Cologix Welcomes MOD Mission Critical to Ecosystem to Offer Micro-Colocation Opportunities at 21 Data Centers Across Eight U.S. and Canadian Markets
DENVER, Colo. – MOD Mission Critical ('MOD'), a global Managed Service Provider (MSP) specializing in Managed IT Services and Managed Colocation solutions, announces today a strategic relationship with Cologix, a network neutral interconnection and data center company, to make available MOD's Colo by the 'U' services throughout all of the company's 21 strategically located facilities in the U.S. and Canada. This mutually beneficial partnership provides MOD with a larger platform to share its services throughout underserved markets, while giving Cologix customers the ability to procure colocation space by the single rack unit for smaller workloads.
MOD's Colo by the 'U' provides small to medium-sized businesses and enterprise organizations with a unique solution as their demand for colocation and cloud services continues to grow. In addition to Colo by the 'U', MOD will provide Cologix data center customers with access to leading Managed Service solutions for networks, systems, storage, and business continuity.
"We're excited to partner with MOD and offer our customers micro-colocation of single servers," states Kim Gerhart, U.S. North General Manager, Cologix. "Organizations of any size, from start-ups to enterprises, will now be able to complement Cologix's services with MOD's unique combination of Managed Service delivery and the ability to satisfy specific requirements through smaller colocation solutions."
Cologix will begin offering MOD's Colo by the 'U' services at each of their data centers located in eight U.S. and Canadian cities, including:
- 555 Scherers Court, Columbus, OH
- The INFOMART at 1950 N. Stemmons Freeway, Dallas, TX
- 421 West Church Street and 4800 Spring Park Road, Jacksonville, FL
- 2850 Interstate Dr., Lakeland, FL
- The 511 Building at 511 11th Avenue South, Minneapolis, MN
- 151 Front Street West and 905 King Street West, Toronto, ON
- 555 West Hastings and 1050 West Pender, Vancouver, BC
- Seven data centers (MTL 1 - MTL 7) in Montréal, QC, including the carrier hotel at 1250 Rene-Levesque Blvd. West
"Our partnership with Cologix to offer micro-colocation and single servers at their strategically located data centers throughout North America is proof positive of the growing demand of customization of space requirements based on businesses' specific needs," comments Michael Hollander, CEO, MOD Mission Critical. "Cologix serves a critical role by providing stable and secure data centers from which MOD can continue to expand its footprint."
About MOD Mission Critical
MOD Mission Critical (MOD) is a global Managed Service Provider (MSP) specializing in Managed IT Services and Managed Colocation solutions. MOD goes where are our customers are, or want to be. Our growing international footprint includes PoPs in Amsterdam; Ashburn, VA; Reston, VA; Rome; St. Louis, MO; San Jose, CA; Seattle, WA; Shanghai; Southfield, MI; Tampa, FL; and Toronto. If customers do not see their market listed, please contact MOD and the Company will do its best to accommodate the request. For more information, visit www.modmc.net.
About Cologix Inc.
Cologix Inc. is a network-neutral interconnection and colocation data center company headquartered in Denver. Cologix provides scalable interconnection services and secure, reliable colocation services. Cologix operates densely connected, strategically located facilities in Columbus, Dallas, Jacksonville, Lakeland, Minneapolis, Montreal, Toronto and Vancouver. With more than 350 network choices and 21 prime interconnection locations, Cologix currently serves over 950 carrier, managed services, cloud, media, content, financial services and enterprise customers. The company's experienced local service teams are committed to providing its customers with the highest standard of local customer support. To arrange a tour of the center closest to you, contact us at firstname.lastname@example.org. Follow Cologix on LinkedIn and Twitter.
Alliance With Canada's Largest IT Buying Group Empowers Hundreds of Computer Dealers With Managed Services Expertise, Business Enablement and Technology Resources
OTTAWA, Ontario – Extending its managed services reach across Canada, SolarWinds N-able, a global leader in remote monitoring and management (RMM) and service automation software, today announced it was named the preferred RMM vendor for Millenium Micro, Canada's largest IT buying group with an extensive affiliate network of 269 independent IT service providers located throughout all regions of the country.
Effective immediately, Canadian computer dealers holding membership in Millenium Micro will have the option to standardize on the SolarWinds® N-able N-central® 10 platform as a business and technology enabler for their growing managed services practices. Selected by a 15-member committee, N-central 10 represents the first RMM offering that Millenium Micro is recommending as a preferred resource to its nationwide affiliates.
As part of the alliance, affiliates will also be able to take advantage of SolarWinds N-able's business building resources, including its exclusive Managed Services Playbook, MSP Business and Technicians Runbooks and Blueprint for Success program. In addition, members will be able to take part in a one-week managed services boot camp hosted by SolarWinds N-able and Millenium Micro this fall.
"After reviewing the highly competitive RMM landscape, it was clear that SolarWinds N-able offered the critical technology infrastructure along with the people, expertise and enablement resources our affiliates need to transition to managed services and succeed over the long haul," says Marco Michaud, Vice President, Millenium Micro. "From guidance on managed services pricing, to business acumen and more, SolarWinds N-able will position our members to grow their businesses and effectively deliver a new range of comprehensive proactive and reactive IT services to their customers."
Millenium Micro members who are transitioning from a break-fix model to managed services can use N-central 10 to gain time-saving, profit-building automation and direct support capabilities along with all the tools they need, spanning help desk, security, backup, patch management, reporting, mobile management and more.
"We are thrilled to see Millennium Micro recognize SolarWinds N-able for offering great technology as well as powerful enablement resources, business-building expertise and more," says Mike Cullen, Senior VP Sales and MSP Strategy, SolarWinds N-able. "The new alliance with Millenium Micro will allow us to help the organization's hundreds of members find their way with managed services and, ultimately, build a successful practice. We look forward to supporting their membership this year and beyond."
In addition to N-central 10, SolarWinds N-able also offers MSP Manager, a born-in-the-cloud IT service management platform. MSP Manager allows MSPs of all sizes to run a more efficient, effective and profitable business, with centralized customer knowledge management, simplified ticketing, easy time-tracking and fast and efficient billing.
For more information on N-central, click here. MSPs and IT resellers interested in more information or in becoming a SolarWinds N-able partner, please visit our MSP Partner Program web page or contact 1-877-655-4689 ext. 331 or +00 800 6225 3000 ext. 331.
About Millenium Micro
Founded in 2003, Millenium Micro is a national group of independent computer dealers involved in the sale of products and services to retail and commercial markets across all Canadian provinces and territories. These members meet the needs of individuals and businesses by providing the best customer service possible and the largest selection of computer and digital product brands in Canada. For more information, visit http://www.milleniummicro.ca/.
About SolarWinds N-able
SolarWinds N-able is a leading global provider of complete IT management, automation and MSP business transformation solutions. The SolarWinds N-able N-central product is an award-winning RMM and MSP Service Automation Platform. SolarWinds N-able has a track record of helping MSPs standardize and automate the setup and delivery of IT services in order to achieve true scalability. The N-central platform is backed by comprehensive business enablement support services. Thousands of MSPs use SolarWinds N-able solutions to deliver scalable, flexible, profitable managed services to over 100,000 SMBs worldwide. With offices in North America, the Netherlands and Australia, SolarWinds N-able is 100% channel-friendly and maintains strategic partnerships with Microsoft®, Intel®, IBM® and Cisco® among others. www.n-able.com.
© 2015 N-able Technologies, Inc. All rights reserved.
HP Partners With Ponemon Institute for Sixth Annual Study; Results Identify Most Costly Crimes, Supports Need for Shift in Security Strategy to Protect Interactions Among Users, Applications and Data
PALO ALTO, Calif. – HP (NYSE: HPQ) today unveiled the results from its sixth annual study in partnership with the Ponemon Institute detailing the economic impact of cyber attacks across both the private and public sectors. The findings reveal a dramatic increase in the overall cost of cyber crime, while providing insight to the most costly cyber crimes and the approaches organizations can take to minimize the impact.
Conducted by the Ponemon Institute and sponsored by HP Enterprise Security, the 2015 Cost of Cyber Crime Study quantifies the annual cost of cyber crime for companies across seven countries including the U.S., U.K., Japan, Germany, Australia, Brazil and the Russian Federation.
In the U.S. study, researchers found the average annualized cost of cyber crime incurred by a benchmark sample of U.S. organizations was $15 million,1 representing a nearly 20 percent increase year over year and an 82 percent increase since the study's inception six years ago.2 The results also revealed the average time it takes to resolve a cyber attack -- 46 days -- has increased by nearly 30 percent during this same six-year period, with the average cost incurred to resolve a single attack totaling more than $1.9 million.1
The U.S. study also revealed that some organizations are addressing the significant costs associated with detection and recovery by making investments in security intelligence, which has been shown to reduce response costs and provide a significant return on investment.1
"As organizations increasingly invest in new technologies like mobile, cloud, and the Internet of Things, the attack surface for more sophisticated adversaries continues to expand," said Sue Barsamian (@suebarsamian), senior vice president and general manager, Enterprise Security Products, HP. "To address this challenging dynamic, we must first understand the threats that pose the most risk and then prioritize the security strategies that can make a difference in minimizing the impact."
As organizations strive to embrace new technologies while protecting their expanded environments, there is a need to shift security strategies from traditional network control and perimeter management to an advanced focus on protecting interactions among users, applications and data. The 2015 Cost of Cyber Crime Study demonstrates this shift; reporting organizations are now committing 20 percent of their security budgets to the application layer1, up 33 percent in just two years.2
Key findings from 2015 U.S. Cost of Cyber Crime Study
- Cyber crimes continue to be very costly: The average annualized cost of cyber crime incurred was $15 million, with a range from $1.9 million to $65 million each year per company1. The net increase in the cost of cyber crime over the six year span of the study was 82 percent.2
- Cyber crime costs vary by organizational size: Results revealed a positive relationship between organizational size (as measured by enterprise seats) and annualized cost. However, based on enterprise seats, results showed that small organizations incurred a significantly higher per capita cost than larger organizations.1
- Cost to resolve cyber attack escalates: The average time to resolve a cyber attack was 46 days, with an average cost to participating organizations of more than $1.9 million during this 46-day period.1 This represents a 22 percent increase from last year's estimated average cost of approximately $1.5 million, which was based upon a similar 45-day resolution period.2
To be forewarned is to be forearmed
Understanding the cyber threats that pose the biggest risk and have the most economic impact to organizations can help enterprises better plan their security approach and investments.
- The most costly cyber crimes are caused by denial of service, malicious insiders and malicious code. These accounted for more than 50 percent of all cyber crime costs per organization on an annual basis.1 Results also showed that malicious insider attacks can take longer to address, with an average of approximately 63 days to contain.1
- Information theft represented the highest external cost, followed by the costs associated with business disruption. On an annual basis, information theft accounted for 42 percent of total external costs, while costs associated with disruption to business or lost productivity accounted for 36 percent of external costs (up 4 percent from the six-year average).2
- Recovery and detection were the most costly internal activities, accounting for 55 percent of the total annual internal activity cost, with cash outlays and direct labor representing the majority of these costs.1
Organizations investing in and using security intelligence technologies and governance practices to address the crimes that proved most costly were more efficient in detecting and containing cyber attacks, thereby reducing costs otherwise incurred.1
- Deploying a security information and event management (SIEM) solution led to an average cost savings of $3.7 million per year, compared to companies not deploying similar security solutions.
- A sufficient budget can save an average of $2.8 million in attack response and management costs.
- Employment of certified/expert security personnel can save $2.1 million.
- The appointment of a high-level security leader can reduce costs by $2 million.1
- The percentage of participating organizations realizing cost savings from the full deployment of enabling security technologies to guard against adverse data loss included: encryption technologies at 57 percent, access governance tools at 45 percent, data loss prevention tools at 38 percent and policy management tools at 36 percent.1
"With cyber attacks growing in both frequency and severity, understanding of the financial impact can help organizations determine the appropriate amount of investment and resources needed to prevent or mitigate the consequences of an attack," said Dr. Larry Ponemon (@ponemon), chairman and founder, Ponemon Institute (@PonemonPrivacy). "As seen in this year's study, the return on investment for organizations deploying security intelligence systems, such as SIEM, realized an average annual cost savings of nearly $4 million -- showcasing the ability to minimize impact by more efficiently detecting and containing cyber attacks."
The state of cyber security in local, state and federal government
To better understand the challenges IT and IT security practitioners face in keeping government agencies secure, HP also recently unveiled the results from a new study conducted in partnership with the Ponemon Institute. The 2015 State of Cybersecurity in Local, State & Federal Government Study shares findings including the frequency of attacks across local, state and federal sectors, the difficulty in sourcing adequate security expertise, and the information assets most at risk.
Additional Information & Webcast Events
Hear more detail on the Cost of Cyber Crime Study's findings and how actionable security intelligence can help to minimize the impact of cyber crime on a webcast being held Wednesday, October 14 at 12:00 p.m. EDT. HP and Ponemon will also discuss the findings from the government study during a webcast on October 28 at 2:00 p.m. EDT. For more information on country-specific findings of the Cost of Cyber Crime Study or copies of the full reports, along with an interactive assessment tool, visit www.hp.com/go/Ponemon.
About HP Security
HP enables organizations to take a proactive approach to enterprise security, disrupting the life cycle of an attack through prevention and real-time threat detection. With market-leading products, services and innovative security research, HP Security brings a global network of security operations centers and more than 5,000 IT security experts to help customers strengthen their security posture to minimize risk and incident impact.
Join HP Software on LinkedIn and follow @HPSoftware on Twitter. To learn more about HP Enterprise Security products and services on Twitter, please follow @HPSecurity and join HP Enterprise Security on LinkedIn.
HP creates new possibilities for technology to have a meaningful impact on people, businesses, governments and society. With the broadest technology portfolio spanning printing, personal systems, software, services and IT infrastructure, HP delivers solutions for customers' most complex challenges in every region of the world. More information about HP is available at http://www.hp.com.
1 "2015 Cost of Cyber Crime Study: United States," Ponemon Institute, October 2015.
2 Based on internal analysis of the results from the 2015 "Cost of Cyber Crime Study: United States" report compared to prior-year reports from Ponemon Institute.
3 "2015 State of Cybersecurity in Local, State & Federal Government," Ponemon Institute, October 2015.
© 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
This press release contains forward-looking statements that involve risks, uncertainties and assumptions. If such risks or uncertainties materialize or such assumptions prove incorrect, the results of HP and its consolidated subsidiaries could differ materially from those expressed or implied by such forward-looking statements and assumptions. All statements other than statements of historical fact are statements that could be deemed forward-looking statements, including but not limited to statements of the plans, strategies and objectives of HP for future operations, including the separation transaction; the future performance of Hewlett-Packard Enterprise and HP Inc. if the separation is completed; any statements concerning expected development, performance, market share or competitive performance relating to products and services; any statements regarding anticipated operational and financial results; any statements of expectation or belief; and any statements of assumptions underlying any of the foregoing. Risks, uncertainties and assumptions include the need to address the many challenges facing HP's businesses; the competitive pressures faced by HP's businesses; risks associated with executing HP's strategy, including the planned separation transaction, and plans for future operations and investments; the impact of macroeconomic and geopolitical trends and events; the need to manage third-party suppliers and the distribution of HP's products and services effectively; the protection of HP's intellectual property assets, including intellectual property licensed from third parties; risks associated with HP's international operations; the development and transition of new products and services and the enhancement of existing products and services to meet customer needs and respond to emerging technological trends; the execution and performance of contracts by HP and its suppliers, customers, clients and partners; the hiring and retention of key employees; integration and other risks associated with business combination and investment transactions; the execution, timing and results of restructuring plans, including estimates and assumptions related to the cost and the anticipated benefits of implementing those plans; the execution, timing and results of the separation transaction or restructuring plans, including estimates and assumptions related to the cost (including any possible disruption of HP's business) and the anticipated benefits of implementing the separation transaction and restructuring plans; the resolution of pending investigations, claims and disputes; and other risks that are described in HP's Annual Report on Form 10-K for the fiscal year ended October 31, 2015, and HP's other filings with the Securities and Exchange Commission. HP assumes no obligation and does not intend to update these forward-looking statements.
AIS Releases Compact HMI Panel PC Series Featuring an Innovative Automatic Battery Backup Power Module Provides for Mission-Critical Automation and Control Applications
IRVINE, Calif. – American Industrial Systems, Inc. (AIS) the leader of open architecture, Industrial HMIs, Touch Panel Computers, Industrial PCs (IPCs), Industrial Box PCs, Industrial DIN-Rail PCs, and Industrial Thin Clients, releases their family of Compact HMI Touch Panel PCs with an automatic battery backup power module for automatic back-up during power outages, temporary disruptions and/or systems failures. As the company who was first to bring and incorporate multi-touch technology to industrial touchscreens, AIS again is an innovator and leader, as the first HMI Company to incorporate a built-in, automatic battery backup module as a standard in their family of Industrial panel PCs. The backup power modules have an automatic transfer switch, which helps keep HMI systems and network devices up and running from electrical power disruptions. In plants and facilities, disruptions or outages can range from a few minutes to an hour in the event of a power failure, as well as surges and spikes.
The built-in automatic battery backup power module in AIS's Compact family of Touch Panel HMIs significantly lowers the risk of downtime associated with power interruptions. This helps keep key automation equipment in facilities operating at full capacity and the highest levels of productivity and efficiency. AIS's Compact Series of Touch Panels are designed for critical networking and control applications such as human machine interfaces (HMIs) and supervisory control and data acquisition (SCADA) systems and other control, automation, information and communications applications.
AIS Compact HMI Panels with Integrated Automatic Battery Backup Module Helps Companies Minimize Losing Thousands of Dollars from Power Outages and Disruptions
Even with the extensive efforts and great sums of money invested by manufacturing companies in conditioning and cleaning their electrical power, they still experience multiple power outages, surges, spikes and other forms of power disruptions every year. It is commonly understood when the power goes out at a manufacturing facility or plant, production comes to a halt. A production line stopping severely and adversely affect productivity, profits, deliveries and other KPIs for companies. Even brownouts or momentary losses of power can cause downtime, waiting a few minutes or more for network or control equipment needing to restart, costing companies thousands of dollars per power interruption.
A simple way to think about the utility of a UPS unit is to consider how a notebook computer is not affected from a power outage as it has internal battery. With a computer or laptop that is plugged into an appropriate surge protection strip, if storm causes a power outage or disruption in the area, while lights, appliances and other electronics will shut off, the notebook computer is uninterrupted because the notebook switched over to battery power seamlessly when the flow of electricity from the power cord vanished. You can now continue to work or shut down your machine.
The Compact Series of Industrial Panel PCs from AIS Combine a Rugged, Aluminum Die-Cast Housing, Open Platform HMI and UPS for a Robust & Reliable Solution
The integral UPS now available with the Compact Line of HMIs from AIS is just one of the many great standout features of the powerful Compact HMI series. Powered by an Intel® Celeron® N2930 processor engine which are specifically designed for industrial machinery, intelligent, web-based and smart HMI applications, the AIS Compact Series of HMIs are designed to work within a wide range of thermal conditions. This make the Compact Series a highly desirable solution for industrial control applications. The Compact line of open architecture, PC-based HMIs come in touchscreens ranging from 7" to 21.5" displays with some models available in both single and/or multi-touch screens.
AIS Compact HMI's Integral UPS Reduces Issues for Manufacturing Companies Caused by Common Electrical Problems and Service Disruptions
There are many causes of power failures in an electricity network. Examples of these causes include faults at power stations, damage to electric transmission lines, substations, or other parts of the distribution system, a short circuit or the overloading of electricity mains. Computer systems and other electronic devices such as HMIs contain logic circuitry that may be susceptible to data loss or hardware damage that can be caused by the sudden loss of power. To protect against this, AIS has employed the use of an uninterruptible power supply or UPS in their Compact line of HMIs to provide a constant flow of electricity if a primary power supply becomes unavailable for a short period of time.
Headquartered in Irvine, California, USA, American Industrial Systems, Inc. (AIS) offers in-house electronic and mechanical design, software development, manufacturing, production and quality control services. Offering one of the widest ranges of industrial computing solutions, AIS open platform control and monitoring solutions are available in a multitude of configurations for industrial, building automation, oil & gas, military and marine applications. The company's HMI solutions are key enabling technologies for the Internet of Things (IoT), Industrial Internet of Things, (IIoT), Machine-to-Machine Communications (M2M) and Industry 4.0 applications. AIS is fully committed to empowering, improving and delivering turnkey HMI, control, monitoring and display solutions for OEM, ODM and end-user customers. AIS is an ISO 9001:2008 certified supplier and manufacturer of rugged computers and displays, and received completion of the International Traffic in Arms Regulations (ITAR) registration from the Directorate of Defense Trade Controls (DDTC). For more information, visit: www.aispro.com, email: email@example.com or contact: 1-888-485-6688.
Beachhead's High-ROI Reseller Program Now Available in India, Middle East and Africa Regions
JOHANNESBURG, SOUTH AFRICA – Beachhead Solutions, provider of cloud-managed PC & mobile device encryption, security and data access control for businesses of all sizes, today announced the introduction of its Emerging Market Channel Program and the expansion of product availability to IT resellers and MSPs in the India, Middle East, Africa (IMEA) regions as well as in Mauritius. The program is designed to grow the California-based company's reach and serve the specific needs of small and medium enterprises (SMEs) facing the growing IT security risks and regulatory requirements prevalent in these emerging markets. Beachhead's channel-friendly SimplySecure Management System provides easy cloud-based security and management for a business' portable devices, including Windows and Mac laptops and desktops, iPhones and Android phones, iPads and other tablets, and USB storage devices.
A look at the market potential and demand for Beachhead's SimplySecure mobile device and data security management products in these emerging markets reveals environments ripe for the company's cloud-based device security solutions. Both Africa and India have high mobile device usage and large populations under the age of 25, setting the stage for a new wave of business employees that are expectant of mobility in and out of the office. At the same time, increased regulations around the protection of personal information are being implemented across Africa and in India, necessitating that SMEs gain the proper technological safeguards to defend all personal data in their care, even when accessed by employees over mobile devices. On this front, South Africa's Protection of Personal Information act (POPI) is expected to see enforcement begin in the next few months, and Mauritius is currently enforcing its own Data Protection Act. An anticipated overhaul of the EU's Data Protection Directive is also a looming factor, expected to put even more pressure on trading partners in IMEA and Mauritius to adopt compatible standards.
With its channel program now targeting these emerging markets, Beachhead is delivering managed device security solutions tailored to meet the needs of IT resellers and MSPs in these regions. Customized to fit the needs of SMEs in these markets -- including safety from specific IT security risks and regulatory compliance requirements -- the program features price points adapted to emerging markets, a clear and uncomplicated 100% engagement mode for channel partners, and a deal registration program to ensure opportunities for resellers and MSPs.
Beachhead's new General Manager for IMEA and Mauritius Amit Parbhucharan, will lead the new program. With deep experience working in emerging markets, Parbhucharan understands the dynamics and needs of these markets and how to plan and execute successful business expansions.
"As a global company we look forward to expanding our reach and meeting the needs of new customers in emerging markets, especially with Amit at the helm," said Cam Roberson, Beachhead's Director of the Reseller Channel. "We're proud to have Amit's experience and history of success in navigating these new markets, and glad to see him lead the program launch."
"Given the current environment of mobile device security risks and regulatory requirements, Beachhead's SimplySecure platform is downright essential for SMEs operating in these emerging markets today," said Amit Parbhucharan, Beachhead's GM for India, the Middle East, Africa and Mauritius. "I'm excited and eager to play a leadership role in providing SMEs with these needed device and data security solutions."
To learn more about Beachhead's reseller and MSP programs, visit http://www.beachheadsolutions.com/beachhead-partner-program/
About Beachhead Solutions
Beachhead Solutions offers first-in class data security for PC, Mac, USB storage, iOS and Android device users. Beachhead technology -- through its SimplySecure™ web-based security platform -- takes a multi-faceted approach to protecting sensitive company data by offering encryption, data quarantine, and wiping from one unified management console. Beachhead's services are both easy to administer and user-transparent, giving an organization the ability to change policy on any remote device including denial (and restoration) of data access by user. SimplySecure is available direct-to-business and through Beachhead's reseller channel.
Latest Version of Tower 2 Git Client Includes Helix GitSwarm Integration
WOKINGHAM, UK – Perforce Software and fournova today announced a distribution agreement that allows Perforce customers to purchase the Tower 2 Git client, which supports one-click connection to Git repositories managed by Helix GitSwarm. Helix GitSwarm, also announced today, is a complete Git ecosystem whose repositories automatically mirror code managed within the Perforce Helix collaboration and version control platform.
Tower is a powerful Git client that makes using Git easy and more efficient. Users benefit from its elegant and comprehensive interface and a feature set that exposes the full power of Git. Tower abstracts Git’s complexity for new users, but also supplies advanced functions such as single-line staging, submodule support and file history.
Helix GitSwarm is a complete Git management solution that provides Git project management, a merge-request workflow, issue tracking and an integrated wiki. Based on the popular GitLab project, Helix GitSwarm serves developer teams as well as enterprise requirements for DevOps, digital asset management, global distribution, high performance at petabyte scale, quality, security, process management and governance.
“Tower is the best Git client on the market,” said Christopher Hoover, VP of product strategy at Perforce. “Making it available with Helix GitSwarm helps us deliver the best experience to the individual developer, while Perforce Helix delivers the control, traceability and security required by large-scale enterprise deployments.”
Over 50,000 customers—from independent developers and startups to Fortune 100 companies—already rely on Tower to easily and productively work with Git through a native desktop application. Available on OS X today, Tower will soon be available on Windows.
“Git is an essential tool for software development and we’ve worked hard to make it accessible to beginners and advanced developers alike,” said Julian Rothkamp, CMO at fournova. “By integrating with Helix GitSwarm we have made Tower easy to adopt by an enterprise that needs the flexibility of Git as well as the discipline and control available through Perforce.”
Helix GitSwarm is sold and supported by Perforce and is available immediately as part of the Perforce Helix platform.
About Perforce Software
Perforce Software helps companies build complex products more collaboratively and securely. Its highly scalable source code management (SCM) and collaboration platform, Perforce Helix, enables global teams to collaborate on any type or size of file. It supports both centralised and distributed (DVCS) workflows while safeguarding intellectual property with advanced behavioural analytics. Perforce is trusted by the world’s most innovative brands, including adidas, Samsung, NVIDIA, Intuit, Pixar, Salesforce, EA, Ubisoft, and VMware. The company is headquartered in Alameda, California, with offices in the United Kingdom, Canada and Australia, and sales partners around the globe. For more information, please visit www.perforce.com
fournova is an independent software startup from Germany with offices in Berlin and Stuttgart. Founded in 2010 fournova develops Mac apps such as the popular Git client Tower, which helps over 50,000 customers in companies like Apple, Google, Amazon, Twitter and Salesforce to productively work with the Git version control system. For more information, please visit www.fournova.com
Development Teams Can Now Use Git to Collaborate on Code That Is Automatically Synchronised with a Mainline Branch for DevOps Efficiency and Security
WOKINGHAM, UK - Perforce Software today announced extended support for multiple workflows with the general availability of Helix GitSwarm, a complete Git ecosystem integrated with Perforce Helix. Based on the popular GitLab collaboration suite, GitSwarm fosters developer productivity through Git repo management, a pull-request workflow, issue tracking and an integrated wiki.
With GitSwarm, Perforce Helix integrates Git workflow used by development teams with mainline development preferred by DevOps teams responsible for releasing products quickly.
GitSwarm developers use “narrow cloning” from a Helix mainline to manage the distribution of intellectual property through Git. At the same time, mirrored branches of code maintained in the Helix Versioning Engine protect enterprise IP from potential theft and loss that can take place with unmanaged code distribution.
By integrating Git workflow with a centralised workflow, Perforce Helix addresses the limitations of native Git and other Git management solutions in the enterprise. It meets the scalability required by DevOps practices and supports enterprise-class digital asset management, global distribution, high performance at petabyte scale, quality, security, process management and governance.
"Helix GitSwarm allows developers to collaborate in their preferred workflow," said Sytse Sijbrandij, CEO of GitLab. "Backed by the scalability of the Helix mainline repository and the collaboration features of GitLab, GitSwarm is a uniquely powerful Git-powered enterprise platform."
“Many of our developers want to use Git, but for the good of the larger enterprise, we need a scalable mainline repository that supports all the automation we’ve built into our product delivery systems,” said Jason Leonard, Build & Services software engineer at Citrix. “GitSwarm lets our developers work the way they want to while also meeting our needs for visibility, security and scalability.”
According to Gartner, “Enterprise-grade management of Git that offers important aspects of a DVCS — good merging, the ability to work offline and good collaboration — along with the security and central repository of a CVCS, will resolve most remaining concerns about the use of the DVCS model.”
Helix GitSwarm is available free of charge as part of Perforce Helix. Both Perforce Helix and Helix GitSwarm are free for up to 20 users under the Perforce 20/20 Program. GitSwarm Enterprise Edition, based on GitLab Enterprise Edition, is also available to offer additional security, project management and integration options.
“Popular Git repo hosting services are great for small open source projects but fall short when a company needs to scale, protect their IP, or work with more than plain text files,” said Christopher Hoover, vice president of product strategy at Perforce. “With the addition of GitSwarm to our Helix platform, we’ve delivered a single-vendor, best-of-both-worlds solution that understands and respects development teams as well as the business, digital asset and security needs of a large enterprise.”
Helix GitSwarm is available immediately.
In related news, Perforce today announced a distribution agreement with pioneering Git client provider fournova (see “Perforce Teams with Leading Git Client Developer fournova”).
About Perforce Software
Perforce Software helps companies build complex products more collaboratively and securely. Its highly scalable source code management (SCM) and collaboration platform, Perforce Helix, enables global teams to collaborate on any type or size of file. It supports both centralised and distributed (DVCS) workflows while safeguarding intellectual property with advanced behavioural analytics. Perforce is trusted by the world’s most innovative brands, including adidas, Samsung, NVIDIA, Intuit, Pixar, Salesforce, EA, Ubisoft and VMware. The company is headquartered in Alameda, California, with offices in the United Kingdom, Canada and Australia, and sales partners around the globe. For more information, please visit www.perforce.com.
Digital Guardian Now Delivers Next Generation Data Protection to Endpoint, Network, Cloud and Mobile Devices
LONDON, United Kingdom – Digital Guardian, the only endpoint security platform purpose-built to stop data theft, has acquired Code Green Networks, a provider of Data Loss Prevention (DLP) solutions for the network, cloud and mobile devices.
Code Green Networks’ TrueDLP™ solution is comprised of Network DLP, Discovery DLP and Cloud DLP, and locates sensitive data resting on databases and network servers, including data in the cloud. Founded in 2004 in Sunnyvale, Calif., privately held Code Green Networks helps enterprises protect and manage regulated and other sensitive digital information. TrueDLP is an all-in-one, appliance-based solution that has been heralded by industry analysts for its simplicity and affordability. The latest Gartner Magic Quadrant for Content-Aware Data Loss Prevention found “solution cost, ease of use, available features and time to implement are key buying considerations for Code Green Networks.”
Code Green Networks has also developed a strong strategic partnership program by offering tightly integrated solutions with other IT security leaders, including Blue Coat Systems®, which enables organisations to address their data security compliance requirements more efficiently and effectively.
With this acquisition, Digital Guardian becomes the only security company exclusively focused on protecting customers’ most valuable data at the endpoint, on the network and in the cloud from both insider threats and outside hackers. The combination of Digital Guardian and Code Green Networks will ultimately provide organisations with one data protection policy administered by a single management console and enforced regardless of where the data is located or how it is accessed. The combined solution will also provide:
- Comprehensive data protection for the network, endpoint, cloud and mobile devices
- Advanced data protection from threats originating inside or outside an organisation
- Data discovery for endpoints, network, servers and in the cloud
- Context and fingerprint-based data classification for structured and unstructured data
TrueDLP is generally available today, and will continue to be sold as a separate solution until it is fully integrated into the Digital Guardian Data Protection Platform.
In addition, the acquisition provides Digital Guardian with enhanced threat intelligence, deep packet inspection and wider visibility across the network, significantly strengthening its Advanced Threat Protection (ATP) and Endpoint Detection and Response (EDR) capabilities.
Ken Levine, president and chief executive officer, Digital Guardian
“Our mission is to provide ubiquitous data protection. Data that is safeguarded regardless of the threat actor, data type and the system, application, or device used to access it. Our acquisition of Code Green Networks represents a significant advancement in that mission, and following on the heels of our Armor5 and Savant Protection acquisitions, it better positions us to meet the wider data protection and cybersecurity needs of enterprises. Code Green Networks has a long tradition of innovation, and its TrueDLP network and cloud solution is the ideal complement to our own endpoint DLP and threat detection and response offerings.”
Mark Menke, chief technology officer and principal architect, Code Green Networks
“Since its inception, Code Green Networks has sought to make data loss prevention easy to use and affordable. The current solution fits a clear market need; however, we see where the future of data protection is headed. We now work in borderless environments which has changed the threats to sensitive data dramatically. Digital Guardian recognised early that the next generation DLP solution has to protect sensitive data from all threats. We believe in Ken’s mission and we’re pleased to now be part of the team that will make ubiquitous data protection a reality.”
Garrett Bekker, senior analyst, enterprise security at 451 Research
“With the rapid pace of data theft incidents showing no signs of slowing, it’s becoming imperative that companies have a sound data security strategy in place. With the acquisition of Code Green Networks, Digital Guardian has taken another big step forward. The combination of Digital Guardian’s proven endpoint security solution with Code Green Networks’ network-based DLP and advanced discovery capabilities for both on-premise and cloud-based resources will enable Digital Guardian to provide one of the most comprehensive system and data protection solutions on the market.”
About Digital Guardian
Digital Guardian is the only data-aware security platform designed to stop data theft. The Digital Guardian platform performs across traditional endpoints, mobile devices and cloud applications to make it easier to see and stop all threats to sensitive data. For more than 10 years, it has enabled data-rich organisations to protect their most valuable assets with an on premise deployment or an outsourced managed security program (MSP). Digital Guardian’s unique data awareness and transformative endpoint visibility, combined with behavioral threat detection and response, let you protect data without slowing the pace of your business. To learn more please visit https://digitalguardian.com.
Hexaware to Provide Anypoint Platform™ and Services for Connecting
JAMESBURG, NJ – Hexaware Technologies Limited, a leading global provider of IT, BPO and consulting services today announced its partnership with MuleSoft, the company that makes it easy to connect applications, data and devices, to provide consulting and services for the MuleSoft Anypoint Platform™. The platform is a complete solution for Application Programming Interface (API) led connectivity that integrates applications and data both on-premises and in the cloud, unleashing the value of that data through the design, implementation and management of APIs.
Hexaware’s integration expertise and knowledge of the imminent needs of vertical markets, coupled with technology leadership from MuleSoft, gives clients the support and tools they need to effectively drive a successful and modernized integration strategy to meet its business goals. This approach helps clients to seamlessly integrate hybrid environments and address critical orchestration, security and data transformation challenges with ease.
“Today’s winning companies gain competitive advantage by automating business processes across SaaS applications, data sources and APIs. Through its partnership with MuleSoft, Hexaware is enabling its customers to achieve their business goals through integration,” said Brent Hayward, Vice President of global partners and services, MuleSoft. “We’re excited to welcome Hexaware to Mulesoft’s world-class partner ecosystem and look forward to working together to deliver significant business impact to our mutual customers.”
“We are committed to providing futuristic cloud based integration solutions to our customers,” said Nachiket Gune, Associate Vice-President, ADM, Hexaware Technologies Ltd. “Our strong capability in the Human Capital Management (HCM) domain combined with MuleSoft’s position as the only integration provider that is a certified Workday Connect Partner enables us to expand on our integration offerings with other third party applications. Our partnership with MuleSoft will further extend Hexaware’s deep Application Integration expertise to offer iPaaS based solutions.”
Hexaware is a leading global provider of IT, BPS and consulting services. The Company focuses on key domains such as Manufacturing, Retail, Education, Telecom, Banking, Financial Services, Capital Market, Healthcare, Insurance, Travel, Transportation and Logistics. Our business philosophy, “Your Success is Our Focus”, is demonstrated through the success we ensure for our clients. Hexaware focuses on delivering business results and leveraging technology solutions by specializing in Application Development & Maintenance, Enterprise Solutions, Human Capital Management, Business Intelligence & Analytics, Quality Assurance and Testing Services, Remote Infrastructure Management Services and Business Process Services. Founded in 1990, Hexaware has a well-established global delivery model armed with proven proprietary tools and methodologies, skilled human capital and SEI CMMI-Level 5 certification. For additional information logon to: www.hexaware.com
Safe Harbor Statement
Certain statements in this press release concerning our future growth prospects are forward-looking statements, which involve a number of risks, and uncertainties that could cause actual results to differ materially from those in such forward-looking statements. The risks and uncertainties relating to these statements include, but are not limited to, risks and uncertainties regarding fluctuations in earnings, our ability to manage growth, intense competition in IT services including those factors which may affect our cost advantage, wage increases in India, our ability to attract and retain highly skilled professionals, time and cost overruns on fixed-price, fixed-time frame contracts, client concentration, restrictions on immigration, our ability to manage our international operations, reduced demand for technology in our key focus areas, disruptions in telecommunication networks, our ability to successfully complete and integrate potential acquisitions, liability for damages on our service contracts, the success of the companies in which Hexaware has made strategic investments, withdrawal of governmental fiscal incentives, political instability, legal restrictions on raising capital or acquiring companies outside India, and unauthorized use of our intellectual property and general economic conditions affecting our industry.
Telematics provider Risk Technology and driver behaviour specialists CAS have entered into a long term partnership agreement. This paves the way for the detailed investigation and development of driver profiling to enhance the effectiveness of driver scoring. Insights from this will ultimately help to improve driver safety and influence insurance product and pricing strategies.
Data gathered from Risk’s network of telematics boxes around the world – installed across fleets and individual vehicles – will be used by CAS to aggregate behavioural data and build more accurate profiles of individual and groups of drivers.
Taking more traditional driver behaviour information including acceleration and deceleration, cornering and journey length, Risk’s big data capability will also enable CAS to identify additional journey characteristics – such as drivers who spend much of their week driving on motorways or young drivers who travel on rural roads during high risk times.
This agreement follows the publication of research from CAS in May 2015, which found that telematics devices installed in consumer vehicles are able to accurately predict the likelihood of a motorist having an accident.
The research concluded that while other telematics companies base their predictions on a single driver score, much more accurate predictions of crash risk and maintenance cost can be produced by driver profiling that draws on the extensive range of factors that Risk’s platform is able to take into account.
Mark Packman, CEO at Risk Technology, said: “We’re delighted to be working with CAS and I am certain that our work will have far-reaching consequences for the insurance and automotive industries, as well as for individual motorists.
“Our joint study confirmed our belief that telematics solutions are accurately predicting the likelihood of drivers having a crash. We’re now looking to find out how our driver profiling methodology and algorithms can improve driver scoring.”
Chris Lloyd, Managing Director of CAS, said: “Risk’s global network of telematics devices and big data capabilities match up perfectly with our knowledge of driver behaviours and risk.
“This bodes well for the impact we can make on driver safety, driving performance and the value we can add to the fleet management and insurance industries.”
About Risk Technology
Risk Technology works with major international brands to seize the opportunities being created by next generation telematics.
The data generated from connected vehicles is helping firms to operate more efficiently and increase profits. The information supplied is also enabling brands to engage with motorists in new ways.
Armed with sophisticated insights, provided by Risk’s patent protected technology, companies can take positive actions which boost customer loyalty and generate new revenue streams.
The team has a huge amount of experience rolling out these telematics solutions across a range of global markets.
Key sectors include:
- Fleet and lease management
- Breakdown service / Roadside assistance
- Auto Parts retailers
- Emergency Services
CAS is a management consultancy based in London and Hong Kong. It helps businesses, governments and investors manage risks arising from governance, culture, competence and human factors.
CAS is recognised internationally as an authority on driver behaviour assessment and modification, driver profiling, monitoring and training. It delivers significant projects and trusted advice to the Irish Road Safety Authority (RSA), the UK Driving & Vehicle Standards Agency (DVSA) and the UK Department for Transport and is a prominent member of CIECA, the international association of driver licensing authorities.
The CAS team works with corporate and government clients to help them manage risks and costs relating to driver related risk including Crossrail, Serco, Highways England, NIOSH, IRTE, Network Rail, Arup, Department for Transport, RSSB and Royal British Legion.
More at www.casolutions.co.uk.