Fall World 2016

Conference & Exhibit

Attend The #1 BC/DR Event!

Summer Journal

Volume 29, Issue 3

Full Contents Now Available!

Jon Seals

Many BCM practitioners talk about BCM standards, but few walk the walk. I write this blog as this subject continues to boggle my mind in today’s risk-filled environment.

I recently presented to two groups: one at a major conference in Orlando and the second at a leading continuity group in Nebraska. We spoke to a total of about 140 practitioners regarding standards and compliance. The attendees were all from mid-level to very large companies – some regulated, some not. Experience levels ran from beginner to advanced.

The first question I asked both groups was: How many of you have adopted a standard to drive your enterprise BCM program?

Want to guess what percentage had adopted a standard?  1%? 25%? 50%?  Less than 10% of the 140 had adopted a standard—a dreadfully low number.



New PwC global defense map illustrates priorities and postures

National defense organisations are facing complex and dynamic security challenges, ranging from a myriad of modern terrorist threats to tough spending cuts.

PwC’s global defense experts have assessed the impact of these challenges on 60 countries worldwide - including the top 50 defense-spending nations – and mapped the results.

The security challenges confronting national defense organisations are both complex and dynamic. Countries now face a range of threats that vary greatly in both scope and scale. Long-standing threats from neighbouring nations, such as the enduring tensions on the Korean peninsula and Indian subcontinent, are the types of traditional challenges that most national defense organisations have been organised to confront.

But, says Tom Modly, PwC’s Global Defense Network Leader:

“Major terrorist attacks such as those of September 11, 2001 and, more recent attacks on schoolchildren in Kenya and French satirical writers in Paris, typify the emergent challenges of ‘asymmetrical adversaries’. These groups possess destructive capabilities that are more difficult to detect and defeat through conventional means – and thinking.”

The other challenge highlighted by the PwC report - Global Defense Perspectives: Mapping prioritisation and posture in a challenging world – is the downward pressure on defense spending. Faced with growing government costs, sluggish economic growth and weariness after a decade of operations in Afghanistan and Iraq, defense budgets for many NATO allies and partners have dropped substantially in recent years.

Many of these countries continue to struggle to modernise outdated systems and maintain readiness as the security environment facing ministries is both uncertain and increasingly complex.

PwC’s approach for developing these global defense perspectives looks at recent defense spending trends and the major investment, institutional, structural and strategic priorities and challenges impacting these nations.

Using the insights and unique perspective of PwC’s Global Government Defense Network, we have measured and plotted these 60 nations against two dimensions: how they prioritise defense spending, and how they position or ‘posture’ themselves in the global security environment.

Global Power Projectors: The US and Russia.  These two nations alone spend greater than 3% of their GDP on defense and are very engaged in security efforts around the world.  They seek to use their military capabilities and security posture to influence global security issues.  Their defense organisations are very large and mature.  Although not necessarily nimble, they are capable of deploying forces, managing large complex procurements, and, at least in the case of the US, conducting large scale operations around the world.

Constrained Force Projectors: Australia, China, France, and the UK.  These four nations spend between 1.5% and 3% of their GDP on defense and are very engaged in security efforts around the world. These nations are among the world’s largest defense-spending nations, who prioritise high-end defense capabilities and have militaries that can deploy or exert their influence in most regions of the world.  They can selectively deploy forces to key regions around the world, manufacture and integrate complex weapons systems - but, with the exception of China, are also aggressively looking for ways to reduce costs and increase efficiencies in these times of significant fiscal constraints.

Coalition Partners: Canada, Germany, Italy, the Netherlands, Spain, and Sweden.  These six nations spend less than 1.5% of their GDP on defense, but they are very engaged in security efforts around the world.  Despite modest budgets, they readily contribute to UN peacekeeping and multilateral coalition operations around the world.  Except for Sweden, these nations are all NATO allies who have a strong track record of operating together.  They deploy forces regularly, but have struggled in recent years to maintain readiness as defense budgets have shrunk.

Robust Self-Defenders: Angola, Algeria, Bahrain, Colombia, Iraq, Israel, Kuwait, Morocco, Oman, Pakistan, Saudi Arabia, Singapore, Syria, Ukraine, and the United Arab Emirates (UAE).  These 15 nations spend more than 3% of their GDP on defense, but are more focused on security efforts in their immediate geographic region.  Because of internal or immediate regional threats, they have developed military capabilities centred on directly and aggressively countering those challenges.  They generally do not get involved in UN or multilateral coalition operations except when addressing nearby security concerns.

Threat-Focused Self-Defenders: Chile, Croatia, Egypt, Estonia, Greece, India, Iran, Malaysia, Portugal, Poland, Qatar, South Korea, Taiwan, Thailand, Turkey, and Vietnam.  These sixteen nations spend between 1.5% and 3% of their GDP on defense and are more focused on security efforts in their immediate geographic area.  Many of these nations participate in UN peacekeeping or multilateral coalition operations to help build relationships with allies and partners, but the focus of their spending is on countering a specific threat emanating from a single nation.

Territorial Security Seekers: Argentina, Austria, Belgium, Brazil, Denmark, Finland, Indonesia, Japan, Latvia, Lithuania, Mexico, New Zealand, Norway, the Philippines, South Africa, Switzerland, and Venezuela.  These 17 nations spend less than 1.5% of their GDP on defense and are more focused on security efforts in their immediate geographic area.  These nations spend modestly on defense, but many contribute to UN peacekeeping operations or multilateral coalition operations in some fashion.

PwC analysts conclude there are a number of lessons to be learned when looking at the Defense Map:

  • Expect movement: There is a tremendous amount of growth in the lower half of the Map where 31 nations have seen significant recent growth that is expected to continue in the next five years.
  • Global players under severe pressure:  The preponderance of nations that have a globally-oriented security posture are also under significant budgetary pressure as evidenced by the fact that spending in 10 of the 12 nations in the top half of the Map has declined or remained flat in the past five years. 
  • Cost-cutting dominates strategy:  Institutional reform efforts focused on cost-cutting are a major emphasis for most of the nations that have a globally-oriented security posture.  Global Power Projectors (such as the United States), Constrained Force Projectors (like the UK), and Coalition Partners (such as Canada) are all undertaking initiatives to increase efficiencies and reduce overhead or personnel expenses.
  • A focus on institutional and national capacity:  Furthermore, institutional reform efforts focused on capacity building are a priority principally in those nations in the lower half of the Map.  Robust Self-Defenders (such as the UAE), Threat-Focused Self-Defenders (like India), and Territorial Self-Defenders (such as Japan) are less focused on efficiencies than on building the institutional capabilities of their respective ministries of defense.
  • Collaboration in Procurement:  Cooperative efforts are particularly prevalent among the nations that had lower levels of defense prioritisation.  Cooperative procurement efforts, for example, are much more prevalent among the Coalition Partners and the Territorial Self-Defenders than with the Robust Self-Defenders. 
  • Asymmetric threats and cyber ‘insecurity’ gains prominence:  Regardless of where a nation currently resides on the Map, vulnerabilities to asymmetric threats such as terrorism and cyber crime/attack are driving investment in new, non-traditional defensive and offensive capabilities.  Such investment has profound implications for the nature of the future forces with respect to recruiting, training, career development and retention.

Concludes PwC’s Tom Modly:

“The depth and breadth of these current security challenges leave defense leaders with some tough choices. What institutional reform initiatives are needed to posture their ministries for the future?  What procurement priorities are needed for the coming years?  How do they build the necessary organisational agility in order to address a wider range of threats such as strategic nuclear, conventional, terror, and cyber? And how should they cooperate with allies and partners around the world?”


  1. The nations that the PwC report and mapping focuses on are: Americas: Argentina, Brazil, Canada, Colombia, Chile, Mexico, US, Venezuela. Europe: Austria, Belgium, Croatia, Denmark, Estonia, Finland, France, Germany, Greece, Italy, Latvia, Lithuania, the Netherlands, Norway, Poland, Portugal, Russia, Spain, Sweden, Switzerland, Turkey, Ukraine, UK. Middle East and Africa: Algeria, Angola, Bahrain, Egypt, Iran, Iraq, Israel, Kuwait, Morocco, Oman, Qatar, Saudi Arabia, South Africa, Syria, United Arab Emirates. Asia Pacific: Australia, China, India, Indonesia, Japan, Malaysia, New Zealand, Pakistan, Philippines, Singapore, South Korea, Taiwan, Thailand, Vietnam.

    In addition, due to their regional and global significance, other countries have been selected, including: Ukraine, Baltic States, Bahrain, Philippines, Qatar and Vietnam.

  2. Methodology: PwC developed a template to analyse specific national defense characteristics.  This template had two principal sections that focused on: Recent, current, and anticipated defense spending trends; and the major investment, institutional, structural and strategic priorities and challenges impacting these nations. We used the insights of PwC's Global Government Defense Network as well as publicly available resources to populate the templates and develop insights on the progress made by these defense organisations in adapting to their respective challenges. Using this information, we then measured these nations against two metrics: 1) Prioritisation - how they prioritise defense spending, and 2) Posture - how they posture themselves in the global security environment. 
  3. The full report, Global Defense Perspectives: Mapping prioritisation and posture in a challenging world, can be downloaded from here.
  4. At PwC, our purpose is to build trust in society and solve important problems. We’re a network of firms in 157 countries with more than 208,000 people who are committed to delivering quality in assurance, advisory and tax services. Find out more and tell us what matters to you by visiting us at www.pwc.com.

    PwC refers to the PwC network and/or one or more of its member firms, each of which is a separate legal entity. Please see www.pwc.com/structure for further details.

    ©2015 PwC. All rights reserved

Two earthquakes within a few days may seem like a lot for one region of a country to withstand, but in the case of the insurance and reinsurance industry early indications suggest the impact of the Japan quakes will be manageable.

A magnitude 6.5 earthquake struck the Kumamoto prefecture of Japan last Thursday. Just 28 hours later a magnitude 7.3 quake struck the region. So far, Japanese officials have confirmed 46 fatalities and more than 1,000 people injured.

Reports appear to show significant property damage in the region, but it’s too soon to know what insured losses will be.



Backup is broken. Anyone who has had to work with enterprise backup knows this to be the case. Gartner, in fact, published a report six years ago titled, “Best Practices for Addressing the Broken State of Backup.” One would think that, given how awful the state of backup was in 2010, the situation would have improved by now. But, unfortunately, the broken state of backup is actually getting worse, not better.

For example, a global survey of CIOs and IT pros in 2015 showed that, on average, an organization experienced 15 unplanned downtime events that year. This compares to the average of 13 reported in 2014. In addition, unplanned mission-critical application downtime length grew 36 percent from 1.4 hours to 1.9 hours year over year, and non-mission-critical application downtime length grew 45 percent from 4 hours to 5.8 hours. These outages cost the average organization $16 million a year, up 60 percent over 2014.

The central problem is that backup cannot provide what organizations really need: availability. After all, when a mission-critical application is down or the file server has crashed beyond repair, it’s cold comfort to have a backup of the data somewhere across town on a tape in an underground vault. The enterprise is undergoing a digital transformation in which executives, employees, customers and partners expect to have 24/7/365 access to data.



Wednesday, 20 April 2016 00:00

Preparing for the Disruption of the IoT

The Internet of Things (IoT) promises to cause disruption in almost every industry. Companies need to examine how they can take advantage of connected products and services and plan for the significantly increased data workloads that will likely come with the deployment of sensor-enabled products. However, an expected surge in product innovation also means that companies should carefully consider how they will deal with the potential rise of new, more agile competitors whose business models will be based primarily on IoT products and services. Here are some points about the IoT I’ve been discussing with colleagues that organizations may want to consider.



Company's Dynamic Deception Platform ups the Anti for Attackers Looking to Breach OpenStack Networks

FREMONT, Calif. – Attivo Networks®, the award-winning leader in deception for cyber security threat detection, today announced that its deception platform architecture now integrates with OpenStack, providing organizations with efficient and effective detection of inside-the-network threats for virtualized software defined data centers (SDDC). Building upon its current Dynamic Deception Platform, Attivo now offers support for OpenStack environments in addition to its current support for VMware EXSi, Amazon Web Services, SCADA, and user networks.

Tweet This: @AttivoNetworks ups the ante for attackers looking to #breach @OpenStack networks

Data center virtualization has achieved large-scale deployment based on its inherent cost and performance benefits; however with a SDDC there also comes a challenge of decreased visibility, which raises the risk of a network intrusion. With the explosion of server-server or what is also referred to as east-west traffic, traditional IDS/IPS and sandboxing solutions become unsuitable given their cost and the large amounts of resources and personnel required to manage and deploy these devices. A new, scalable approach is needed for increased network visibility and the ability to promptly and reliably detect the growing number of complex and malicious attacks targeted at the high value information stored within a data center.

The highly scalable Attivo Deception Platform is designed for friction-less deployment and efficient inside-the-data center threat detection for environments of large server workloads and widespread adoption of virtual machines (VMs) that are typically seen in data center and cloud networks. Using dynamic deception based on highly efficient luring techniques, Attivo does not rely on the compute and log intensive processes of monitoring traffic for known signatures or attack patterns. Instead, deception and decoys are used to lure in and deceive an attacker into revealing themself. These deception techniques are a highly effective approach for promptly detecting zero day, stolen credential, insider, and ransomware attacks. Once the attacker is engaged with the BOTsink® engagement server, the attack and its lateral movement can be studied, alerts raised, and forensics provided for prompt incident response. Integrations with firewall, NAC, SIEM and other security solutions are also available to automate the process and improve the time to remediation.

With the majority of a company's data passing through their data center it is critical to have clear visibility into threats that are inside the network. The Attivo solution integrated with the OpenStack Platform will support deployment of engagement VMs in production subnets.

Attivo is also working with Criterion Networks and its Criterion SDCloud Platform to implement security groups and quarantine infected VM's in Criterion SDDC solution architecture, which will contain an attacker from moving to other VMs to maintain persistence.

"With large scale SDDC comes challenges in security both in terms of visibility and detection of attackers," said Srinivas Vegesna, CEO, Criterion Networks. "The integration between Criterion Networks' quarantine solution with Attivo Networks provides organizations real-time detection of threats and the ability to promptly quarantine infected VMs. This is critical to protect against cyber threats, which can rapidly spread within a data center environment. This integrated solution will also be available on Criterion SDCloud platform so that our customers can see the solution in action instantly."

"Cloud and software defined data centers are growing at unprecedented rates and there is an unquestionable need for visibility into and the protection of these environments," said Tushar Kothari, CEO of Attivo Networks. "Attivo provides an inside the network breach detection solution that is massively scalable, complementary and seamless to integrate with OpenStack installations. The combination creates a powerful defense against attacks."

"By 2019, OpenStack enterprise deployments will grow tenfold, up from just hundreds of production deployments, due to increased maturity and growing ecosystem support," notes Gartner analyst Matthew Cheung in his February 5, 2016 report, "Competitive Landscape: OpenStack Distributions and Support Service Market."

Attivo Networks is also a member of the OpenStack Foundation and will be participating at the OpenStack Summit in Austin, TX on April 25-29, 2016. Attivo will be speaking on April 28th at 11:50 AM and will be providing an overview on deception benefits based on customer use cases.


Criterion Networks: www.criterionnetworks.com

Attivo Networks: www.attivonetworks.com

About Attivo Networks
Attivo Networks® is the leader in dynamic deception technology, which in real-time detects intrusions inside user networks, data centers, cloud, and SCADA environments before the data is breached. Leveraging high-interaction deception techniques, the Attivo BOTsink® Solution lures BOTs and APTs to reveal themselves, without generating false positives. Designed for efficiency, there are no dependencies on signatures, database look up or heavy computation to detect and defend against cyber threats. Attivo solutions capture full forensics and provide the threat intelligence to shut down current and protect against future attacks. www.attivonetworks.com

Follow Attivo Networks: Twitter and LinkedIn

About OpenStack
OpenStack is a cloud operating system that controls large pools of compute, storage, and networking resources throughout a datacenter, all managed through a dashboard that gives administrators control while empowering their users to provision resources through a web interface. The OpenStack Mission is to produce the ubiquitous Open Source Cloud Computing platform that will meet the needs of public and private clouds regardless of size, by being simple to implement and massively scalable. OpenStack is open source, openly designed, openly developed by an open community.


Netskope Achieves Agility, Availability, and Performance Across Its Network With Infoblox DDI

SANTA CLARA, Calif. –  Infoblox Inc. (NYSE: BLOX), the network control company, today announced that Netskope has deployed Infoblox solutions to achieve its mission of delivering secure cloud-based services to its customers. Through an integrated DNS, DHCP, and IP address management (DDI) solution utilizing Infoblox Grid™ technology, Netskope has the scalability and control to ensure always-on, automated network functionality with minimal operational support. Infoblox provides an essential component for Netskope's popular service where its customers' end users, on average, access over 750 applications and cannot afford disruptions to their business processes.

Netskope is a leader in enabling organizations to safely employ cloud-based applications while protecting sensitive data, which is crucial in a world where almost 50 percent of data lives in cloud applications outside the reach of traditional network security. Netskope delivers a cloud-based service that enables IT organizations to manage usage of sanctioned and unsanctioned cloud applications, protect sensitive data, and ensure compliance in real time on any device, including native applications and mobile devices, on-premises or remote. 

As with other cloud service providers, Netskope's ongoing business challenges include providing an optimal customer experience. This not only includes overcoming concerns about operational efficiency and risk management, but also providing a high degree of visibility into network operations that take place outside the corporate firewall. Delivering on these lofty expectations required Netskope to find a centralized solution for managing core network services, including configuration changes and updates, as well as providing a high degree of redundancy throughout the network.

To meet these goals of agility, availability, and performance, Netskope integrated the patented Infoblox Grid technology into its network infrastructure. The Infoblox solution enables Netskope to link distributed appliances throughout the network using a central database to ensure consistent information availability, as well as to provide a centralized view of network data for simplified monitoring and reporting.

"Because we provide services to businesses of all sizes, flexibility in our network is of utmost importance," says Abhay Kulkarni, vice president of engineering and operations at Netskope. "Infoblox gives us the flexibility to maximize our resources and the tools to see exactly what is happening across our network at any moment. In turn, that allows us to focus on the customers and give them granular control of their applications and data -- all with a fraction of the operational headcount required by other enterprises with similar network scale. In fact, with the automation Infoblox provides, our two-person operations team can launch new services and spin up new machines, while monitoring workloads and adding capacity, without the need for manual intervention."

The Infoblox solution has improved productivity for Netskope's distributed network by monitoring conditions before additional resources are necessary, adding capacity automatically to support new product launches, and reducing the manpower needed for daily operations. It also redistributes traffic in the event of a data center outage, preventing service interruptions. Its visibility functions deliver crucial insight into subnets to allow scaling for enterprise clients, and Anycast support increases performance by routing users to the nearest data center.

"For companies providing software as a service, their network is their livelihood," said Ashish Gupta, chief marketing officer at Infoblox. "Our goal is to give businesses like Netskope deep visibility into current network conditions and the agility to fulfill moment-to-moment needs without compromising availability or performance. As in the case of Netskope, this provides an important competitive advantage in today's 24/7 marketplace."

Read this case study and more at https://www.infoblox.com/resources/case-studies.

About Infoblox

Infoblox (NYSE: BLOX) delivers critical network services that protect Domain Name System (DNS) infrastructure, automate cloud deployments, and increase the reliability of enterprise and service provider networks around the world. As the industry leader in DNS, DHCP, and IP address management, the category known as DDI, Infoblox (www.infoblox.com) reduces the risk and complexity of networking.


SUREedge® Now Supports DR of Containers Across All Popular Platforms

SANTA CLARA, CA--(Marketwired - April 20, 2016) - Sureline Systems, a leader in cloud migration, datacenter consolidation and Disaster Recovery solutions, is pleased to announce the addition of support of containers to its flagship SUREedge product line. Containers running on all popular platforms are supported along with physical servers and virtual machines so that the entire infrastructure can be migrated in case of a disaster. Additionally, Containers along with data volumes can also be migrated and restored in Google Container Engine managed by Kubernetes.

Containers are becoming an integral part of a new generation of software solutions, and can now be protected in the same way as existing applications, using SUREedge. "With many applications being a mix of containers and traditional virtual machines or physical servers running parts of the complete application, it is important to have a single solution that works with the entire application and ensures it is protected at a remote site or in a Cloud and can be up and running quickly in case of a disaster," said Kuldeep Nagarkar, VP of Engineering at Sureline Systems.

"Sureline Systems is taking a lead in cloud migration aligning product capabilities with business requirements around performance and security when migrating to the cloud," according to a 451 report by Agatha Poon.

SUREdge supports all of the standard Linux environments where containers are developed and deployed, including Docker containers 1.10.2 running on Ubuntu 12.04, Ubuntu 14.04, CentOS 7 and RHEL 7.

About Sureline Systems:
Sureline Systems, is headquartered in Santa Clara, CA, with offices in Japan, India and Dubai. Sureline's award winning SUREedge® is a proven enterprise-class software platform for Cloud Migration, Cloud Disaster Recovery, Datacenter Consolidation and Application Mobility.

Sureline Systems has announced partnerships with Google Cloud Platform (GCP), Century Link Cloud, Nutanix, Tintri and several large Channel Partners. SUREedge reduces risk through secure data transmission, efficient data movement, and reliable movement of the entire application including containers, and its data. It is easy to deploy and manage through a single UI, with automated discovery, no agents to install, and is completely non-disruptive. SUREedge is source and destination agnostic working from any physical server, any hypervisor, any cloud, and any storage including hyperconverged to any other environment. Customers worldwide trust SUREedge® to meet their application mobility, disaster recovery, business continuity and application mobility objectives. For further information, please visit the Sureline website at www.surelinesystems.com.

Red Herring Top 100; Red Herring Global 100, CIO Review Top 100 Twitter: @SurelineSystems

LinkedIn: https://www.linkedin.com/company/sureline-systems

DURHAM, NC – Principled Technologies (PT) worked hands-on to assess the big data processing capabilities of the Scalable Modular Server DX2000 from NEC powered by Intel. The DX2000 found patterns in a sample data set in about two minutes and cut analysis time in half when PT added server nodes. With this compact, scalable solution, companies could combat datacenter sprawl and quickly find the moneymaking facts in their big data.

To learn more about how the DX2000 from NEC can help businesses use big data, read the full report at http://facts.pt/p7bReD, see the infographic at http://facts.pt/LtsWnv, and watch the video at http://facts.pt/aBpWKh.

About Principled Technologies, Inc.

Principled Technologies, Inc. is the leading provider of technology marketing and learning & development services.

Principled Technologies, Inc. is located in Durham, North Carolina, USA. For more information, please visit www.principledtechnologies.com.

Image Available: http://www.marketwire.com/library/MwGo/2016/4/19/11G094086/Images/DX2000_scalability_0416-489f5b81a1ef8b1282b83264f51c3936.jpg
Image Available: http://www.marketwire.com/library/MwGo/2016/4/19/11G094086/Images/DX2000_scalability_Infographic_0416-bdfc4b7f298fb69b837b85d0870e1d70.jpg
Image Available: http://www.marketwire.com/library/MwGo/2016/4/19/11G094086/Images/DX2000_scalability_video_0416-63404c84151584f4b526b998f9e71ca8.jpg

CHARLOTTE, NC – Velocity Technology Solutions, a global leader in enterprise application cloud managed services, has announced the release of the Velocity Cloud Application Management Platform™ (VCAMP™) 6.1, the only cloud management platform specifically engineered to simplify the complexity of managing enterprise applications in the cloud.

Velocity's Cloud Application Management Platform provides intelligent software to deploy and manage enterprise applications in a private, public or hybrid cloud environment. The unified software platform is ideal for enterprise IT users and managed service providers to deliver improved flexibility and service quality to business entities and application end users. VCAMP 6.1 includes unique features such as one-click application provisioning and decommissioning, a comprehensive service catalog for enterprise applications and PaaS, orchestration across multiple cloud end-points, real-time visibility of service entitlements and SLAs, as well as advanced analytics that enable dynamic scaling of application resources based on user interaction and usage patterns.

"We designed VCAMP to address the inherent challenges with managing enterprise applications such as SAP, Oracle, JDE, Infor and Kronos in cloud infrastructures. Our experience managing these applications over the past two decades, leveraging our advanced analytics, are key elements of the intellectual property embedded in VCAMP," said Sal Jamil, Executive Vice President of Technology for Velocity Technology Solutions.

VCAMP has already been deployed for over half of Velocity's customer environments; Velocity's operational teams support and manage customer environments using specific VCAMP modules in the three platform tiers -- Service Management, Service Optimization, and Zoom Analytics. VCAMP is now available for customers, strategic business partners, and re-sellers who can utilize the platform for delivering managed services to their enterprise customers.

"VCAMP technology presents significant potential for mid to large sized enterprises seeking to utilize a hybrid cloud solution for their critical applications," added Paul Mockenhaupt, Senior Vice President, Innovation and Development. "VCAMP provides IT organizations with the unique ability to provision and manage enterprise applications and associated bolt-ons across public and private clouds from a single screen, improving their efficiency and application management capabilities. As IT systems continue to grow in complexity, this platform will simplify the process of managing an ecosystem of diverse applications in any cloud."

About Velocity Technology Solutions

Velocity Technology Solutions (www.VelocityCloud.com), a global enterprise application cloud services leader since 2003, delivers secure, fully managed environments spanning virtual private, public and hybrid clouds. The company's portfolio includes application-focused cloud managed services, professional services, with data analytics and optimization solutions. Velocity's expertise in managing leading ERP applications, leveraging the patent pending Velocity Cloud Application Management Platform, gives customers required availability, security, visibility and control at a reduced total cost of ownership. Velocity is headquartered in Charlotte, NC, with facilities in North America, Europe and Asia. Velocity is a portfolio company of Silver Lake Sumeru, a global leader with private equity investments in leading, growth-oriented technology companies. For additional information on the firm and its entire portfolio, visit www.silverlake.com.