Click here to close now.


Java IoT Authors: Pat Romanski, Elizabeth White, Liz McMillan, SmartBear Blog, Gary Kaiser

News Feed Item

Global Information Security Products And Services Industry

NEW YORK, March 14, 2013 /PRNewswire/ -- announces that a new market research report is available in its catalogue:

Global Information Security Products And Services Industry

This report analyzes the worldwide markets for Information Security Products and Services in US$ Million by the following Product Segments: Information Security Software, Information Security Hardware, and Information Security Services. The sub-segments analyzed under the Information Security Software segment include Identity & Access Management (Public Key Infrastructure (PKI), Web Single Sign-On, Host Single Sign-On, User Provisioning, Directory Services, Legacy Authorization, Advanced Authentication), Secure Content Management (Antivirus, Web Filtering, Messaging Security), Intrusion Detection/Prevention, Security & Vulnerability Management, Firewall/VPN Software, and Other Security Software. The sub-segments analyzed under the Information Security Hardware segment include Hardware Authentication (Tokens, Smart Cards, Biometrics), Threat Management Security Appliances, Firewall/VPN Hardware/Appliances, SCM Appliances, Intrusion Detection/Prevention Appliances, and Unified Threat Management Appliances. The sub-Product Segments: analyzed under the Information Security Services segment include Implementation Services, Consulting Services, Management Services, Education & Training, and Response Services. The report provides separate comprehensive analytics for the US, Canada, Japan, Europe, Asia-Pacific, Latin America, and Rest of World. Annual estimates and forecasts are provided for the period 2010 through 2018. A six-year historic analysis is also provided for these markets.The report profiles 385 companies including many key and niche players such as ActivIdentity Corporation, AuthenTec, Check Point Software, Technologies Ltd., Cisco Systems Inc., Clearswift Ltd., CA Technologies, Inc., Crossbeam Systems, Inc., Entrust, Inc., F-Secure Corporation, Fortinet Inc., Fujitsu Ltd., Hewlett-Packard Development Company, L.P, IBM Corporation, Juniper Networks, Inc., Keyware Technologies NV, Lumension Security, Inc., McAfee, Inc., Norman ASA, Novell, Inc., Ping Identity Corp., Proofpoint, Inc., EMC Corporation, SafeNet, Inc., Co., Ltd., SonicWALL, Inc., Sophos Plc, Utimaco Safeware AG, Stonesoft Corporation, Symantec Corporation, Technology Nexus AB, Thales Group, Trend Micro Incorporated, Trustwave, Verizon Business, WatchGuard Technologies, Inc., and WebSense, Inc. Leading Global Information Security Research Institutes Center for Education and Research in Information- Assurance and Security, and Information Security Group. Market data and analytics are derived from primary and secondary research. Company profiles are primarily based upon search engine sources in the public domain.

Study Reliability and Reporting Limitations I-1
Disclaimers I-2
Data Interpretation & Reporting Level I-2
Quantitative Techniques & Analytics I-3
Product Definitions and Scope of Study I-3
Information Security Software I-4
Identity & Access Management (I&AM) I-5
Public Key Infrastructure (PKI) I-5
Web Single Sign-On I-5
Host Single Sign-On I-5
User Provisioning I-5
Directory Services I-5
Legacy Authorization I-6
Advanced Authentication I-6
Secure Content Management (SCM) I-6
Antivirus Software I-6
Web/Content Filtering I-6
Messaging Security (E-mail Scanning) I-6
Intrusion Detection/Prevention (IDP) I-6
Security & Vulnerability Management I-7
Firewall/VPN Software I-7
Other Security Software I-7
Information Security Hardware I-7
Hardware Authentication I-7
Tokens I-7
Smart Cards I-8
Biometrics I-8
Threat Management Security Appliances I-8
Firewall/VPN Appliances I-8
SCM Appliances I-8
Intrusion Detection/Prevention Appliances I-8
Unified Threat Management (UTM) Appliances I-8
Information Security Services I-9
Consulting Services I-9
Education and Training Services I-9
Implementation Services I-9
Management Services I-9
Response Services I-9


Corporate Information Assets - Vulnerable as Ever II-1
Growing Instances of IT Security Breaches - A Serious Cause
for Concern II-2
Types of Internal IT Security Breaches in Organizations -
Ranked in the Order of Frequency of Occurrence II-3
Types of External Security Breaches in Organizations - Ranked
in the Order of Frequency of Occurrence II-3
A Look at Common Security Threats for Enterprise Information
Assets II-3
Damages Caused by Security Breaches II-4
Proprietary Information Destruction II-4
Disruption in Systems Performance II-4
Data/Application Damage or Corruption II-5
Information Security - High on Priority List for Enterprises II-5
Factors Affecting Implementation of Information Security
Solutions by Enterprises Worldwide - Ranked in Order of
Influence II-6
Network Security - Keeping Security Threats at Bay II-6
Enterprise Endpoint Security Grows in Prominence II-7
General Trends Underpinning the Endpoint Security Solutions
Market II-7
Server Security Concerns Driving Demand for Server Security
Solutions II-8
Impact of Recession in Retrospect II-9
Outlook II-10
Emerging Markets - Hotspots for Growth II-10
Growing Use of Technology Brings Security Concerns for
Enterprises, Opportunities for Information Security Vendors II-10
Growing Use of Internet as a Business Platform Demands Robust
Information Security Solutions II-10
Threat from Social Networking Sites to Drive Demand for
Information Security Solutions II-11
Security Risks Posed by Virtualization & Cloud Computing to
Fuel Security Solutions Market II-11
Growing Use of Smartphones Boosts Demand for Smartphone
Security Solutions Market II-13
Smartphone Convenience at the Cost of Information Security II-13
Table 1: Worldwide Worker Population (2008 & 2011):
Breakdown of Number of Workers (in Millions) by Nature of
Work - Mobile & Non Mobile (includes corresponding
Graph/Chart) II-14

Table 2: Worldwide Mobile Worker Population (2008 & 2011):
Breakdown of Number of Mobile Workers (in Millions) by
Nature of Work - Mobile Office, Mobile Non-Office, Mobile
Home Based (includes corresponding Graph/Chart) II-14

Table 3: Worldwide Mobile Workforce (2011): Percentage
Share Breakdown of Number of Mobile Workers by Region
(includes corresponding Graph/Chart) II-14
Enabling Smartphone Security - An Urgent Need II-15
Industry Still Underprepared to Tackle Security Concerns II-15
Smartphone Security Solutions II-15
Regulatory Compliance Requirements Drives Demand for
Information Security Solutions II-16
Dearth of Trained Staff and Infrastructure to Drive Demand for
Information Security II-16
IP4 to IPv6 to Boost Adoption of Cyber Security Solutions and
Services II-16
Growth in Sophisticated & Compound Security Threats to Drive
Demand for Enhanced Security Solutions II-17
Rapid Expansion in Security Technologies II-18
Hosted Security Services: Growing in Demand II-18
Increased use of Open Source Tools II-19
Growing Significance of Application-Level Security II-19
VoIP Security for Expanding VoIP II-19
Security for Converged Data and Voice Environments II-19
Growing Commoditization of Security Products II-20
Financial Services - A Key End Use Market for Information
Security Solutions II-20
Information Security in Financial Services Sector II-20
Industry Wise Implementation of Information Security Policy -
Industries Ranked by Level of Implementation II-20
Major External & Internal Breaches in Financial Services Sector II-21
Top Security Initiatives by Sector II-21
Advanced Solutions Gain Traction II-21
Regulatory Compliance: A High Priority for Financial
Institutions II-22
Growing Significance of Data Loss Prevention II-22
Lack of Alignment Between Business Objectives and Security II-22
Convergence Gains Strength II-22
Key Barriers in Information Security for Financial Services
Sector II-23
Increasing Adoption of Digital Health Records to Drive Demand
for IT Security Solutions in Healthcare Sector II-23
Production Systems too Bitten by Security Bug II-23
Key Issues and Challenges II-24
Major Restraints to Efficient Information Security in
Enterprises Worldwide II-24
Inadequate Budget - Main Constraint against Effective
Information Security II-24
External Threats More Recognized than Internal Threats II-25
Organizations are Essentially Reactive Rather than Proactive II-25
Lack of Comprehensive Security Solutions II-25

Information Security Software II-26
Identity & Access Management Solutions II-26
Table 4: Global Identity and Access Management Market
(2009): Percentage Share Breakdown of Revenues by Operating
Environment (includes corresponding Graph/Chart) II-27
A Key Security Initiative for Enterprises II-27
An Integral Part of Corporate Strategy II-28
Growing Prominence of Identity-as-a- Service (IaaS) II-28
Cloud Services Boost IaaS II-29
Concerns with IaaS Implementation II-29
Lack of Unified Standards - A Major Concern II-29
Problems Confronting SaaS Implementation II-29
PKI (Public Key Infrastructure) II-29
Legacy Authorization - A Declining Market II-30
Secure Content Management Grows in Prominence II-30
Antivirus Accounts for Lion's Share II-30
Low Footprint Anti-Virus Grow in Prominence among SMBs II-30
Top 10 Anti Virus Software Solutions for 2011 II-31
Web Filtering II-31
Increasing Web 2.0 & E-Mail Threats Boost Demand for Content
Filtering Products II-31
Messaging Security (E-mail Scanning) - A Promising Market II-32
Security & Vulnerability Management II-32
Table 5: Global Vulnerability Management Market (2011):
Percentage Share Breakdown of Revenues for Device
Vulnerability Assessment and Application Scanners (includes
corresponding Graph/Chart) II-33
Small and Mid-Sized Businesses - An Under- Penetrated
Segment for SVM II-33
Diverse Delivery Systems for SVM Products II-33
Firewall/VPN Software II-33
Encryption for Data Protection II-33
Information Security Hardware II-34
Hardware Authentication - A Trivial but Embryonic Market II-34
Tokens & Smart Cards II-34
Smart Cards Market - A Review II-34
Telecom Sector to Remain Major Driver of Smart Card Demand II-35
Market Overview of Authentication Tokens II-35
Hardware vs. Software Tokens II-35
Demand for Software-Based Authentication Tokens on the Rise II-36
Trends in Authentication Tokens Market II-36
Growing Use of Two-Factor Authentication II-36
Latest Development in Two Factor Authentication Security II-37
New Technologies II-37
Adaptive Authentication II-37
Near Field Communications II-37
New Form Factors II-37
Growing Prominence of Wireless Technology II-37
Biometrics II-38
Table 6: Global Biometrics Market (2011): Percentage Share
Breakdown of Revenues by Technology - Fingerprint
Technology, Facial Scan Technology, and Others (includes
corresponding Graph/Chart) II-38

Table 7: Global Biometrics Market By Application (2015P):
Percentage Share Breakdown of Revenues for Identity
Services, Logical Access, Physical Access, and Surveillance &
Monitoring (includes corresponding Graph/Chart) II-39
Rapid Growth of Biometric Surveillance II-39
Biometric Authentication - Key Issues II-39
Threat Management Security Appliances - Order of the Day II-39
Firewall/VPN Appliances II-39
VPN Market on an Upswing II-40
SSL VPN - A Nascent Market II-40
UTM Appliances - A Whip on Blended Security Threats II-40
Need for Simplifying Information Security Procedures - A
Business Case for UTM II-41
Increasing Fascination for UTM Appliances in Large Enterprises II-41
Shift from UTM to XTMs II-41
Integrated Security Suites Emerge as the Preferred Choice for
Information Security II-41
Information Security Services - Primary Revenue Contributor II-42

Information Security Market - Highly Competitive II-43
Consolidation Wave in Security Software Market II-43
Convergence of Product Portfolio - A Key Competitive Ploy II-43
Key Statistics II-44
Table 8: Leading Vendors in the Global Security Software
Market (2011): Percentage Share Breakdown of Revenues for
Symantec, McAfee, Trend Micro, IBM, CA, and Others (includes
corresponding Graph/Chart) II-44

Table 9: Global Identity and Access Management Market
(2011): Percentage Share Breakdown of Revenues by Leading
Players (includes corresponding Graph/Chart) II-44

Table 10: Worldwide Messaging Security Market (2011):
Percentage Share Breakdown of Revenue by leading Players
(includes corresponding Graph/Chart) II-44

Table 11: Global Security and Vulnerability Management
Market (2010): Percentage Share Breakdown of Revenue by
Leading Players (includes corresponding Graph/Chart) II-45

Table 12: Global Firewall Market (2010): Percentage Share
Breakdown of Revenue by Leading Players (includes
corresponding Graph/Chart) II-45

Table 13: Global Intrusion Detection/Prevention Market
(2011) - Percentage Share Breakdown of Revenues by Leading
Players (includes corresponding Graph/Chart) II-45

Table 14: Global Market for Unified Threat Management
(Q2-2010): Percentage Market Share Breakdown by Leading
Players (includes corresponding Graph/Chart) II-45

Information Security - An Introduction II-46
Organizational Security Strata II-46
Managing Information Security II-46
Measures to Ensure Information Security: II-47
Information Security Projects in Organizations - Ranked in
the Order of Relative Importance II-47

Information Security Software II-49
Identity & Access Management (I&AM) II-49
Key Functionalities of Identity & Access Management Solutions II-50
Authentication II-50
Authorization II-50
Administration II-50
PKI (Public Key Infrastructure) II-50
Benefits of PKI II-51
Glitches with PKI II-51
Single Sign-On (SSO) II-51
Web Single Sign-On II-52
Host Single Sign-On II-52
User Provisioning II-52
Directory Services II-52
Legacy Authorization II-52
Advanced Authentication II-52
Secure Content Management (SCM) II-53
Antivirus Software II-53
Web/Content Filtering II-54
Messaging Security (E-mail Scanning) II-54
Table 15: Principal Factors Affecting Installation of
Web/E-mail Monitoring in Organizations (includes
corresponding Graph/Chart) II-54
Intrusion Detection/Prevention (IDP) II-54
Security & Vulnerability Management II-55
Firewall/VPN II-56
Firewalls II-56
Major Firewall Types II-56
Packet Filter Firewall II-56
Stateful Packet Inspection Firewall II-57
Application Layer Gateways or Proxies II-57
Available Forms of Firewalls II-57
Software Firewalls II-57
Hardware Firewalls II-57
Virtual Private Networks (VPNs) II-57
Key Components of a VPN II-58
VPN Gateways II-58
Security Servers II-58
Keys II-58
Network II-58
Available Forms of VPN II-58
VPN Software II-58
VPN Hardware II-58
Types of VPN II-58
Remote-access VPN II-58
Site-to-Site VPN II-58
Technologies Supporting Delivery of VPN Services II-59
Internet Protocol Security (IPSec) II-59
Point-to-Point Tunneling Protocol (PPTP) II-59
Layer 2 Tunneling Protocol (L2TP) II-59
Secure Socket Layer (SSL) II-59
Multi Protocol Label Switching (MPLS) II-59
Firewall/VPN - The Need for Integration II-60
Encryption II-60
Other Security Software II-60
Information Security Hardware II-60
Hardware Authentication Products II-60
Tokens II-61
Smart Cards II-61
Biometrics II-61
Threat Management Security Appliances II-61
Firewall/VPN Appliances II-62
SCM Appliances II-62
Intrusion Detection/Prevention Appliances II-62
Intrusion Detection System (IDS) II-62
Types of IDS II-63
Intrusion Prevention System (IPS) II-63
Unified Threat Management (UTM) Appliances - The Viable
Solution II-63
Benefits of UTM Appliances II-63
Information Security Services II-64
Information Security Services Life Cycle II-64
Stages of Information Security Life Cycle II-64
Initiation II-64
Assessment II-64
Solution II-64
Implementation II-65
Operations II-65
Closeout II-65
Security Policy II-65
Program Policies II-65
Issue-Specific Policies II-65
System-Specific Policies II-65
Security Services Management Tools II-65
Metrics II-66
Service Agreements II-66
Types of Information Security Services II-66
Consulting Services II-66
Education and Training Services II-66
Implementation Services II-66
Management Services II-67
Response Services II-67
Types of Delivery Models II-67
Software Licenses II-67
Appliance Based Devices II-67
Hosted Services (Security- as- a-Service Solutions) II-68
Complete Outsourcing Models II-68
Hybrid Model II-68

CloudPassage Introduces Halo NetSec Security Solution for
Public Clouds II-69
Stonesoft Launches IPS-1302 for Encrypted Traffic Inspection
and Web II-69
IBM Releases Latest Security Software for Mobile Applications II-69
SafeNet Launches Enhanced Version of Sentinel Cloud II-70
Proofpoint Unveils Enhancements Proofpoint Enterprise Product
Portfolio II-71
Lumension Releases New Endpoint Management and Security Suite
v7.2 Integrated with Endpoint Integrity Service II-72
Norman Introduces New Malware Analyzer G2 Platform Version II-73
Norman Announces Improvements to Email Protection Solution II-73
Proofpoint Launches Proofpoint Android App and Mobile
Decryption App II-74
Fortinet® Launches a Range of Network Security Appliances II-74
Fortinet® Introduces FortiGate™-5101C and FortiGate™-3240C
Firewall Products II-75
Symantec Announces Updation of Backup Exec 3600 and NetBackup
5220 II-76
Symantec Releases Enterprise Mobile Enhancements II-77
McAfee Releases New Database Security Solution II-78
F-Secure Unveils Safe Anywhere II-78
Fujitsu Develops 5mm Sensor, World's Slimmest Sensor for
Biometric Authentication II-79
F-Secure Launches Server and Email Security Solution II-79
IBM Launches SmartCloud Foundation II-80
ActivIdentity Integrates CIV-Compliant Credential Management
System with Crescendo Card Platform II-81
Juniper Introduces Upgraded Mykonos Web Security Platform II-81
Juniper Launches Universal Access Solutions with ACX Series
Platforms II-82
Novell Launches ZENworks® 11 Support Pack 2 II-83
Norman Launches NSP System II-84
Proofpoint Launches Proofpoint Enterprise Governance II-84
SafeNet Launches White Box Cryptography II-85
SafeNet Launches eToken 3500 II-85
Trustwave Launches Innovative Managed Security Services II-86
Check Point Launches Check Point R75.40 II-87
Check Point Launches Check Point ThreatCloud II-88
Websense Launches Websense X10G II-88
Fortinet to Launch FortiDDoS Series II-89
ActivIdentity Unveils Enhancements to 4TRESS Authentication
Solution II-90
RSA Integrates KMIP Specification into RSA Data Protection
Manager Solution II-91
WatchGuard® Technologies Introduces WatchGuard XCSv series II-91
WatchGuard® Technologies Introduces WatchGuard XTM 25 and
WatchGuard XTM 26 UTM Appliances II-91
HP Introduces Thin Clients Featuring Windows Embedded Standard
7 WS7P SKU II-92
HP Introduces New Solutions for Converged Cloud Portfolio II-92
Grid Infocom Introduces Information Security Solutions and
Services Bundle for Mid-Sized Companies II-94
Okta Launches New Service to Offer Single Sign-on for All Web
Apps II-94
EdgeWave Launches New Messaging Security Suite II-95
Raytheon Launches SureView 6.6 for Information Protection II-95
Fox Technologies Introduces FoxT SOX Report Pack II-95
Check Point Launches R75, Latest Version of Network Security
Suite for Better Control, Visibility II-96
Sophos Introduces Mobile Control, SafeGuard Enterprise 5.60, &
Endpoint Security and Data Protection 9.7 Solutions II-97
Sophos Unveils Mobile Management Platform II-99
Symantec Launches Endpoint Protection 12 and Protection 2.0
Security Solutions II-100
Trustwave Launches MyIdentity II-100
Symantec Launches Encryption Solutions Specialization II-101
Norton Launches NortonLive Ultimate Help Desk Service II-102
Clearswift Launches SECURE Email Gateway 3.4 and SECURE Web
Gateway 2.5 II-103
Trustwave Launches an Innovative Suite of Web Security Solutions II-104
Trustwave Launches FIM Solution II-105
CA Technologies Introduces CA Service and Portfolio Management
Partner Solution Center II-105
Crossbeam Expands X-Series Security Platform II-105
Crossbeam Launches X50 II-106
Entrust Launches Entrust IdentityGuard 10.0 II-106
Entrust Launches Entrust IdentityGuard Mobile SDK II-107
CA Technologies Updates Advanced Authentication Cloud Security
Service II-108
Crossbeam Launches XOS 9.6 II-109
Trustwave Launches Apache Software License v2 II-110
Sophos Introduces Upgraded SafeGuard(R) Full-Disk Mac
Encryption Software (UK) II-111
McAfee Introduces Upgraded Security Management Solution II-111
RSA Introduces Upgraded Data Loss Prevention Suite II-112
WatchGuard Introduces the XTMv Series for Virtual Infrastructures II-113
F-Secure Introduces New Mobile Security Solutions II-113
Juniper Networks Introduces New Improvements for Pulse Mobile
Security II-114
Norman Launches Endpoint Protection 9 Information Security System II-115
Norman Enhances Direct Quarantine Email Security Solution II-115
Norman Unveils Upgraded Norman Network Protection Antimalware
Security Appliance II-116
Norman Launches Latest and Superior Security Appliance Version
4.0 II-116
Norman Launches Latest Edition Security Suite 9 Software II-117
RSA Introduces Automated Security Incident Management Solution II-117
Stonesoft Launches StoneGate Mass Security Solution II-118
Stonesoft Unveils AERT II-119
HID Global Rolls Out Certified PIV-I Service II-120
WatchGuard Introduces Next-Generation Firewall XTM 2050 II-121
F-Secure Launches Anti-Virus for Mac II-121
WatchGuard Introduces Security Appliance for Small Businesses II-121
Fortinet® Introduces FortiScan-VM™ and FortiGate-VM™ for
Citrix™ XenServer II-122
F-Secure Launches F-Secure Mobile Backup Solution II-123
Juniper Launches WLA532 II-123
Fortinet Launches FortiGate-600C and FortiGate-1000C II-124
Fortinet® Launches FortiClient II-125
Fortinet® Launches FortiAnalyzer 4.0MR3 and FortiManager 4.0MR3 II-126
Juniper Networks Launches Simply Connected Line of Security,
Switching and Wireless Products II-126
Juniper Networks Launches MAG Series Junos Pulse Gateways II-127
Juniper Introduces New Integrated Virtualization-Aware Solution II-127
Norman Unveils Malware Analyzer G2 Platform II-127
Novell Releases New Healthcare Solution Pack II-128
Norman Introduces New Advanced Free Malware Cleaner Version 2.1 II-129
Proofpoint Releases New Cloud-Based Compliance for Microsoft
Office 365 II-129
Proofpoint Introduces New Proofpoint Mobile, Security and
Compliance Platform for Mobile Enterprise II-130
SafeNet Introduces Ultra-Small Sentinel HASP HL MaxMicro
Licensing Dongle II-130
SafeNet Unveils KG-345 Ethernet Encryptor II-130
SafeNet Unveils SafeNet Authentication Manager 8.0 II-131
SafeNet Unveils MDeX System II-132
Check Point Introduces New Range of Security Appliances II-132
Symantec Expands Encryption Solution Range for Improved
Organizational Flexibility and Mobile Device Connectivity II-133
SafeNet Introduces New Mobile Device Credentialing Solution
for Secure Utilization of End-User Mobile Devices II-133
Sophos Introduces Advanced Anti-Virus Software for Mac OS X Lion II-134
Check Point® Launches New 3D Security Solution II-134
SafeNet Introduces Two Innovative Authentication Migration
Products II-134
Check Point Launches Check Point 61000, the Swiftest Security
Gateway Available II-134
Check Point Unveils ZoneAlarm SocialGuard, a Tool to Secure
Children from Facebook-based Threats II-136
ActivIdentity Launches 4TRESS Authentication Appliance FT2011 II-137
Fortinet to Launch FortiGate and FortiWiFi Series II-138

SHI, Solutionary Unveil ActiveGuard UTM Complete for Small to
Mid-Sized Businesses II-140
IBM to Launch InfoSphere Guardium 8 II-140
Portcullis Launches Threat Management Gateway II-141
Barracuda Networks Rolls Out NG Firewall II-142
NTT America Partners with Integralis to Introduce Superior
Information Security Solutions (USA) II-142
Cyberoam Introduces Virtual SSL VPN Device II-143
ConvergEx Introduces Management Access Service to Enable
Direct Access to Senior Executives II-144
St. Bernard Software Unveils Red Condor 7.3 Version II-144
CSI Launches Version 3 SSO v3.7.5 II-145
ActivIdentity Launches ActivID CMS Appliance II-146
WatchGuard Launches Innovative Authentication Updates for
Firewalls II-147
WatchGuard Launches WatchGuard SSL 560 II-147
ActivIdentity Launches 4TRESS Authentication Server 7.0 II-148
ActivIdentity Launches FIPS 201 Partner Program and F5 PAC
Solution with API II-148
ActivIdentity Unveils Appliance-based Model of ActivIdentity
4TRESSTM Authentication Server II-149
Fortinet Launches Fortigate-5001B Security Blade and
FortiSwitch-5003B Switching Blade II-150
Fortinet Unveils New E-Mail Security Solution II-151
Websense Launches Websense® Web Security Gateway Anywhere™ II-152
Norman Releases Norman Security PRO II-153
Fortinet Launches Two Novel Multi-Threat Security Systems with
Industry-Best Firewall and IPS Performance II-153
ActivIdentity Launches New PKI Secure Mobile Solution for
Smart Phones II-154
Check Point® Introduces New ZoneAlarm DataLock to Prevent
Unauthorized Access to Private Data II-154
Trustwave Debuts an Integrated Managed Security Portal II-154
Novell Introduces Novell Cloud Security Service II-155
Novell Cloud Security Service Extends WorkloadQ Profile II-156
Fortinet Releases New Multi-Threat Security Device FortGate-3040B II-156
Entrust Launches Secure E-mail Certificates II-157
Websense Launches DLP for Download II-157
Juniper Launches LN1000 II-158
Norman Unveils Norman Patch and Remediation Advanced
Vulnerability Solution II-159
Norman Launches Norman Network Protection 3.7 Security Solution II-159
SafeNet Launches Luna SA 5.0 HSM II-160
SafeNet Integrates ProtectServer HSM with DS3 Authentication
Toolkit II-161
Check Point Launches New Version of ZoneAlarm® Free Firewall II-162
F-Secure Security Gateway Launches E-mail Encryption Features II-163
Trustwave Introduces Powerful SSL Management Solution II-163
Entrust Launches IdentityGuard Mobile Solution II-164
Proofpoint Unveils an Advanced Version of SaaS Email Security
and DLP Platform in Europe II-164
Netgear Introduces Prosecure UTM5 II-165
WatchGuard Technologies Rolls Out WatchGuard XTM Multifunction
Security II-166
Nokia Siemens Networks and Juniper Networks Launch New
Security Solutions II-166
Netgear Introduces Prosecure UTM25 and UTM10 Security Solutions II-167
Global Secure Systems and QinetiQ Roll Out New Managed Digital
Security Service II-167
Netmagic Solutions and iViZ Security to Unveil New Security
Solutions II-167
SafeNet Introduces eSafe® SmartSuite™ Mail and Web Security
Gateway II-167
Splunk and GlassHouse Technologies Develop Enterprise Security
Suite II-168

Sterling Takes Over AISS II-169
Integralis Acquires Secode II-169
Edelman Launches Data Security & Privacy Group II-170
IBM Acquires Q1 Labs II-170
Quantum Telecom to Acquire Zebra Technologies II-171
QuadraMed Inks Contracts with Three Healthcare Organizations
for Identity Management Products II-171
Telaid Deploys NLSS Networking Gateway II-171
ValidSoft Inks Agreement with Utiba (Singapore) II-172
Vanguard Inks Agreement with 3CON and MSCS-X II-173
Trustwave Acquires M86 II-173
Red Bull Technology Selects HP 3PAR Storage Solution of HP II-174
HP Enterprise Services Bags Contract from Defense Information
Systems Agency II-174
Ping Identity and IIJ Global Solutions Enter into Partnership II-175
O'Neill Europe Chooses MobilePASS© Multi-Factor Authentication
Solution of SafeNet II-175
Crossbeam Systems Certifies R75.40 Security Gateway of Check
Point on X-Series Security Platforms II-176
CSC Inks Technology Collaboration Agreement with Ping Identity II-176
SafeNet Acquires Cryptocard II-177
RSA Join Forces with Zscaler to Develop Cloud Based solution
for Secure Identities II-177
Winvale Inks Partnership Agreement with Ping Identity II-177
Ping Identity Collaborates with Macnica Networks II-178
Dell Acquires SonicWALL II-178
Sophos Collaborates with Egnyte II-179
Verizon Enters into Strategic Alliance with Cellcrypt II-179
Bright House Networks Partners with Cisco II-180
Spirent and Crossbeam Partner for Real-time Network Security
Tests II-181
McAfee Acquires NitroSecurity II-181
Sophos Acquires Astaro II-182
ePlus Acquires NCC II-182
Intel Acquires McAfee II-183
The Attachmate Group Acquires Novell II-183
WISeKey and The Bancorp Ink Agreement to Set Up Joint Venture II-184
Sophos Inks Distribution Pact with D&H Distributing II-184
EMC Takes Over NetWitness II-185
BAE Systems Takes Over II-185
GCA Technology Services and Symplified Ink Partnership Agreement II-186
Quest Software Acquires BiTKOO II-186
MobileIron Inks Promotion Agreement with Box II-186
HID Inks Agreement with NXP II-187
VASCO Acquires A & A II-187
CSI Transitions Assets to UBM TechWeb II-188
Student Flights Selects Multicard to Offer Identity Management
Services II-188
Thales Collaborates with Imprivata II-189
GSA Grants Blanket Purchase Agreement to Telos II-189
Dell Acquires SecureWorks II-190
Xceedium Purchases Password Management Business of Irdeto II-190
VASCO Data Security Acquires DigiNotar to Enhance Market
Position and Product Offering II-191
Radiant Logic and ForgeRock Forge Partnership to Deliver Web
Access Management Software II-192
CyberPoint Inks Agreement with Integrita II-193
Clearswift Introduces Clearswift SECURE Email Gateway 3.3.1
and Clearswift SECURE Web Gateway 2.4 II-193
Sprint and McAfee Introduce McAfee® Mobile Security Technology , II-194
CA Technologies Introduces CA Virtual Placement and Balancing II-195
Ping Identity Forms Alliance with Symantec II-195
Fujitsu Laboratories Develops Biometric Authentication Technology II-196
Intel Selects McAfee to Develop Anti-theft Software for
Ultrabook Devices Microsoft to Incorporate RSA SecurID® in
Microsoft Windows® Active Directory® Federation Services 2.0 II-197
WatchGuard® Technologies Introduces XTMv Range of Virtual
Firewalls II-198
Security First and IBM Sign Joint Development Agreement for
Security System II-198
Lyceum Takes Over Clearswift II-198
Novell Commences Sale of Patents to CPTN Holdings II-199
Sophos Signs OEM Agreement with BlockMaster to Integrate Anti
Virus Technology into USB Drives II-199
Proofpoint Collaborates with VMware to Deliver Advanced
Security and Compliance for Zimbra® platform II-200
Entrust in Partnership with INTERPOL and EDAP Launches
INTERPOL Smartcard II-201
Good Technology Inks Delivery Agreement with ActivIdentity II-201
Nexus Inks Reseller Agreement with Accumulate II-202
ActivIdentity and Realsec Enter into Strategic Alliance Agreement II-203
ThreatMetrix Enters into Partnership with ActivIdentity II-203
IBM Acquires BigFix II-204
EDB ErgoGroup SYSteam Inks Agreement with Nexus II-204

Symantec to Take Over Gideon Technologies II-205
Symantec Takes Over the Security Business of VeriSign II-205
TrustWave Purchases Breach Security II-206
HP Acquires Fortify II-207
Stratsec Inks Agreement with Cybersecurity II-207
CCTV High-Tech Development Partners with Intertrust for
Technology Development II-207
Raytheon Purchases Trusted Computer Solutions II-208
Kaspersky Lab and IceWarp Enter into Technological Partnership II-208
Cyber-Ark Enters into a Partnership Agreement with Avecto II-208
ADTRAN Partners with NetVanta to Launch UTM Security System II-209
IQ Global Re-launches itself as SecureIQ II-209
CA Technologies Acquires Arcot II-210
Quest Unveils Acquisition of Völcker II-210
Cadre Inks Agreement with Quaresso II-211
Metro Bank Selects ActivIdentity4TRESSTM Authentication Server
of ActivIdentity II-211
idOnDemandTM Selects ActivIdentity ActivIDTM Card Management
System of ActivIdentity II-212
Fujitsu Laboratories Develops Cloud Information Gateway
Technology II-212
ASSA ABLOY to Acquire ActivIdentity II-212
Crossbeam Inks Agreement with McAfee II-213
Nexus Merges with PortWise II-213
Nexus Inks Agreement with Utimaco II-214
Vietnam Posts and Telecommunications Enters into Partnership
with F-Secure II-214
Stonesoft Signs Partnership Agreements with System Integrators
in Saudi Arabia II-214
Crossbeam Widens Strategic Partnership Agreement with Check Point II-214
HID Global Acquires ActivIdentity II-215
Stonesoft Inks Agreement with Teamsun II-215
Oracle Corporation Takes Over Sun Microsystems II-216
Trustwave Takes Over Intellitactics II-216
AuthenTec Acquires Embedded Security Solutions Division of
SafeNet II-216
Prolifics Takes Over Watson SCS II-217
ANXeBusiness Takes Over ETSec II-217
Cisco Acquires Rohati Systems II-217
EMC to Take Over Archer Technologies II-217
SHI International Enters into Partnership with Solutionary II-217
Torrid Networks and Beyond Security Enter Into Partnership II-218
CentraComm Selects eIQnetworks to Provide SecureVue II-218
WatchGuard® Technologies Takes Over BorderWare Technologies II-218
SafeNet Takes Over Assured Decisions II-218
Check Point® Acquires Nokia Security Appliance Business II-219
IBM Takes Over Guardium II-219
Cryptzone to Acquire AppGate Network Security II-219
M86 Security Takes Over Finjan II-220
Rapid7 Takes Over Metasploit II-220
Fortinet® Acquires Intellectual Property and Assets of Woven
Systems II-220
SecureWorks Acquires MSS Business of VeriSign II-220
McAfee Acquires Solidcore Systems II-221
SIFT and stratsec Merge II-221
SCM Microsystems Merges with Hirsch Electronics II-221
LogLogic Takes Over Exaprotect II-221
netForensics Acquires Cinxi Product Appliances from High Tower
Software II-222
Novell Takes over Fortefi's Technology Assets II-222
CA Takes Over Orchestria Corporation II-222
Ping Identity Acquires Sxip Access II-222
Aladdin Offers eToken NG-Flash to Zagrebacka Bank of Croatia II-223
Evidian Enters into Partnership with Gemalto II-223
Prism Microsystems Inks Contract with EWA-Canada II-224
HITRUST to Deploy nCircle HIT Security Solutions II-224
Bivio Networks Acquires FlowInspect SpA II-225
Department of Homeland Security and SecureInfo Renew Contract II-225
WISeKey Acquires from WISeKey ELA II-225
Mindware Signs Distributor Deal with Huawei Symantec II-226
LogRhythm and Sapphire Enters into Partnership II-226
Trend Micro to Acquire Third Brigade II-226
FutureSoft Renews Reseller Partnership with TigerRidge II-227
GigaTrust Enters into Agreement with Siemens PLM Software II-227
Q1 Labs Signs Distribution Agreement with VADition II-228
SRM Acquires InfoSec Associates II-228
Good Harbor Acquires TECHMARK Security II-228
Vector Capital Acquires Aladdin Knowledge Systems II-229
AIA Teams Up with Internet ISA II-229
NitroSecurity Acquires Assets of Chronicle Solutions II-229
Berkana and Waterfall Security Solutions Sign Reseller Agreement II-230
ManTech Completes Acquisition of DDK Technology Group II-230
Optenet and FishNet Security Partner to Provide SaaS Solutions II-231
SecureWorks Teams Up With ETEK International to Extend
Security Service Portfolio II-231
Integralis and TELEHOUSE America Announce Alliance II-231
Promisec and Internet Binat Announce New Information Security
Service II-232
LogRhythm forms Distribution Partnership with Excelerate Systems II-232
Motion Computing Partners with Sig-Tec II-232
QSGI Selects Fujitsu Mag EraSURE Data Degausser II-233
Agilex Technologies forms Partnership with HBGary II-233
Kaizen and RSA Join Forces for Information Security Solutions II-234
Cygate Partners with Sourcefire II-234 Collaborates with Symantec to Enhance Web Search Safety II-234
Workshare Enters into Partnership with ABBYY® II-234
DeviceLock and ATHENA in Distribution Agreement II-235
Q1 Labs Combines QRadar Network Security Management with
McAfee's ePO II-235
Authentic Response Enters into Partnership with RelevantView© II-235
Perimeter Enters into Partnership with Techmate II-236
elQnetworks Joins McAfee's Security Innovation Alliance Program II-236
ClearPoint Metrics Inks Partnership with Lumeta for Software
Integration II-236
Cobham to Take Over Argotek II-237
VidSys and Harris Stratex Networks Ink Partnership II-237
Cyber-Ark Finalizes Distribution Deal with DLT Solutions II-237
BigFix and Trend Micro in Licensing Agreement II-238
Trustwave Takes Over Mirage Networks II-238

ActivIdentity Corporation (USA) II-239
AuthenTec (USA) II-239
Check Point Software Technologies Ltd (Israel) II-239
Cisco Systems, Inc. (USA) II-240
Clearswift Ltd (UK) II-241
CA Technologies, Inc. (USA) II-241
Crossbeam Systems, Inc. (USA) II-242
Entrust, Inc. (USA) II-242
F-Secure Corporation (Finland) II-242
Fortinet, Inc. (USA) II-243
Fujitsu Ltd. (Japan) II-243
Hewlett-Packard Development Company, L.P. (USA) II-244
IBM Corporation (USA) II-244
Juniper Networks, Inc. (USA) II-245
Keyware Technologies NV (Belgium) II-245
Lumension Security, Inc. (USA) II-245
McAfee, Inc. (USA) II-245
Norman ASA (Norway) II-246
Novell, Inc. (USA) II-246
Ping Identity Corp. (USA) II-247
Proofpoint, Inc. (USA) II-247
EMC Corporation II-247
SafeNet, Inc. (USA) II-248 Co., Ltd. (Korea) II-248
SonicWALL, Inc. (USA) II-249
Sophos Plc (UK) II-249
Utimaco Safeware AG (Germany) II-250
Stonesoft Corporation (Finland) II-250
Symantec Corporation (USA) II-250
Technology Nexus AB (Sweden) II-251
Thales Group (France) II-251
Trend Micro Incorporated (Japan) II-252
Trustwave (USA) II-252
Verizon Business (USA) II-253
WatchGuard Technologies, Inc. (USA) II-253
WebSense, Inc. (USA) II-254
Leading Global Information Security Research Institutes II-254
Center for Education and Research in Information Assurance
and Security (CERIAS) (USA) II-254
Information Security Group (UK) II-255

Table 16: World Recent Past, Current & Future Analysis for
Information Security Products & Services by Geographic Region -
US, Canada, Japan, Europe, Asia-Pacific (excluding Japan),
Latin America, and Rest of World Markets Independently
Analyzed with Annual Revenues in US$ Million for Years 2010
through 2018 (includes corresponding Graph/Chart) II-256

Table 17: World Historic Review for Information Security
Products & Services by Geographic Region - US, Canada, Japan,
Europe, Asia-Pacific (excluding Japan), Latin America, and
Rest of World Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-257

Table 18: World 15-Year Perspective for Information Security
Products & Services by Geographic Region - Percentage
Breakdown of Revenues for US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America and Rest of
World Markets for Years 2004, 2011 & 2018 (includes
corresponding Graph/Chart) II-258
Information Security Software Market by Product Group/Segment II-259
Information Security Software II-259
Table 19: World Recent Past, Current & Future Analysis for
Information Security Software by Geographic Region - US,
Canada, Japan, Europe, Asia-Pacific (excluding Japan), Latin
America, and Rest of World Markets Independently Analyzed
with Annual Revenues in US$ Million for Years 2010 through
2018 (includes corresponding Graph/Chart) II-259

Table 20: World Historic Review for Information Security
Software by Geographic Region - US, Canada, Japan, Europe,
Asia-Pacific (excluding Japan), Latin America, and Rest of
World Markets Independently Analyzed with Annual Revenues in
US$ Million for Years 2004 through 2009 (includes
corresponding Graph/Chart) II-260

Table 21: World Recent Past, Current & Future Analysis for
Information Security Software by Product Segment - Identity
& Access Management, Secure Content Management, Intrusion
Detection/ Prevention, Security & Vulnerability Management,
Firewall/VPN and Other Security Software Markets
Independently Analyzed with Annual Revenues in US$ Million
for Years 2010 through 2018 (includes corresponding
Graph/Chart) II-261

Table 22: World Historic Review for Information Security
Software by Product Segment - Identity & Access Management,
Secure Content Management, Intrusion Detection/ Prevention,
Security & Vulnerability Management, Firewall/VPN and Other
Security Software Markets Independently Analyzed with Annual
Revenues in US$ Million for Years 2004 through 2009
(includes corresponding Graph/Chart) II-262

Table 23: World 15-Year Perspective for Information Security
Software by Geographic Region - Percentage Breakdown of
Revenues for US, Canada, Japan, Europe, Asia-Pacific
(excluding Japan), Latin America and Rest of World Markets
for Years 2004

To order this report:
Security_Systems Industry:
Global Information Security Products And Services Industry

Contact Clare: [email protected]
US:(339) 368 6001
Intl:+1 339 368 6001


SOURCE Reportlinker

More Stories By PR Newswire

Copyright © 2007 PR Newswire. All rights reserved. Republication or redistribution of PRNewswire content is expressly prohibited without the prior written consent of PRNewswire. PRNewswire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
The broad selection of hardware, the rapid evolution of operating systems and the time-to-market for mobile apps has been so rapid that new challenges for developers and engineers arise every day. Security, testing, hosting, and other metrics have to be considered through the process. In his session at Big Data Expo, Walter Maguire, Chief Field Technologist, HP Big Data Group, at Hewlett-Packard, will discuss the challenges faced by developers and a composite Big Data applications builder, focusing on how to help solve the problems that developers are continuously battling.
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete end-to-end walkthrough of the analysis from start to finish. Participants will also be given the pract...
WebRTC: together these advances have created a perfect storm of technologies that are disrupting and transforming classic communications models and ecosystems. In his session at WebRTC Summit, Cary Bran, VP of Innovation and New Ventures at Plantronics and PLT Labs, will provide an overview of this technological shift, including associated business and consumer communications impacts, and opportunities it may enable, complement or entirely transform.
SYS-CON Events announced today that Dyn, the worldwide leader in Internet Performance, will exhibit at SYS-CON's 17th International Cloud Expo®, which will take place on November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Dyn is a cloud-based Internet Performance company. Dyn helps companies monitor, control, and optimize online infrastructure for an exceptional end-user experience. Through a world-class network and unrivaled, objective intelligence into Internet conditions, Dyn ensures traffic gets delivered faster, safer, and more reliably than ever.
WebRTC services have already permeated corporate communications in the form of videoconferencing solutions. However, WebRTC has the potential of going beyond and catalyzing a new class of services providing more than calls with capabilities such as mass-scale real-time media broadcasting, enriched and augmented video, person-to-machine and machine-to-machine communications. In his session at @ThingsExpo, Luis Lopez, CEO of Kurento, will introduce the technologies required for implementing these ideas and some early experiments performed in the Kurento open source software community in areas ...
Too often with compelling new technologies market participants become overly enamored with that attractiveness of the technology and neglect underlying business drivers. This tendency, what some call the “newest shiny object syndrome,” is understandable given that virtually all of us are heavily engaged in technology. But it is also mistaken. Without concrete business cases driving its deployment, IoT, like many other technologies before it, will fade into obscurity.
Today air travel is a minefield of delays, hassles and customer disappointment. Airlines struggle to revitalize the experience. GE and M2Mi will demonstrate practical examples of how IoT solutions are helping airlines bring back personalization, reduce trip time and improve reliability. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Dr. Sarah Cooper, M2Mi's VP Business Development and Engineering, will explore the IoT cloud-based platform technologies driving this change including privacy controls, data transparency and integration of real time context w...
The IoT market is on track to hit $7.1 trillion in 2020. The reality is that only a handful of companies are ready for this massive demand. There are a lot of barriers, paint points, traps, and hidden roadblocks. How can we deal with these issues and challenges? The paradigm has changed. Old-style ad-hoc trial-and-error ways will certainly lead you to the dead end. What is mandatory is an overarching and adaptive approach to effectively handle the rapid changes and exponential growth.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, will discuss the impact of technology on identity. Should we federate, or not? How should identity be secured? Who owns the identity? How is identity ...
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new data-driven world, marketplaces reign supreme while interoperability, APIs and applications deliver un...
Electric power utilities face relentless pressure on their financial performance, and reducing distribution grid losses is one of the last untapped opportunities to meet their business goals. Combining IoT-enabled sensors and cloud-based data analytics, utilities now are able to find, quantify and reduce losses faster – and with a smaller IT footprint. Solutions exist using Internet-enabled sensors deployed temporarily at strategic locations within the distribution grid to measure actual line loads.
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, will explore the current state of IoT connectivity and review key trends and technology requirements that will drive the Internet of Things from hype to reality.
The Internet of Things (IoT) is growing rapidly by extending current technologies, products and networks. By 2020, Cisco estimates there will be 50 billion connected devices. Gartner has forecast revenues of over $300 billion, just to IoT suppliers. Now is the time to figure out how you’ll make money – not just create innovative products. With hundreds of new products and companies jumping into the IoT fray every month, there’s no shortage of innovation. Despite this, McKinsey/VisionMobile data shows "less than 10 percent of IoT developers are making enough to support a reasonably sized team....
You have your devices and your data, but what about the rest of your Internet of Things story? Two popular classes of technologies that nicely handle the Big Data analytics for Internet of Things are Apache Hadoop and NoSQL. Hadoop is designed for parallelizing analytical work across many servers and is ideal for the massive data volumes you create with IoT devices. NoSQL databases such as Apache HBase are ideal for storing and retrieving IoT data as “time series data.”
Today’s connected world is moving from devices towards things, what this means is that by using increasingly low cost sensors embedded in devices we can create many new use cases. These span across use cases in cities, vehicles, home, offices, factories, retail environments, worksites, health, logistics, and health. These use cases rely on ubiquitous connectivity and generate massive amounts of data at scale. These technologies enable new business opportunities, ways to optimize and automate, along with new ways to engage with users.
The IoT is upon us, but today’s databases, built on 30-year-old math, require multiple platforms to create a single solution. Data demands of the IoT require Big Data systems that can handle ingest, transactions and analytics concurrently adapting to varied situations as they occur, with speed at scale. In his session at @ThingsExpo, Chad Jones, chief strategy officer at Deep Information Sciences, will look differently at IoT data so enterprises can fully leverage their IoT potential. He’ll share tips on how to speed up business initiatives, harness Big Data and remain one step ahead by apply...
There will be 20 billion IoT devices connected to the Internet soon. What if we could control these devices with our voice, mind, or gestures? What if we could teach these devices how to talk to each other? What if these devices could learn how to interact with us (and each other) to make our lives better? What if Jarvis was real? How can I gain these super powers? In his session at 17th Cloud Expo, Chris Matthieu, co-founder and CTO of Octoblu, will show you!