOSH. Discover the features that overlap, and understand what Juju Charm is, what it is not, where you use one or the other or where you use both BOSH and Juju Charms together. Andrei Yurkevich is Cloud Foundry protagonist and CTO at Altoros. Under his supervision, the Altoros engineering ...
May. 28, 2015 12:00 AM EDT Reads: 4,554
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water,...
May. 27, 2015 11:00 PM EDT Reads: 6,015
For better or worse, DevOps has gone mainstream. All doubt was removed when IBM and HP threw up their respective DevOps microsites. Where are we on the hype cycle? It's hard to say for sure but there's a feeling we're heading for the "Peak of Inflated Expectations." What does this mean for the enterprise? Should they avoid DevOps? Definitely not. Should they be cautious though? Absolutely. The truth is that DevOps and the enterprise are at best strange bedfellows. The movement has its roots in t...
May. 27, 2015 10:00 PM EDT Reads: 6,297
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrateg...
May. 27, 2015 10:00 PM EDT Reads: 5,399