Implement the Cloud Your Way: CA Technologies Delivers Products and Solutions to Simplify ‘Cloud Choice,’ Boost Business Agility

New and Updated Offerings Help Enterprises Make the Right Cloud Choice and Realize Faster Time-to-Value from Hybrid Cloud Deployments

ISLANDIA, N.Y., July 27, 2011 – CA Technologies (NASDAQ: CA) today announced 10 new and updated products and solutions that advance the company’s strategy for enabling cloud-connected enterprises and helping customers realize the business value of agility. With these new releases, enterprise customers gain the visibility and portability required to make the best choices in this growing, heterogeneous IT environment and realize faster time-to-value for hybrid cloud implementations. 

The term “cloud choice” describes the growing heterogeneity that includes traditional, cloud and hybrid application environments. Enterprises face a big decision today: if and when to move an application to the cloud. Once the decision is made to use the cloud, enterprises must then select the right type of cloud – public, private, hybrid – based on the application and its current and future requirements. 

In order to make the right cloud choice for the business, management and security must be at the forefront of any consideration. To help ensure customers are successful in their cloud initiatives, CA Technologies provides a breadth of products and solutions that support a lifecycle approach to successful cloud deployment which includes: plan, design, deliver, secure and assure.

“By putting management and security at the forefront of any cloud initiative, we can help enterprises choose, deploy and operationalize the right mix of cloud options to deliver the time-to-value that today’s business requires,” said Roger Pilc, general manager, Virtualization and Automation, CA Technologies. “By working with CA Technologies, enterprises can accelerate any and all facets of their cloud strategies, whether to make optimal use of public cloud services, leverage existing virtual and physical environments into a private cloud, build private cloud services from the ground up, or all of the above.”

The following products and solutions announced today support a lifecycle approach to successful cloud deployment:

CA Business Service Insight 8.0 :

  • Developed to manage the service performance of both cloud-based and traditional services, CA Business Service Insight helps enterprises plan and assure cloud initiatives. By offering features to discover, compare and measure services and service levels, customers can make the best informed choices around service options.
  • Customers can benchmark and compare internal and external services and their performance by using the Service Measurement Index hosted at Cloud Commons. In addition, Business Service Insight provides the ability to research different service options using social interaction. Valuable service opinion and comparison data can be collected by creating questionnaires to poll peers in the industry.
  • Business Service Insight also helps customers reduce performance and security risk by providing the ability to discover the traditional and cloud services currently running in an IT environment.
  • Finally, customers can improve business agility and increase customer satisfaction by providing the business level visibility needed to help assure services are performing at operational and contractual service levels.

"With the growth of cloud adoption in our organization, there is a new level of complex heterogeneity that embodies our IT environment,” said Jose Ferraz, managing partner, VisionWay, Business Management Services. “We understand that managing this environment and the cloud services and applications brought into it must be thought of up-front, before making any service or application choices. CA Business Service Insight provides us with the information we need as we make our choices of what should or could be delivered as a cloud application and what should stay in-house. Much of this decision is based on whether service levels are meeting business expectations.”

CA Automation Suite for Data Centers 12.5 :

  • Delivers the ultimate in enabling cloud choice. The integrated solution for automated data center management allows IT to respond to business needs, such as requirements for additional computing capacity on demand. This “cloud-bursting” capability allows customers to move workloads from private to public clouds as needed to meet demand and SLAs.
  • Advances in CA Technologies rapid server imaging technology help prevent vendor lock-in. Customers can seamlessly move applications and workloads into, out of and across public cloud provider platforms from vendors such as Amazon Web Services, Rackspace and Terremark.
  • Comprised of new releases of CA Server Automation, CA Virtual Automation, CA Configuration Automation and CA Process Automation, CA Automation Suite for Data Centers offers a comprehensive, step-wise approach to automation. It provides dynamic provisioning, configuration management, deployment and elastic scaling of IT services and infrastructure combined with policy-based server automation to maximize business service quality and availability.

CA AppLogic® 3.0 :

  • This unique turnkey cloud computing platform allows enterprises to design and deliver virtual business services across private and public clouds. With an intuitive visual interface, enterprises can define infrastructure, provision, deploy and manage applications, as well as monitor operations, using only a browser. With this release, customers can now run applications and services using VMware ESX and Xen hypervisors on the same grid, providing a new level of freedom and flexibility for delivering cloud services. In addition, customers can import workloads using the Open Virtualization Format (OVF), making smart use of existing virtualization investments. 
  • The new Global Fabric Controller adds detection and inventory functions to simplify installation and help reduce operating costs, and the role-based access control capabilities provide new options to enhance security. Enterprises running internal applications on the CA AppLogic cloud platform can easily move those applications to any of the global ecosystem of public cloud providers also using the CA AppLogic cloud platform.

CA Automation Suite for Clouds 1.0 :

  • A new pre-integrated solution to deliver private cloud services. This out-of-the-box solution enables rapid, predictable and secure provisioning and delivers cloud infrastructure and critical services designed for hybrid environments.
  • The pre-tested and extensible framework is designed for customers and partners to rapidly implement and accelerate time to value. It includes pre-designed workflows for automated, self-service delivery of virtual and physical infrastructure and application services, making it ideal for both foundational IaaS environments and easy extensibility to current and future automated cloud services. CA Automation Suite for Clouds is comprised of CA Server Automation, CA Virtual Automation, CA Process Automation, CA Configuration Automation and CA Service Catalog.

CA Virtual Placement Manager 1.0 :

  • Helps enterprises design and deliver virtual infrastructure. It brings to market a revolutionary approach to capacity management by automatically solving for optimal workload assignment, predicting capacity needs, and addressing performance and response time risks while also right-sizing new and existing virtual machines. Users can perform these analyses with both existing and hypothetical infrastructure components.
  • The placement and balancing solution, based on technology further developed from the Hyperformix acquisition, incorporates an infrastructure library and leverages performance and capacity utilization data from third party agents to support multi-vendor analysis. CA Virtual Placement Manager helps address problems of VM stall and sprawl by leveraging patented analytics to safely increase overall host to VM ratios.

Additional Enhanced Products:

• CA Virtual Assurance for Infrastructure Managers 12.5 to help assure application performance across  virtual, cloud and traditional IT environments; 
• CA Identity Manager 12.5 and CA Role & Compliance Manager 12.5 to help secure and control identity and access across virtual, cloud and traditional IT environments; 
• CA Data Manager 4.3 for designing data center efficiency; and
• CA Automation Suite for Cisco UCS 12.5 for delivering dynamic service and application automation across physical, virtual and cloud infrastructures.

“Enterprise IT has evolved rapidly into a world where organizations use and provide cloud services that cross boundaries of departments, companies and countries; across mobile devices, public, private and hybrid clouds; and across corporate mainframes and traditional servers,” said Tim Grieser, program vice president, IDC. “With these announcements, CA Technologies is expanding the breadth and depth of solutions that can help customers choose the best cloud option for their business and help manage, secure and optimize the service.”

Pragmatic Approach to Cloud

To help customers in their cloud journey, CA Technologies offers a three-day Cloud Strategy Workshop to assess how cloud computing can support an organization’s business needs based on a specific scenario the customer selects. Upon completion, customers will receive a report detailing assessments – ranging from the impact a cloud move will have on business and technical operations to strategy recommendations and suggested milestones for deployment.

About CA Technologies

CA Technologies (NASDAQ: CA) is an IT management software and solutions company with expertise across all IT environments – from mainframe and distributed, to virtual and cloud. CA Technologies manages and secures IT environments and enables customers to deliver more flexible IT services. CA Technologies innovative products and services provide the insight and control essential for IT organizations to power business agility. The majority of the Global Fortune 500 relies on CA Technologies to manage evolving IT ecosystems. For additional information, visit CA Technologies at www.ca.com.

AMD Teams With NYSERDA, HP, and Clarkson University for Sustainable Data Center Energy Research

Investment will fund study on clouds fueled by wind and solar power


SUNNYVALE, Calif. —8/1/2011 

AMD (NYSE: AMD) today announced its participation with the New York State Energy Research and Development Authority (NYSERDA), HP and Clarkson University in a significant research project that looks at the industry-wide challenge of channeling renewable energy directly to data centers.

“The distributed computing model of the cloud parallels the distributed power-generation model of solar and wind energy. Directing power to data centers from these emerging renewable energy resources without relying on a large-scale, traditional electrical grid is a key challenge,” said Alan Lee, corporate vice president of Research and Advanced Development, AMD.  “One ultimate goal is the co-location of dynamic energy sources with dynamic computing resources to improve the economics, performance, and environmental benefits of both infrastructures.”

Because wind and solar-derived energy can be intermittent, this study will also examine critical questions of how to automatically shift a compute load between data centers and maintain reliability.

Backing from NYSERDA and additional private funding sources are enabling this proposal, developed by AMD engineers in conjunction with Clarkson University, to enter the research phase.  Students will begin experimentation on effectively managing data through a distributed network based on renewable energy. The second phase of the project plans to incorporate hardware elements, including HP’s Performance Optimized Datacenter (POD) fully integrated with HP ProLiant servers using the AMD Opteron™ processor, purpose-built for energy efficiency and cloud computing.

HP POD Technology

HP’s POD portfolio includes the industry’s leading energy-efficient, modular data center.  Built on HP Converged Infrastructure, HP POD technology provides clients currently burdened with aging infrastructure, limited space and shrinking budgets the agility needed to rapidly scale and meet increasing capacity demands. According to HP, the newest solution in the HP POD family, the EcoPOD, can offer 95 percent greater energy efficiency when compared to traditional brick-and-mortar data centers.1 HP will offer this project its POD expertise in energy-efficient data center design that delivers maximum density with greater serviceability.

The AMD Research Office

AMD Research conducts work on next-generation computing questions in the areas of systems and technologies, network infrastructure and power, among others.  It also collaborates on projects with leading universities, public sector organizations and commercial labs worldwide.

Supporting Resources

About AMD

AMD (NYSE: AMD) is a semiconductor design innovator leading the next era of vivid digital experiences with its groundbreaking AMD Fusion Accelerated Processing Units (APUs) that power a wide range of computing devices. AMD’s server computing products are focused on driving industry-leading cloud computing and virtualization environments. AMD’s superior graphics technologies are found in a variety of solutions ranging from game consoles, PCs to supercomputers. For more information, visit http://www.amd.com

AMD, the AMD Arrow logo, AMD Opteron and combinations thereof, are trademarks of Advanced Micro Devices, Inc. Other names are for informational purposes only and may be trademarks of their respective owners.

Trend Micro's Latest Quarterly Threat Report Signals Rapid Incident Growth in Cloud and Mobile Sectors


Trend Micro's Latest Quarterly Threat Report Signals Rapid Incident Growth in Cloud and Mobile Sectors

OTTAWA, Aug. 2, 2011 /CNW/ - Trend Micro Inc. (TYO: 4704;TSE: 4704), a global cloud security leader, today released its 2Q 2011 Threat Roundup report on the most dangerous on line security threats and trends facing businesses today.

The most notable trends in the second quarter of 2011 are cloud-computing-related data breaches at a magnitude never seen before and the proliferation of Android malware . Also, social networking scams became even more sophisticated, and cybercriminals continued to instigate a myriad of malicious schemes.

"At the rate cybercriminals are launching attacks, targeted or not, there's just no telling how many more companies and users will succumb to the dangers these pose before the year ends," said Raimund Genes, CTO, Trend Micro.

" The combination of the trends we are seeing through our newest Threat Report and recent findings of our 2011 Trend Micro Canada SME Survey underscore the need for both consumers and businesses to make smart decisions about protecting their information from getting into the wrong hands, " said Ian Gordon, Trend Micro Canada's Marketing and Channel Chief.

Summary of Top Attacks, Breaches and Exploits and Scams

  • The Epsilon breach in April opened everyone's eyes to advanced persistent threats and the consequences of having their email accounts compromised, leading to information and identity theft.
  • Making headlines several times in 2Q, Trend Micro researchers proved how risky viewing Webmail accounts at work and downloading Trojanized apps are to users and businesses alike.
  • Microsoft was the number one vendor target for exploit attacks, with a total of 96.  Google and Adobe held the second and third posts with 65 and 62 attacks respectively.
  • Apple, which led all vendor targets in Q1, was not in the Top 10 this time.  The number of Mac and Apple mobile device exploits is growing steadily though.
  • Due to Android OS's increasing popularity, it faced at least three attacks in 2Q. Like previously discovered Android malware, all three posed as either fake apps or updates to trick users into executing them, albeit varying targets.
  • Facebook experienced several attacks in the form of spammed malicious links through various Facebook tools or as "copy-and-paste" scripts; all these led to data theft.

Notable Security Wins

While the threat landscape continues to change and becomes more sophisticated, Trend Micro and other global security teams made impressive takedowns in 2Q:

  • Trend Micro participated in the takedown of a CARBERP command-and-control (C&C) server, which had been stealing personal information from users worldwide for several months since early 2010.
  • Trend Micro was instrumental blocking malicious URLs throughout 2Q, which put the company on Microsoft's leader board for the seventh straight month in a row.
  • We also witnessed the successful takedown of CoreFlood botnet by the U.S. DOJ and FBI.  Meanwhile, the Japanese Parliament approved the revised Cybercriminal Law, which will start penalizing malware writers who create malicious wares without legitimate reasons and/or for the purpose of running these on others' systems without their consent.

Supporting Assets

About Trend Micro Trend Micro Incorporated (Tokyo Stock Exchange: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

For further information:

Media Contacts: Claire M. Tallarico, 416 616 9940tallarico623@rogers.com

This information is being distributed to you by CNW Group Ltd.
To discontinue this service, click here.

Ces renseignements vous ont été distribués par le Groupe CNW Ltée.
Pour mettre fin à ce service, cliquez ici.

© 2011 CNW Group Ltd, all rights reserved
© 2011 Groupe CNW Ltée, tous droits réservés

Text2Pay Announces Direct Billing for Rogers, Bell, Fido and Telus in Canada

Text2Pay Announces Direct Billing for Rogers, Bell, Fido and Telus in Canada

Mobile payments company Text2Pay today announced direct billing on Rogers, Bell, Fido and Telus allowing mobile phone users to purchase goods and services online billed directly to their mobile phone account

August 02, 2011 08:03 AM Eastern Daylight Time 

NEW YORK--(EON: Enhanced Online News)--Online mobile payments provider Text2Pay, today announced that Rogers, Bell, Fido and Telus Canadian customers, can now use its mobile billing platform to pay for virtual goods and online content from participating merchants, safely and easily. Customers’ mobile phone accounts are billed securely, using a two-factor PIN/ZIP code authentication for each transaction. Not only is this transaction method convenient and easy to use, the use of Text2Pay is more secure than using a credit card transaction.

“We are very proud of our new product and believe this will pave the way to easier, faster and dynamic payment solutions for mobile users worldwide.”

Offering 95% carrier coverage in over 50 countries, the Text2Pay mobile payment platform enables merchants and mobile developers a simple, effective way of monetizing their online offering or adding depth to their current payment options. With no credit card details required, merchants are able to access a wider range of customers and can expect their conversion rates to soar across all customer segments. Text2Pay offers market leading transaction rates and customizes individual pricing solutions.

CEO of Text2Pay, Mark Reiken says, “We are very proud of our new product and believe this will pave the way to easier, faster and dynamic payment solutions for mobile users worldwide.”

“Text2Pay utilizes the latest technology and software. Best of all – it’s white-labeled. Which means we don’t plaster our logo over everything, the client can customize anyway they wish,” he says.

“Working with the Canadian carriers Rogers, Bell, Fido and Telus will really push Text2Pay into the mobile marketplace and make the mobile experience easier.” Mr Reiken says.

To see how Text2Pay mobile payments work, watch the demonstration here.

About Text2Pay

Text2Pay is a leader in online payments using the mobile phone. Text2Pay makes it easier for consumers to pay for virtual goods and services by using their mobile phone. With strong security and high conversion rates being the most important factors, Text2Pay's goal is to make the customer's payments experience more enjoyable and easy.

Visit Text2Pay.com for more information on online mobile payments.

Contacts

Text2Pay Inc.
Adam Weinstein, 877-907-6622
adam@text2pay.com

Microsoft Broadens Global Software Donation Program to Reach More Nonprofits and Communities

News Press Release
Microsoft Broadens Global Software Donation Program to Reach More Nonprofits and Communities
Updated program expands eligibility and access to technology.

REDMOND, Wash. — July 27, 2011 — Microsoft Corp. today announced updates to its software donation program that make it easier for nonprofit organizations to get access to affordable technology. The program, which has already provided more than $3.9 billion worth of software to nonprofits around the world since 1998, is being expanded to enable more nonprofit organizations to request software donations when they need them at any point in the year.

The updates to the Microsoft Software Donation program, which is currently available in more than 100 countries around the world, include the following:

The number of different Microsoft software products that can be requested has been expanded from six to 10 to allow nonprofits to get the software they need, such as Windows 7, Microsoft Office 2010 and Microsoft SharePoint 2010.

Three new categories of nonprofit organizations are now eligible for software donations, including medical research organizations, private foundations, and amateur sports and recreational organizations.

The donations program includes a new Get Genuine offering so nonprofits can ensure their existing computers are running genuine versions of Microsoft operating systems to help keep their software up-to-date and security-enhanced.

Nonprofits can now request a software donation from Microsoft through the TechSoup Global Network whenever they need it instead of the previous limit of only one request per year.

Nonprofit organizations ordering their donations through the TechSoup Global Network can now easily get key donations details in one place with the Microsoft Donations Center, a new website where organizations can review their donation history and identify products their organizations can request.

“Making technology more accessible enables nonprofits to increase their productivity, reach more people and deliver new, improved services that directly help local communities,” said Akhtar Badshah, senior director of global community affairs at Microsoft. “Although we already help a sizable number of nonprofits, we want to help more, and the changes we’re announcing today are designed to make the program more relevant and accessible to a larger number of nonprofits, which will in turn have a positive impact in local communities around the world.”

Microsoft works closely with the nonprofit organization TechSoup Global and its global network to operate the software donation program in 35 countries: Australia, Belgium, Botswana, Brazil, Bulgaria, Canada, Chile, Croatia, Czech Republic, Egypt, France, Germany, Hong Kong, India, Ireland, Israel, Italy, Japan, Kenya, Luxembourg, Macau, Mexico, Netherlands, New Zealand, Poland, Romania, Russia, Slovakia, Slovenia, South Africa, Spain, Sweden, Taiwan, the United Kingdom and the United States. TechSoup Global charges a small administrative fee, which funds the program to help nonprofits not only get the software they need, but also the support and expertise they need to make the best use of the technology. More information is available at http://www.techsoupglobal.org.

“Every day we see how technology is helping nonprofits to operate more effectively and ultimately do their best work,” said Rebecca Masisak, co-CEO of TechSoup Global. “The updates to the Microsoft Software Donation Program provide nonprofits increased flexibility in requesting software, which we believe will greatly benefit many nonprofits in the TechSoup Global community that rely on a range of Microsoft products to run their organizations effectively.”

More Information

Nonprofits can find out more information on the software donations program and how to submit requests from Microsoft by visiting http://www.microsoft.com/nonprofit.

The latest news and information on Microsoft Corporate Citizenship programs is available at the following links:

Microsoft Citizenship Web site

Microsoft Unlimited Potential Blog

Microsoft Citizenship on Facebook

Microsoft Citizenship on Twitter

Trend Micro's Latest Quarterly Threat Report Signals Rapid Incident Growth in Cloud and Mobile Sectors

Trend Micro's Latest Quarterly Threat Report Signals Rapid Incident Growth in Cloud and Mobile Sectors

OTTAWA, Aug. 2, 2011 /CNW/ - Trend Micro Inc. (TYO: 4704;TSE: 4704), a global cloud security leader, today released its 2Q 2011 Threat Roundup report on the most dangerous on line security threats and trends facing businesses today.

The most notable trends in the second quarter of 2011 are cloud-computing-related data breaches at a magnitude never seen before and the proliferation of Android malware . Also, social networking scams became even more sophisticated, and cybercriminals continued to instigate a myriad of malicious schemes.

"At the rate cybercriminals are launching attacks, targeted or not, there's just no telling how many more companies and users will succumb to the dangers these pose before the year ends," said Raimund Genes, CTO, Trend Micro.

" The combination of the trends we are seeing through our newest Threat Report and recent findings of our 2011 Trend Micro Canada SME Survey underscore the need for both consumers and businesses to make smart decisions about protecting their information from getting into the wrong hands, " said Ian Gordon, Trend Micro Canada's Marketing and Channel Chief.

Summary of Top Attacks, Breaches and Exploits and Scams

  • The Epsilon breach in April opened everyone's eyes to advanced persistent threats and the consequences of having their email accounts compromised, leading to information and identity theft.
  • Making headlines several times in 2Q, Trend Micro researchers proved how risky viewing Webmail accounts at work and downloading Trojanized apps are to users and businesses alike.
  • Microsoft was the number one vendor target for exploit attacks, with a total of 96.  Google and Adobe held the second and third posts with 65 and 62 attacks respectively.
  • Apple, which led all vendor targets in Q1, was not in the Top 10 this time.  The number of Mac and Apple mobile device exploits is growing steadily though.
  • Due to Android OS's increasing popularity, it faced at least three attacks in 2Q. Like previously discovered Android malware, all three posed as either fake apps or updates to trick users into executing them, albeit varying targets.
  • Facebook experienced several attacks in the form of spammed malicious links through various Facebook tools or as "copy-and-paste" scripts; all these led to data theft.

Notable Security Wins

While the threat landscape continues to change and becomes more sophisticated, Trend Micro and other global security teams made impressive takedowns in 2Q:

  • Trend Micro participated in the takedown of a CARBERP command-and-control (C&C) server, which had been stealing personal information from users worldwide for several months since early 2010.
  • Trend Micro was instrumental blocking malicious URLs throughout 2Q, which put the company on Microsoft's leader board for the seventh straight month in a row.
  • We also witnessed the successful takedown of CoreFlood botnet by the U.S. DOJ and FBI.  Meanwhile, the Japanese Parliament approved the revised Cybercriminal Law, which will start penalizing malware writers who create malicious wares without legitimate reasons and/or for the purpose of running these on others' systems without their consent.

Supporting Assets

About Trend Micro Trend Micro Incorporated (Tokyo Stock Exchange: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud security infrastructure, our products and services stop threats where they emerge - from the Internet. They are supported by 1,000+ threat intelligence experts around the globe.

OnX Enterprise Solutions Completes Acquisition of Agilysys Technology Solutions Group


OnX Enterprise Solutions Completes Acquisition of Agilysys Technology Solutions Group

Combined company offers clients comprehensive data center solutions
and broadest choice of cloud-based managed services

TORONTO, Aug. 1, 2011 /CNW/ - OnX Enterprise Solutions announced today that it has completed the acquisition of the Technology Solutions Group (TSG) of US-based Agilysys, Inc., a leading enterprise business and IT solutions provider.  OnX had previously announced its intention to acquire the TSG business unit on June 3, 2011.

By merging TSG's people and operations in the US, Canada, and Europe into OnX, the company is now among the world's largest independent, multi-vendor enterprise data center solutions providers.  With clients and offices throughout North America and Europe, the company will have combined revenues of $750 million, a global team of more than 500 associates and certified partnerships with all the leading IT vendors.

OnX is ideally positioned to meet the growing and demanding IT needs of medium and large enterprises and able to offer clients around the world the most comprehensive end-to-end suite of enterprise data center solutions. The company's enterprise solutions encompass hardware, software, servers, storage, networking, mobility, hosting, managed cloud services, digital and application services, and consulting services.

Additionally, along with offering the industry's broadest choice of cloud-based services, OnX is a leading provider of Federated cloud solutions capable of simultaneously supporting both public and private cloud platforms.

"Our clients are increasingly asking us to help them achieve accelerated business results," said Ed Vos, president and CEO of OnX.  "They are looking for a broader range of solutions, services, and expertise to meet their complex business and IT challenges.  With the addition of TSG and its talented team, we are ideally positioned to meet those needs -- end-to-end, around the world, all from one organization."

With today's closing of the TSG acquisition, which follows Agilysys shareholder approval received on July 28, 2011, OnX will assume management of TSG including all North American and European operations. New locations for OnX include the UK and US offices in California, Colorado, Florida, Illinois, Massachusetts, Ohio, New Jersey and New York.

OnX is a rapidly growing company with plans to accelerate its growth both organically and through additional strategic acquisitions.  OnX is a privately held company and majority owned by Marlin Equity Partners of Los Angeles, CA.

Perennially recognized as an exceptional business partner and 'a best place to work', OnX has continued to gain accolades as it expands its global presence.  In July, HP named OnX its Canadian Software and Solutions Partner of the Year for the second consecutive year. In June, F5 Network named OnX Partner of the Year for the Americas Region.  Also, in March, Cisco distinguished OnX with two awards - Canadian Managed Cloud Partner of the Year and Borderless Network Partner of the Year.   Additionally, in April, the company was named for the second consecutive year as one of the 'Best Workplaces in Canada' based on associate ratings and independent evaluations.

About OnX

OnX Enterprise Solutions is a global enterprise data center solutions provider with a suite of end-to-end solutions including the industry's leading Federated cloud solution offerings.  The company designs, builds and manages complete data center environments comprised of multi-vendor offerings in four core areas - Hardware & Software Solutions, Cloud & Managed Services, Digital  & Application Services, and  Professional Services.  Over the past 28 years, OnX has helped clients achieve exceptional business results that accelerate their growth and value.  Headquartered in Toronto, Canada, OnX has a team of more than 500 IT professionals, revenues of more than $750 million, and clients and offices throughout North America and Europe.  OnX is a privately held company and majority owned by Marlin Equity Partners of Los Angeles, CA.   For more information, visit: www.OnX.com.

For further information:

Media Contacts: 

Rich Moore
New Venture Communications
rmoore@newventurecom.com
415-608-7441      
      Lauren Dresnick
New Venture Communications
ldresnick@newventurecom.com
650-343-2735

 

This information is being distributed to you by CNW Group Ltd.
To discontinue this service, click here.

Ces renseignements vous ont été distribués par le Groupe CNW Ltée.
Pour mettre fin à ce service, cliquez ici.

© 2011 CNW Group Ltd, all rights reserved
© 2011 Groupe CNW Ltée, tous droits réservés

PwC expands its IT Consulting Services practice in Atlantic Canada


PwC expands its IT Consulting Services practice in Atlantic Canada

InfoTech Solutions acquisition strengthens technology consulting expertise

TORONTO, Aug. 2, 2011 /CNW/ - The professional services firm PwC is pleased to announce the addition of new service capabilities in Atlantic Canada with the acquisition of InfoTech Solutions in St. John's and Moncton.

InfoTech Solutions provides a range of services including IT consulting, business analysis, information architecture, Intranet and Extranet solutions and IT resourcing for midmarket to large-scale organizations.

"The addition of an experienced InfoTech Solutions team will be beneficial to our current and potential new clients that require highly-skilled technology consulting professionals, particularly in the Microsoft consulting area," says Michael Anaka, Atlantic Region Managing Partner for PwC. "The InfoTech team is a natural fit in PwC's Atlantic Region - we are currently working closely with them on projects within the public sector and we now have a deeper capability to help East Coast organizations capitalize on their important IT investments."

The acquisition of Infotech Solutions includes current contracts and approximately 25 people. Staff will remain in the current St. John's location and those in the Moncton location will relocate to the PwC office in Moncton. PwC has 24 offices across Canada with Atlantic Canada offices located in St. John's, Halifax, Sydney, Truro, Moncton, Saint John and Charlottetown.

Follow PwC on Twitter at @PwC_Canada_LLP and on Facebook at http://www.facebook.com/pwccanada.

About PwC
The firms of the PwC network provide industry-focused assurance, tax and advisory services to enhance value for clients. More than 161,000 people in 154 countries in PwC firms across the PwC network share their thinking, experience and solutions to develop fresh perspectives and practical advice. In Canada, PricewaterhouseCoopers LLP, an Ontario limited liability partnership, and its related entities have more than 5,700 partners and staff in offices across the country. See www.pwc.com/ca for more information.

"PwC" is the brand under which member firms of PricewaterhouseCoopers International Limited (PwCIL) operate and provide services. Together, these firms form the PwC network. Each firm in the network is a separate legal entity and does not act as agent of PwCIL or any other member firm. PwCIL does not provide any services to clients. PwCIL is not responsible or liable for the acts or omissions of any of its member firms nor can it control the exercise of their professional judgment or bind them in any way.

Note to Editors: PwC changed its name from PricewaterhouseCoopers to PwC in the fall of 2010. "PwC" is written in text with a capital "P" and capital "C." Only when you use the PwC logo is the name represented in lower case.

"PwC" refers to PricewaterhouseCoopers LLP, an Ontario limited liability partnership, which is a member firm of PricewaterhouseCoopers International Limited, each member firm of which is a separate legal entity.


 

For further information:


Jessica Draker
Tel.: 613 755 8706
Email: jessica.l.draker@ca.pwc.com

Jonathan Hicks
Tel.: 416 416 869 2449
Email: jonathan.hicks@ca.pwc.com

 

This information is being distributed to you by CNW Group Ltd.
To discontinue this service, click here.

Ces renseignements vous ont été distribués par le Groupe CNW Ltée.
Pour mettre fin à ce service, cliquez ici.

© 2011 CNW Group Ltd, all rights reserved
© 2011 Groupe CNW Ltée, tous droits réservés

Global Information Security Execs Urge – “Assume You Are Compromised”

FOR IMMEDIATE RELEASE

Global Information Security Execs Urge – “Assume You Are
Compromised”

EMC’s Security Division Releases Latest SBIC Report Focused on New
Security Mindset to Defend against Advanced Persistent Threats

BEDFORD, Mass.– August 2, 2011 – RSA, The Security Division of EMC
(NYSE:EMC), released a new report that takes an in-depth look at the
seismic shift in the cyber threat landscape, as enterprises are
increasingly targeted for corporate espionage and sabotage. The report
(http://www.rsa.com/innovation/docs/SBIC_RPT_0711.pdf), the latest in a
series from the Security for Business Innovation Council (SBIC), asserts
that for most organizations, it’s a matter of when, not if, they will
be targeted by advanced threats (http://www.rsa.com/node.aspx?id=3853).
In an environment where the focus shifts from the impossible task of
preventing intrusion to the crucial task of preventing damage, the
report includes instructive guidance from 16 global security leaders for
confronting this new class of threat.

To view the multimedia format of this release visit:
http://www.rsa.com/go/press/RSATheSecurityDivisionofEMCNewsRelease_8211.html

The SBIC is a group of the industry’s top security leaders from
Global 1000 enterprises that discuss top-of-mind security concerns and
how the application of information security
(http://www.rsa.com/node.aspx?id=3193) can address those concerns and
enable business innovation. The recent string of sophisticated cyber
attacks (http://www.rsa.com/node.aspx?id=3178)– affecting pillars of
industry and government – provides the backdrop for the latest report:
When Advanced Persistent Threats Go Mainstream: Building
Information-Security Strategies to Combat Escalating Threats. Within
this landscape, the report reveals that APTs – a menace once confined
to the defense industrial base and government agencies – are now
targeting a broad range of private sector organizations to nab valuable
intellectual property, trade secrets, corporate plans, access to
operations and other proprietary data.

“It is a very intelligent, well-armed, and effective foe that is
fantastic at what they do,” said Roland Cloutier, Vice President,
Chief Security Officer, Automatic Data Processing, Inc. and member of
the SBIC. “It’s going to take a new approach in most enterprises to
combat it.”

Fundamental Change in Quality of Cyber Attacks

The term APT originated to describe cyber espionage in which a
nation-state gains access to a network to, over long periods of time,
extract national security data. Today the term APT has broadened as
attackers expand their target lists and nation-states are no longer the
only groups deploying these sophisticated techniques. Rather than gain
entry through the network perimeter, today’s ambitious attackers
prefer to target human vulnerabilities, exploiting end users through
social engineering techniques and spear phishing.

“Cyber criminals have aggressively shifted their targets and
tactics,” said Art Coviello, Executive Chairman, RSA, The Security
Division of EMC. “In the never-ending war for control of the network,
the battle must be fought on many different fronts. All organizations
are part of the greater ecosystem of information exchange and it is
everyone’s responsibility to build and protect that exchange.”

Top Security Officers Urge, “Assume You Are Compromised”

This latest report from the SBIC urges organizations to adopt a new
security mindset, shifting the concept of success from preventing
infiltration to detecting attacks and mitigating damage as quickly as
possible. With this in mind, the Council offers seven defensive measures
against escalating APT threats:

1. Up-level intelligence gathering and analysis – Make intelligence
the cornerstone of your strategy.
2. Activate smart monitoring– Know what to look for and set up your
security and network monitoring to lo
ok for it.
3. Reclaim access control– Rein-in privileged user access.
4. Get serious about effective user training– Train your user
population to recognize social engineering and compel them to take
individual responsibility for organizational security.
5. Manage expectations of executive leadership– Ensure the C-level
realizes the nature of combating APTs is fighting a digital arms race.
6. Rearchitect IT– Move from flat to segregated networks so it’s
harder for attackers to roam the network and find the crown jewels.
7. Participate in intelligence exchange– Leverage knowledge from
other organizations by sharing threat intelligence.

About the Security for Business Innovation Council

The Security for Business Innovation Council
(http://www.rsa.com/node.aspx?id=3151) is a group of highly successful
Global 1000 security executives who are committed to sharing their own
insights to help move information security forward at organizations
worldwide. Council members include:

* Marene N. Allison, Worldwide Vice President of Information Security,
Johnson & Johnson
* Anish Bhimani, Chief Information Risk Officer, JPMorgan Chase
* William Boni, Vice President and Chief Information Security Officer,
Corporate Information Security, T-Mobile USA
* Roland Cloutier, Vice President, Chief Security Officer, Automatic
Data Processing, Inc.
* Dave Cullinane, Chief Information Security Officer and Vice
President, Global Fraud, Risk & Security, eBay
* Dr. Martijn Dekker, Senior Vice President, Chief Information Security
Officer, ABN Amro
* Professor Paul Dorey, Founder and Director, CSO Confidential and
Former Chief Information Security Officer, BP
* Renee Guttmann, Chief Information Security Officer, The Coca Cola
Company
* David Kent, Vice President, Global Risk and Business Resources,
Genzyme
* Petri Kuivala, Chief Information Security Officer, Nokia
* Dave Martin, Chief Security Officer, EMC Corporation
* Timothy McKnight, Vice President and Chief Information Security
Officer, Northrop Grumman
* Felix Mohan, Chief Security Officer, Airtel
* Ralph Salomon, Vice President, IT Security & Risk Office, Global IT,
SAP AG
* Vishal Salvi, Chief Information Security Officer and Senior Vice
President, HDFC Bank Limited
* Denise Wood, Chief Information Security Officer and Corporate Vice
President, FedEx Corporation

This report also includes perspective from special contributor Mischel
Kwon – former Director, US Computer Emergency Readiness Team (CERT)
and President of Mischel Kwon & Associates – who is widely recognized
for her experience and expertise in dealing with APTs.

The report released today is the eighth in the series. RSA expects to
publish more original Council reports over the coming months. Those
interested in learning more about the Security for Business Innovation
Council reports can visit the RSA Thought Leadership website at
http://www.RSA.com/securityforinnovation/ to view and download all of
the studies.

About RSA

RSA, The Security Division of EMC, is the premier provider of security,
risk and compliance management solutions for business acceleration. RSA
helps the world’s leading organizations succeed by solving their most
complex and sensitive security challenges. These challenges include
managing organizational risk, safeguarding mobile access and
collaboration, proving compliance, and securing virtual and cloud
environments.

Combining business-critical controls in identity assurance, encryption
& key management, SIEM, Data Loss Prevention and Fraud Protection with
industry leading eGRC capabilities and robust consulting services, RSA
brings visibility and trust to millions of user identities, the
transactions that they perform and the data that is generated. For more
information, please visit www.RSA.com and www.EMC.com.

About EMC

EMC Corporation is a global leader in enabling businesses and service
providers to transform their operations and deliver IT as a service.
Fundamental to this transformati
on is cloud computing. Through
innovative products and services, EMC accelerates the journey to cloud
computing, helping IT departments to store, manage, protect and analyze
their most valuable asset – information – in a more agile, trusted
and cost-efficient way. Additional information about EMC can be found at
www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

For more information contact:
Mike Martin/Michelle Chang
StrategicAmpersand
416-961-5595
mike@stratamp.com
michelle@stratamp.com

RSA and EMC are either registered trademarks or trademarks of EMC
Corporation in the United States and/or other countries. All other
company and product names may be trademarks of their respective owners.

If you do not wish to receive news releases from EMC Canada please
reply to this e-mail with "remove" in the subject header.

Iomega Introduces New Mac Companion Hard Drive with First-of-its-Kind High-Powered Charging Port for Your iPad and Other Apple Devices


FOR IMMEDIATE RELEASE

Iomega Introduces New Mac Companion Hard Drive with First-of-its-Kind
High-Powered Charging Port for Your iPad and Other Apple Devices

Mac Users Need It, the Iomega Mac Companion Hard Drive has it:
* Keep your iPad, iPhone and iPod Charged to Go
* Two FireWire 800 Interfaces
* A USB 2.0 Hub
* 2TBs or 3TBs of Storage with Fast 7200 RPM Hard Drive
* Bundled Iomega Protection Suite with Mac-Specific Software

SAN DIEGO, August 2, 2011– Iomega, an EMC company (NYSE:EMC) and a
global leader in data protection, today announced the new Iomega® Mac
Companion Hard Drive, a speedy, large capacity desktop hard drive styled
to match the latest Mac computers with a first-of-its-kind convenient
high-powered port to charge your iPad, iPhone and iPod, as well as
selection of computer interfaces for connecting peripherals like a
printer or other external storage device.

“With the new Iomega Mac Companion Hard Drive, Mac users now have a
convenient and stylish way to quickly charge their iPads with the bonus
of plenty of new storage capacity for their Mac computer,” said
Jonathan Huberman, President of Iomega Corporation. “With more than
nine million iPads sold in the last quarter alone, the new Mac Companion
Hard Drive is the perfect complement for all those iPad owners. This
futuristic drive blends effortlessly with the latest Mac computers and
the Apple ecosystem of mobile devices. Together, form and function
rarely looks as good or works as well as the new Iomega Mac Companion
Drive.”

Who wouldn’t want the ultimate desktop hard drive for Mac computers?

Available in 2TB* and 3TB capacities, the new Iomega Mac Companion Hard
Drive utilizes a fast 7200 RPM 3.5-inch hard drive formatted HFS+ for
compatibility with Mac computers right out of the box. Rather than
sitting off to the side and being in the way, the space-saving design of
the Mac Companion Hard Drive allows it to fit perfectly on the base of
your Apple iMac or your Apple monitor.
(*1 TB = 1,000,000,000,000 bytes)

Of the many features included with the Mac Companion Hard Drive, Mac
users may most appreciate the first-of-its-kind high powered USB
charging port for their iPad, iPhone or iPod. (Apple portable products
sold separately.) The charging port is a high-powered 2.1 Amp hookup
that makes it easy and convenient to charge your iPad and other portable
Apple devices so they’re ready to go when you are.**
(** For the fastest charge, the Mac Companion Hard Drive must be
connected to the computer via FireWire rather than USB 2.0)

Adding peripheral devices to your Apple iMac computer is no problem
with the new Iomega Mac Companion Hard Drive. The stylish drive includes
two FireWire 800 ports, one USB 2.0 port and a two port integrated USB
2.0 hub that lets you connect multiple devices such as a printer or
other external storage device. The Mac Companion Hard Drive doesn’t
require the user to buy extra cables – the drive comes complete with
one FireWire 800, one conversion FireWire 400-800, and one USB 2.0
cable.

The new Iomega Mac Companion Hard Drive is the only major branded
external HFS+ Mac desktop hard drive on the market today that
incorporates a high powered Apple device charging port and a two-port
USB 2.0 hub.

How much storage space is available on my desktop hard drive?

Users of the Iomega Mac Companion Hard Drive never have to ask that
question because a handy capacity indicator gauge*** lets them know
approximately how much space is available to store their data. Four LEDs
on the front of the Mac Companion Hard Drive tell you the total capacity
of the data volume that is being used to store files:
* 4 LEDs lit white: less than 20 per cent capacity in use
* 3 LEDs white: 20-40 per cent capacity in use
* 2 LEDs white: 40-60 per cent capacity in use
* 1 LED white: 60-80 per cent capacity in use
* 1 LED red: more than 80 per cent capacity in use

(*** Requires software util
ity installation to enable capacity gauge
feature)

Iomega Protection Suite, Mac Edition, included

Owners of the new Iomega Mac Companion Hard Drive also receive a
powerful suite of software solutions bundled with their drive:
* Iomega® QuikProtect for simple scheduled file-level backup
* MozyHome® Online Backup for convenient online backup of up to 2GB
free
* A free 12-month subscription of Trend Smart Surfing for Mac allows
users to shop, bank and surf online while staying safe from attacks to
your identity and confidential information

Availability and Warranty

The new Iomega® Mac Companion Hard Drive is available worldwide in two
capacities: the 2TB model is US$195.00, and the 3TB model is US$295.00.
(Pricing is U.S. suggested retail.) The Mac Companion Hard Drive will
initially be available exclusively at Apple retail stores and the Apple
online store. Later this month, the product will be available from
additional retailers, etailers and at www.iomega.com.

Both models of the Iomega Mac Companion Hard Drive include a three-year
warranty with registration.

For more information about Iomega storage products, please go to
www.iomega.com.

About Iomega

Iomega is a worldwide leader of innovative storage solutions for small
businesses, distributed enterprises, home offices, and consumers. A
wholly-owned subsidiary of EMC, the world’s premier information
infrastructure technology provider, Iomega has shipped more than 14
million terabytes of storage since its inception in 1980. Today,
Iomega’s portfolio includes industry-leading network attached
storage solutions that utilize world class EMC storage and security
technologies as well as Iomega’s Personal Cloud technology; one of the
industry’s broadest selections of portable and desktop hard drives;
multimedia drives that make it easy to view video and Internet content
in the living room; and the one-of-a-kind Iomega® SuperHero™ Backup &
Charger for iPhone. To learn more go to www.iomega.com. Resellers
worldwide can visit www.ioclub.net.

About EMC

EMC Corporation is a global leader in enabling businesses and service
providers to transform their operations and deliver IT as a service.
Fundamental to this transformation is cloud computing. Through
innovative products and services, EMC accelerates the journey to cloud
computing, helping IT departments to store, manage, protect and analyze
their most valuable asset – information – in a more agile, trusted
and cost-efficient way. Additional information about EMC can be found at
www.EMC.com.

EMC Canada (www.EMC2.ca), headquartered in Toronto with nine offices
from coast to coast, is a wholly owned subsidiary of EMC Corporation.

- 30 -

For more information contact:
Mike Martin/Michelle Chang
StrategicAmpersand
416-961-5595
mike@stratamp.com
michelle@stratamp.com

NOTE: This release contains “forward-looking statements” as defined
under the Federal Securities Laws. Actual results could differ
materially from those projected in the forward-looking statements as a
result of certain risk factors, including but not limited to: (i)
adverse changes in general economic or market conditions; (ii) delays or
reductions in information technology spending; (iii) the relative and
varying rates of product price and component cost declines and the
volume and mixture of product and services revenues; (iv) competitive
factors, including but not limited to pricing pressures and new product
introductions; (v) component and product quality and availability; (vi)
fluctuations in VMware, Inc.’s operating results and risks associated
with trading of VMware stock; (vii) the transition to new products, the
uncertainty of customer acceptance of new product offerings and rapid
technological and market change; (viii) risks associated with managing
the growth of our business, including risks associated with acquisitions
and investments and the challenges and costs of integration,
restructuring and achieving anticipated synergie
s; (ix) the ability to
attract and retain highly qualified employees; (x) insufficient, excess
or obsolete inventory; (xi) fluctuating currency exchange rates; (xii)
threats and other disruptions to our secure data centres or networks;
(xiii) our ability to protect our proprietary technology; (xiv) war or
acts of terrorism; and (xv) other one-time events and other important
factors disclosed previously and from time to time in EMC’s filings
with the U.S. Securities and Exchange Commission. EMC disclaims any
obligation to update any such forward-looking statements after the date
of this release.

© 2011 Iomega Corporation. All rights reserved. Iomega and SuperHero
are trademarks or registered trademarks of Iomega Corporation in the
United States and/or other countries. EMC, MozyHome, and LifeLine are
trademarks or registered trademarks of EMC Corporation. All other
trademarks are the property of their respective holders.


If you do not wish to receive news releases from EMC Canada please
reply to this e-mail with "remove" in the subject header.