Press Releases (1431)
Livermore, CA – Rob Alston, CEO of Access, announced today the company’s Dec. 28, 2012, acquisition of FileSafe, Inc. in Jacksonville, Florida and the records management division of Sheeler Moving and Storage in Ventura, California. Both companies are located within markets currently served by Access. FileSafe clients’ inventories will be relocated to Access’ current facilities in Jacksonville while Access will maintain the record center location currently housing Sheeler’s records division.
As the largest privately-held records and information management services provider in the United States, Access serves 27 markets across the nation and can offer a single-provider advantage to clients operating in those same markets. Access also has a presence in Costa Rica.
“We welcome our newest clients in Ventura and in Jacksonville,” said Alston. “We know they will benefit from the increased capacities, broader capabilities and nationwide footprint Access represents.”
Peter Berndt, Access’ Jacksonville General Manager, will orchestrate and oversee the FileSafe relocation while Access’ Vice President for the Southwestern Region, Robert Cummings, will manage the integration of the Sheeler acquisition.
About Access (www.InformationProtected.com)
Access is the largest privately-held records and information management (RIM) services provider in the United States. A trusted partner to clients spanning multiple industries and markets throughout the country, Access’ complete suite of services includes records management, data protection (electronic computer media), secure destruction, and digital formatting services. The valuable business services Access provides allow clients to focus on their core businesses while reducing the costs and risks associated with document retention, management and final disposition. Access is backed by growth equity investor Summit Partners.
About Summit Partners (www.SummitPartners.com)
Summit Partners is a growth equity firm that invests in rapidly growing companies. Founded in 1984, Summit has raised nearly $15 billion in capital and provides equity and credit for growth, recapitalizations, and management buyouts. Summit has invested in more than 350 companies globally in technology, healthcare and other growth industries. These companies have completed more than 125 public offerings, and in excess of 130 have been acquired through strategic mergers and sales. Summit Partners has offices in Boston, Palo Alto, London and Mumbai. Summit’s notable business services investments include Bartlett Holdings, Central Security Group, EMED Co. and LiveOffice Holdings.
Herndon, VA -- COOP Systems, the developer of the most advanced Business Continuity Management (BCM) software package in the world, has published an exciting new White Paper on Automating ISO 22301:2102, the international Business Continuity Management System standard first published in May 2012. It can be downloaded at www.coop-systems.com/downloads.
"After a long history of most BCM programs doing the minimum, using manual tools and proprietary methodologies, there is now a clear choice. Substandard approaches can always continue, exposing an organization to unnecessary risk. Alternatively, the globally accepted ISO 22301 standard details a quality, globally accepted, auditable process for BCM," said Chris Alvord, CEO of COOP Systems. "Like all ISO standards, it is the result of the work of experts and is blessed by 160+ countries. It is the best path for an organization wanting to benefit from global acceptance, good practices, and management experience."
The White Paper explores six major program management areas where automation support is exceptionally helpful for the new standard, as follows:
BIA and RA analysis (8.2.2, 8.2.3)
Resources and planning (8.3.2, 8.4.4)
Testing and exercise management (8.5)
Incident response and communications (8.4.2, 8.4.3)
Audit reporting (9.2)
Corrective actions (10.1)
There are additional areas where automation would be helpful and efficient, especially in the area of program management formation.
ABOUT COOP SYSTEMS - - Scalable, Flexible, Reliable, Proven
COOP Systems, headquartered in Herndon, VA, is a leading provider of myCOOP, the BCM solution used by a growing list of clients globally. With a proven reputation for reliability and ability to support clients' existing BCM practices, COOP Systems' clients believe myCOOP is simply the best BCM software in the world.
Livermore, CA – Rob Alston, CEO of Access, announced today the company’s Dec. 28, 2012, acquisition of FileSafe, Inc. in Jacksonville, Florida and the records management division of Sheeler Moving and Storage in Ventura, California. Both companies are located within markets currently served by Access. FileSafe clients’ inventories will be relocated to Access’ current facilities in Jacksonville while Access will maintain the record center location currently housing Sheeler’s records division. As the largest privately-held records and information management services provider in the United States, Access serves 27 markets across the nation and can offer a single-provider advantage to clients operating in those same markets. Access also has a presence in Costa Rica. “We welcome our newest clients in Ventura and in Jacksonville,” said Alston. “We know they will benefit from the increased capacities, broader capabilities and nationwide footprint Access represents.” Peter Berndt, Access’ Jacksonville General Manager, will orchestrate and oversee the FileSafe relocation while Access’ Vice President for the Southwestern Region, Robert Cummings, will manage the integration of the Sheeler acquisition. About Access (www.InformationProtected.com) Access is the largest privately-held records and information management (RIM) services provider in the United States. A trusted partner to clients spanning multiple industries and markets throughout the country, Access’ complete suite of services includes records management, data protection (electronic computer media), secure destruction, and digital formatting services. The valuable business services Access provides allow clients to focus on their core businesses while reducing the costs and risks associated with document retention, management and final disposition. Access is backed by growth equity investor Summit Partners. About Summit Partners (www.SummitPartners.com) Summit Partners is a growth equity firm that invests in rapidly growing companies. Founded in 1984, Summit has raised nearly $15 billion in capital and provides equity and credit for growth, recapitalizations, and management buyouts. Summit has invested in more than 350 companies globally in technology, healthcare and other growth industries. These companies have completed more than 125 public offerings, and in excess of 130 have been acquired through strategic mergers and sales. Summit Partners has offices in Boston, Palo Alto, London and Mumbai. Summit’s notable business services investments include Bartlett Holdings, Central Security Group, EMED Co. and LiveOffice Holdings.
MINNEAPOLIS – Kroll Ontrack, the leading provider of , ediscovery and information management, today announced the launch of Ontrack® Eraser 4.0, a feature-rich enterprise data eraser solution, complete with expanded drive wiping capacity, VMware® eraser capabilities and new reporting and security management functionality.
“A 2012 Internet Security Threat Report¹ revealed that 234 million identities were exposed in 2011 because of breaches, reiterating the importance of effective, secure data wiping,” said Abhik Mitra, product manager, Kroll Ontrack. “Whether you are a corporation that needs to recycle a large number of drives that are end-of-life or re-deploy a set of machines, Ontrack Eraser 4.0 can handle the specifications of your environment and the scope of your job – all while ensuring proper protocol is being maintained.”
Specific features and functionality of Ontrack Eraser 4.0 include:
· VMware Drive Wiping Capabilities: The ability to delete data from VMware machines, ensuring corporations are securely deleting data from their virtual environments and therefore addressing the complete scope of their IT environment.
· Enhanced System Performance: The enhanced capacity to perform over 200 concurrent device erasures to ensure the largest enterprise jobs are handled efficiently.
· Enhanced System Reporting: New reports that denote the hard drive make, serial number and model number, as well as the wipe algorithm applied to accomplish the job, providing corporations with the appropriate records for recycling centers and compliance requests.
· Security and Central Management Capabilities: New system authentication functionality to validate the erasure is conducted in the correct manner by the appropriate individual.
Data wiping is fundamental to complying with laws and regulations regarding data retention and privacy and reducing the risk of security breaches. The advanced capabilities of Ontrack Eraser 4.0 enable enterprises to build a fully automated, efficient and cost-effective wipe process for a large number of devices. In addition to the enterprise software, Kroll Ontrack also has a mobile erasure service to help corporations address their erasure needs and meet their compliance and security requirements.
“At Alternativ Data, we needed a robust software tool that could handle wiping 18,000 used drives annually, so we could resell those drives afterwards,” said Ståle Hagen-Arnsen, logistics and security manager, Alternativ Data. “Ontrack Eraser does just that for us. It enables us to wipe a very large number of drives efficiently, while also providing detailed reports that confirm which drives were wiped and when.”
For more information about Ontrack Eraser 4.0, visit http://www.krollontrack.com/information-management/data-erasure-solutions/.
About Kroll Ontrack Inc.
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, backup, search, analyze, and produce data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data backup, data destruction, electronic discovery and document review. Kroll Ontrack is a subsidiary of Altegrity, an industry-leading provider of information solutions. For more information about Kroll Ontrack and its offerings please visit: www.krollontrack.com.
Emerson Network Power Outlines Importance of Rack Systems as Strategic Assets for System Uptime and Data Center AvailabilityWritten by Mike McClain, Senior Web Designer & Site Manager
Columbus, Ohio – Emerson Network Power, a business of Emerson (NYSE:EMR) and a global leader in maximizing availability, capacity and efficiency of critical infrastructure, today released a white paper discussing rack enclosure trends and best practices. As rack densities have increased along with overall facility power requirements, taller, wider and deeper racks are required to effectively accommodate these changes.
The white paper, titled “Data Center Rack Systems Key to Business-Critical Continuity,” takes a close look at the need for data center planners to be flexible and adaptable in rack selection.
“Taking a best practices approach when specifying racks – planning and investing to meet today’s needs with the thought of expansion tomorrow – helps to ensure that data center needs won’t readily outgrow capabilities,” said Ron Bednar, director, solutions technologies, Emerson Network Power. “Flexibility allows a data center to respond quickly to changing business needs. And while the racks themselves need to adapt to the room in which they are housed, the data center must be able to adapt to individual rack environments and zones.”
The Emerson Network Power white paper notes that racks are now available that improve equipment installation speed via tool-less, “slide in, slide out” procedures. Taller racks take advantage of the data center’s headroom, while rack depth has increased to accommodate equipment. Side breathing needs have increased rack width to meet new manufacturers’ specifications and to enhance equipment performance and life through hot-aisle/cold-aisle arrangements.
Also discussed are:
- Increased weight capacities up to 3,000 lbs.
- 19-inch rails for easier equipment installation and adjustment
- Door configurations that increase air flow and are reversible to ease maintenance
- Split-locking side panels to simplify installation
- Cable-ready roof tops and cable ingress/egress
- Rack grounding
- Rack stability and security
- Rack accessories, including cable and airflow management and IT equipment support
About Emerson Network Power
Emerson Network Power, a business of Emerson (NYSE:EMR), delivers software, hardware and services that maximize availability, capacity and efficiency for data centers, healthcare and industrial facilities. A trusted industry leader in smart infrastructure technologies, Emerson Network Power provides innovative data center infrastructure management solutions that bridge the gap between IT and facility management and deliver efficiency and uncompromised availability regardless of capacity demands. Our solutions are supported globally by local Emerson Network Power service technicians. Learn more about Emerson Network Power products and services at http://www.emersonnetworkpower.com/">www.EmersonNetworkPower.com.
Hamburg - Enterprise cloud synchronization provider TeamDrive is warning about the serious security risks being run by companies that ban document and file sharing services, such as Google Drive and Dropbox, without providing an encryption-based alternative.
According to the 1,300 respondents to a survey conducted by storage firm Nasuni, one in five employees is using Dropbox. What is more worrying is that 49 percent of users ignore corporate policies and use the service regardless, according to the Shadow IT in the Enterprise report.
This implies that the perceived benefits of having an unmanaged, unmonitored and unsupported element in business IT overrides any sense of responsibility. TeamDrive recommends accepting the irresistible trend by embracing it within a secure and manageable system such as its own.
Departments most likely to use file synchronizing services are IT, sales, finance and engineering - the latter three being sectors likely to have access to extremely business-sensitive data. Users around these departments are just as likely to be senior management as rank and file workers.
In May 2012, IBM was so concerned about the growing use of cloud file synchronization services that it banned its staff from using Dropbox and Apple's iCloud. It is likely that others will follow suit but the growing use of Bring Your Own Device (BYOD) strategies makes enforcement difficult, if not impossible.
Many of the services available seem to be secure because they use encryption between the user and the service but this protection is stripped away at the receiving end and the files are stored by the service provider in the clear. If a hacker, or even a rogue employee of the storage firm, gains access to a cloud drive, it could be costly if sensitive documents are being passed through the service.
Even when documents are encrypted at rest in the cloud, the providers, such as Dropbox, use a single key held in their system to unlock files as they are accessed by the document's owners or their sanctioned colleagues.
TeamDrive provides an individual service where a separate encryption key is generated for each user and stored on the client device. This means that TeamDrive cannot access the contents of any information stored on its systems and, if any files were stolen, a hacker would only have useless files encrypted to a 256-bit standard. The files are only available in the clear on the client devices and not anywhere in the cloud, giving true end to end security.
It is the service, not the cloud provider that is the attraction. Even if a ban on one provider's product is adhered to, staff would turn somewhere else. It is better to provide a secure system, like TeamDrive, to bring the renegades back into the security of the fold.
Leading Information Security consultancy, MWR InfoSecurity, has released Mercury v2.0 today, Friday 14th December. MWR are building on the success of their tool Mercury v1.1 which is the first and only security testing framework that allows for dynamic analysis of apps running on Android devices.
The power of Mercury was demonstrated by a team from MWR Labs, the company’s research arm, when they used the tool to win the Pwn2Own competition for Android at EUSecWest in September this year.
Tyrone Erasmus, creator of Mercury, said: “Mercury allows Android developers and security researchers to investigate the Android environment to identify security vulnerabilities. The v2.0 release introduces a number of significant new features and many important changes under the bonnet.”
He added: “We have improved the usability and want to push out this new version to allow more people to explore the Android platform with ease.”
One of the new features is the Infrastructure Mode - it is a new way to use Mercury where the Android device can phone home to a central server which allows Mercury to traverse common network security equipment such as firewalls. This new feature is an improvement on Mercury v1.1 because users can now connect to an Android device without knowing its IP address.
Daniel Bradberry, Head of Security Tools Development at MWR, said: “The Infrastructure Mode is a significant new feature which allows security researchers to build real world attack scenarios and test how devices may be used to compromise corporate environments. This is particularly important given the rise in BYOD strategies.”
Mercury v2.0 provides support for more devices, covering over 99% of those active in the market. Support has been extended back to Android 2.1 (Eclair) and all later versions. The release also introduces an improved User Interface which has replaced multiple levels of menus with a single prompt that gives access to all of Mercury’s functionality; this makes it faster and easier to perform an assessment.
Daniel Bradberry added: “The key is we have made it simpler. We have tried to improve the interface by drawing on the shells we use on a daily basis; this should make it more comfortable for people when they first start using Mercury.”
Additionally, Mercury v2.0 provides very easy access to allow users to write code and execute it directly on the device without altering the existing software. This improves the ability to extend Mercury’s functionality and provides the user with the opportunity to dig deeper than before.
Erasmus said: “The development of Mercury v2.0 has been enhanced by the substantial amount of feedback we have received from the community and the comments and suggestions we have been provided with as a result of the beta testing.”
Mercury v2.0 is free and available to download from today at mwr.to/mercury – Daniel Bradberry and Tyrone Erasmus will also be tweeting useful hints and tips on how to use and get the most out of the tool throughout the release day from @droidhg.
MetricStream IT GRC Solutions Witness Rapid Adoption as Companies Seek to Integrate Bottom-Up IT Control Processes with Top-Down Risk IntelligenceWritten by Mike McClain, Senior Web Designer & Site Manager
PALO ALTO, Calif. -- In today's increasingly virtualized, mobile, and cloudy world, Chief Information Officers (CIOs) and Chief Information Security Officers (CISOs) are confronted with complex challenges around information security, big data management, and compliance with regulations such as SOX, PCI DSS, HIPAA, NERC, FISMA, and ISO 27001. The traditional approach of managing these requirements in multiple silos and systems is not only inefficient and expensive, but also leads to redundancies and conflicts. Today, organizations seek to rationalize and harmonize their IT GRC processes, while also providing top-level visibility into enterprise IT risk and compliance data that can help determine areas of concern, and enable management to make quick, actionable decisions based on sound data points.
MetricStream provides a comprehensive suite of IT GRC solutions that aggregate and unify IT risk and information security and compliance data from across the hyper-extended enterprise. The solutions also help add business context to the data, as well as provide strong analytics capabilities to support mature, risk-oriented security programs.
The MetricStream solutions integrate with various applications such as those for identity management, asset management, Security Information and Event Management (SIEM), threat and vulnerability assessment, intrusion detection and prevention, and security feeds to consolidate data related to information security, and technology risks. Powerful dashboards present a real-time, top-level view of this information. The solution also facilitates a robust workflow-based approach to IT audit management and remediation management.
MetricStream IT GRC Solutions were recently reviewed by IDC, a leading provider of global IT research and advice, in its report - "MetricStream: Comprehensive Solutions for IT Governance, Risk, and Compliance." The report highlights MetricStream's "strong intellectual property (IP) portfolio around GRC," its "strong portfolio of IT GRC products that address end-to-end customer requirements," and its "strong partnership with various technology vendors in the security, smart grid, network management, operations, and asset management spaces." The report also highlights MetricStream's "strong IT GRC capabilities around cloud and virtualized environments."
Mayur Sahni, Research Manager, Services at IDC Asia/Pacific says, "Compliance requirements today are non-negotiable, and it's imperative for enterprises to implement a structured, organization-wide approach to IT GRC. MetricStream has a broad set of technologies not only to enforce and implement IT controls, but also to collect and harvest the information required to manage risk and demonstrate governance."
MetricStream IT GRC solutions provide integration capabilities for IT security, cloud, infrastructure, General Computer Controls (GCC), and business application controls. It simplifies compliance across IT regulations, standards, and frameworks by supporting automated monitoring and reporting of IT risk and control effectiveness and provides comprehensive content for meeting compliance challenges, including over 5,000+ IT control statements from over 800+ authority documents through a partnership with UCF, which helps organizations harmonize on the smallest possible set of IT controls to meet all their compliance requirements. The solutions also provide robust IT audit management capabilities, streamlines the IT audit and compliance process, and enable multiple stakeholders to gain visibility into the status of these processes and their results. IT control or compliance issues that arise are automatically routed through a systematic process of investigation and remediation.
With MetricStream's acquisition of vPanorama cloud GRC technology from TBD Networks, the company is able to provide solutions that allow its customers to seamlessly manage risks, regulatory compliance challenges, privacy requirements, security threats, and performance metrics across the cloud & virtualized infrastructure. The technology has augmented MetricStream's IT GRC solutions by providing granular visibility and control over security configuration assessments, continuous controls monitoring, risk management, and threat and vulnerability management. It helps minimize inefficiencies, while enhancing the reliability and performance of the cloud infrastructure.
MetricStream's robust functionality has attracted marquee customers across industry segments, which include some of the largest and most respected companies in social media and Internet information, banking and financial services, healthcare, manufacturing, energy, and retail.
"IT organizations have focused solely on a bottom-up approach so far implementing granular IT controls based on vulnerability scans, patch, and configuration control data. This approach results in a lot of data but little actionable intelligence," said Vasant Balasubramanian, Vice President of Product Management at MetricStream. "MetricStream combines bottom-up data with a top-down approach and over-arching analytics that correlate information risk, security, compliance, and business issues to provide actionable risk intelligence. Furthermore, with MetricStream's recent acquisition of vPanorama technology, we provide the unique capability of bringing top-down risk intelligence and IT GRC controls to the cloud. We also help enhance business value by closely aligning IT investments with organizational strategy and corporate objectives."
 IDC, MetricStream: Comprehensive Solutions for IT Governance, Risk, and Compliance, Doc #IN2672604U, July 2012
MetricStream is a market leader in Enterprise-wide Governance, Risk, Compliance (GRC) and Quality Management Solutions for global corporations. MetricStream solutions are used by leading corporations such as UBS, P&G, Constellation Energy, Pfizer, Philips, BAE Systems, Twitter, SanDisk, Cummins and Sonic Automotive in diverse industries such as Financial Services, Healthcare, Life Sciences, Energy and Utilities, Food, Retail, CPG, Government, Hi-tech and Manufacturing to manage their risk management, quality processes, regulatory and industry-mandated compliance and corporate governance initiatives, as well as several million compliance professionals worldwide via the www.ComplianceOnline.com portal. MetricStream is headquartered in Palo Alto, California and can be reached at www.metricstream.com.
Virtualization and data encryption were the biggest data recovery challenges for businesses globally in 2012Written by Mike McClain, Senior Web Designer & Site Manager
MINNEAPOLIS – The rise of mobile devices in the workplace and widespread adoption of virtualization drove an increase in data recovery requests globally in 2012, according to Kroll Ontrack, a leading provider of data recovery, information management, and ediscovery products and services. The race to reduce the cost of solid state drives (SSDs) will further fuel adoption and even higher volumes of data recovery requests in 2013.
Due to well-recognized cost and flexibility benefits, small- to medium-sized businesses, in particular, adopted virtual environments in 2012. With an increase in adoption came an increase in data loss from these environments. Specifically, Ontrack Data Recovery engineers at Kroll Ontrack saw a 10 percent increase in user errors, such as administrators deleting virtual drives by mistake.
Encryption proved to be another data recovery challenge this year. As devices with hardware-based encryption became more widespread because of faster processing speeds, the use of software-based encryption decreased. Included as a standard feature, manufacturers shipped external hard disk drives (HDDs) with the encryption functionality activated. Users were often unaware that their hardware encryption was active, instead believing the HDD to simply be password protected. While encrypted drives are more secure, encryption adds an extra layer of complexity and makes it a more painstaking task to recover lost data.
2012: Top Three Witnessed Data Recovery Challenges
2013: Top Three Predicted Data Recovery Challenges
Growing use of mobile devices (tablets, smartphones, laptops) in the workplace (BYOD)
Greater use of solid state drives in business computing
Virtualized environments, particularly in small- to medium-sized enterprises
Adoption of more mobile platforms, such as Microsoft Surface™ and Microsoft Office 365™
Encryption on hardware devices replacing software encryption
Migration to new platforms, such as Windows® 8, Microsoft SharePoint® 2013 and Windows Server® 2013
Beyond virtualization and encryption, mobile devices are also impacting data recovery trends. Kroll Ontrack experienced an influx in mobile device data recovery requests in 2012 – in line with the bring your own device (BYOD) to work trend. Specifically, the ratio went from 50 percent desktop-sized hard drives (3.5 inch format) and 50 percent laptop-sized hard drives (2.5 inch or smaller format) in 2010, to 20 percent desktop-sized drives and 80 percent laptop-sized drives, which also includes external memory, tablets and phones, in 2012.
Data recovery requests handled by Kroll Ontrack
Desktop-sized Hard Disk Drives
3.5 inch format
Laptop-sized Hard Disk Drives
2.5 inch format or smaller
(includes laptops, tablets, phones and external hard disk drives)
“In addition to the BYOD phenomenon this year, we saw a significant increase in the use of SSDs within laptops and PCs, as well as more external HDDs,” said Todd Johnson, vice president of operations, Kroll Ontrack. “This trend introduced new areas of risk to businesses and consumers alike. SSDs are more complex devices to recover from than traditional hard drives, but the use of personal external hard drives brings extra risks associated with lost or failing devices that are themselves not backed-up properly.”
2013 predictions: SSDs, mobile and migration
Looking forward, Kroll Ontrack predicts that SSDs will continue to cause individual users and businesses data recovery issues in 2013. The complexity of how data is stored on SSDs makes data recovery highly specialized and time consuming. A single SSD recovery can be as complex as a RAID recovery with eight, 16 or even 32 drives.
”SSDs are a newer technology, and very few data recovery providers have the ability to handle the RAID and SSD layers required to put the data together in the event of a failure,” said Jeff Pederson, manager of data recovery operations, Kroll Ontrack. “Recovery requires specialized tools and software, and usually a significant investment in R&D, as data is stored in a different way on each drive. When evaluating SSDs against traditional hard disks, organizations need to make sure that they take into consideration the possibility of data loss and the subsequent need for a more time-consuming data recovery.”
The ubiquity of mobile devices will also continue to cause challenges in 2013, especially since new mobile platforms, such as Microsoft Surface and Microsoft Office 365, will drive further use of tablets at work. Organizations will need to find ways to accommodate this trend in a secure environment, with both data recovery and data destruction playing a key role in planning.
Migration to new IT platforms can also cause challenges for corporations, who may lose vital data as part of the process if they fail to back up their data properly in the interim. One platform to be aware of is Windows Server 2012, formerly Windows Server 8, which will incorporate a new file system. Windows 2012 also comes with a new file system (ReFS) and a new storage management system (Storage Spaces).
“Technology continues to improve in terms of the value it adds to organizations, but the flipside is that data can be at risk during the transition phase if companies do not maintain effective backups,” added Johnson. “Our role is to anticipate the challenges new technologies cause. We already have our developers researching all of these new systems in order to add support for them to our tools.”
About Kroll Ontrack Inc.
Kroll Ontrack provides technology-driven services and software to help legal, corporate and government entities as well as consumers manage, recover, backup, search, analyze, produce and present data efficiently and cost-effectively. In addition to its award-winning suite of software, Kroll Ontrack provides data recovery, data backup, data destruction, electronic discovery and document review. Kroll Ontrack is a subsidiary of Altegrity, an industry-leading provider of information solutions. For more information about Kroll Ontrack and its offerings please visit: www.krollontrack.com.
SAN FRANCISCO, Calif. – 365 Main Inc., a leading data center developer and operator, has purchased 16 data centers located across the U.S. from Equinix, Inc. Chris Dolan, CEO and Jamie McGrath, COO, led the purchase along with financial partners Crosslink Capital, Housatonic Partners and Brightwood Capital.
The data centers span the U.S., located in Buffalo, Chicago, Cleveland, Dallas, Detroit, Indianapolis, Nashville, New York, Philadelphia, Phoenix, Pittsburg, San Jose, Seattle, St. Louis, Tampa and Washington D.C. Key employees from these sites joined 365 Main to facilitate a smooth transition and ongoing support for local customers.
According to Chris Dolan, 365 Main CEO, "365 Main now has a national reach with a local focus. In the last decade we earned the reputation of proven data center expertise coupled with high touch customer service, satisfaction and retention. With these newly acquired data centers, we plan to bring that level of service to small businesses up to large enterprises."
About 365 Main Inc.
365 Main was founded by industry leaders Chris Dolan and James McGrath in 2002. They began with a single data center based in San Francisco and grew to five facilities nationwide with 39 megawatts of power under management. These data centers were developed and certified to the highest industry standards and compliance requirements. Today, 365 Main operates 16 data centers nationwide, having earned an industry reputation for high touch customer service, satisfaction and retention. With its years of experience in modern data center development and operations, 365 Main has proven its capability of managing customers with a broad range of requirements ranging from retail colocation to build to suit. 365 Main is a privately held company based in San Francisco. Its financial partners include Housatonic Partners, Crosslink Capital and Brightwood Capital. More information is available at 415-901-5700 or www.365main.com. ###
AUSTIN, Texas — Caringo, the leading provider of object storage software, today announced that it has completed its most successful year ever. Caringo attributes their success to the overall strength of the object storage marketplace, which is being driven by emerging industry trends in the fields of cloud storage, research, healthcare, government, life sciences, email and file archiving.
With the increased adoption of public and private cloud services and the need for cost effective yet accessible storage that provides rapid performance on commodity hardware, Caringo is ideally positioned to capitalize on the growth in object storage as it moves from enabling technology for early adopters to the future of storage for the mass market. This past year saw Caringo increase the number of petabytes sold by more than 10 times over 2011. In 2012, the largest customer started with 15 petabytes, and multiple customers purchased over 10 petabytes each. Additionally, its largest OEM partner sold over 35 petabytes.
"2012 will be looked upon as the tipping point for the object storage market and our successful growth this year can be directly attributed to our position as a leader within that space," said Mark Goros, CEO of Caringo. "The largest storage providers in the industry today understand that only object storage can satisfy the demands for cloud services and Big Data. This is a trend that’s accelerating, and our accomplishments this year have set the stage for continued large magnitude growth in 2013."
In addition to record setting growth, 2012 was also the year that Caringo extended its technological leadership position within this space with several new advancements including:
• Any number of 9s data durability and optimized footprint with CAStor® 6.0 and Elastic Content Protection (ECP), which provides the storage industry's most-comprehensive data protection functionality, allowing organizations to meet any storage SLA, optimize deployment footprint and enhance data accessibility regardless of content size and capacity. ECP uses replication and erasure coding and leverages Caringo's automated health monitoring and recovery to optimize responsiveness as capacity grows.
• Robust insight and control over content with Caringo Indexer, adding real-time NoSQL indexing and the ability to perform ad-hoc searches of content within CAStor by name or metadata. The Indexer enhances the CAStor API adding the ability to perform granular searches and can be accessed directly or through the included Indexer Portal, a web-based application that provides instant, graphical insight and control over content stored in a CAStor cluster.
• A complete cloud storage service enablement stack with Caringo CloudScaler™, software that extends the Caringo Object Storage Platform, providing everything needed to deliver a highly scalable, cloud storage service with secure metering and monitoring, in a private or public configuration.
• Virtual Machine editions of the entire Caringo product suite, enabling organizations to rapidly deploy and scale the market leading object storage solution.
• Unrivaled support for the open cloud with the seamless integration of CAStor as an enterprise-ready object store for Apache CloudStack 4.0 to enable cost-effective, rapidly scalable storage for any cloud storage use through CloudStack; as well as the introduction of CAStor for OpenStack, which gives organization an option to include a more-robust, fully supported object store while still benefitting from the progress of the OpenStack community.
Based on current growth, pipeline and overall object storage benefit awareness, 2013 is primed to grow at an even faster pace. Cloud storage and Big Data will continue to drive the need for object storage. While the consumerization of IT and the velocity of file-based data creation will drive organizations to object storage’s always accessible, scalable and efficient characteristics.
Caringo software gives enterprises everything they need to deliver private cloud storage or cloud storage as a service. The solution combines efficient object storage technology with elastic content protection, intelligent and automatic distribution and centralized management under a global namespace on your choice of commodity hardware. The result is a secure and compliant unified pool of storage that can expand or contract capacity and object count to meet any operational or business requirements – all at cloud economics and secure in your datacenter.