Xerox Canada Researchers Reach 1,500 Patent Milestone

 

 


Xerox Canada Researchers Reach 1,500 Patent Milestone

 

MISSISSAUGA, ON, April 7, 2011, -- The Xerox Research Centre Canada (XRCC) this week marked its 1,500th patent from the United States Patent and Trademark Office. This milestone comes just five years after registering its 1,000th patent.

 

The 120 scientists at XRCC registered 140 patents in 2010 -- up from 111 in 2009 and nearly double the yearly average for previous years -- highlighting the accelerated pace of innovation at the Mississauga-based centre.

 

“Reaching our 1,500th patent is an excellent indication of the passion and proficiency with which our researchers work,” says Hadi Mahabadi, vice president and director of XRCC. ” This milestone signifies not only the growth and advancement of the research centre, but also the creative and inventive spirit that characterize our diverse staff of scientists.”

 

The effectiveness of XRCC research and development has attracted the interest of the Canadian federal and provincial governments and the global research community. Many of these inventions cover materials and processes for toners, inks, photoreceptors, fusers and specialty media that have been commercialized in Xerox products over the past almost four decades. These supplies and consumables continue to contribute in a significant way to Xerox’s revenue and profits.

 

U.S. Patent 7,875,411 – XRCC’s 1,500th patent is part of the patent portfolio that covers long life photoreceptor technologies, a key area for increasing the sustainability attributes of Xerox’s laser printers and related products. The Xerox Research Centre Canada is responsible for developing the armour technology that almost doubles the life of photoreceptors - multi-layer thin film devices that convert light into electrostatic images.

 

“This technology has enabled a 30 percent reduction in waste, less down time and disruption to work flow, improved productivity, and fewer service calls,” says Yonn Rasmussen, vice president of the Xerographic Component Systems Group.

 

XRCC is one of four research and technology centres Xerox Corporation operates in the United States, Canada, and Europe that conduct work in disciplines connected to Xerox's expertise in services, printing and document management.

 

 

About Xerox

Xerox Corporation is a $22 billion leading global enterprise for business process and document management. Through its broad portfolio of technology and services, Xerox provides the essential back-office support that clears the way for clients to focus on what they do best: their real business.  Headquartered in Norwalk, Conn., Xerox provides leading-edge document technology, services, software and genuine Xerox supplies for graphic communication and office printing environments of any size. Through ACS, A Xerox Company, which Xerox acquired in February 2010, Xerox also offers extensive business process outsourcing and IT outsourcing services, including data processing, HR benefits management, finance support, and customer relationship management services for commercial and government organizations worldwide. The 136,000 people of Xerox serve clients in more than 160 countries.  For more information, visit http://www.xerox.com, http://news.xerox.com or http://www.acs-inc.com.  For investor information, visit http://www.xerox.com/investor.

 

-XXX-

Media Contacts:

Bill McKee, Xerox Corporation, 585-423-4476, bill.mckee@xerox.com

 

Note:  For more information on Xerox, visit http://www.xerox.com or http://www.xerox.com/innovation.  For open commentary and industry perspectives visit http://www.xerox.com/blogs or http://www.xerox.com/podcasts

 

Xerox®, the Xerox wordmark and the spherical connection symbol are trademarks of Xerox Corporation in the United States and/or other countries.

 

 

 

 

 

 

Highly Anticipated Motorola XOOM(tm) Wi-Fi Now Available in Canada

Image001

 


Highly Anticipated Motorola XOOM™ Wi-Fi Now Available in Canada

 

First device running Android 3.0™ (Honeycomb) now available at Future Shop and Best Buy

 

TORONTO – April 7, 2011 – Motorola Mobility Canada today announced the Motorola XOOM Wi-Fi is now available for purchase online from Best Buy and Future Shop, and will be available in-stores across the country beginning April 8. Providing higher resolution and more screen size in a smaller package than the leading competitor, the first device in Canada to run on Android™ 3.0 (Honeycomb) platform, Motorola XOOM Wi-Fi features a 1GHz-dual core processor and 1 GB of RAM, front-facing and rear-facing cameras, true multi-tasking functionality and the latest GoogleTM Mobile services on a 10.1 inch widescreen HD display.

 

Called the “the most potentially disruptive technology” by CNET at the 2011 Consumer Electronics Show, Motorola XOOM Wi-Fi showcases the innovations of the Honeycomb user experience – including widgets, true multi-tasking, browsing, notifications and customization – on a 10.1-inch widescreen HD display, enabling video content that’s richer and clearer than ever before. Support for HDMI enables viewing of videos and movies on larger screens, such as HD televisions. A 5 MP rear-facing camera captures HD video and 2 MP front-facing camera enables clear video chats using Google Talk™.

 

The latest Google Mobile services include Google Maps 5.0™ with 3D interaction, GmailTM, and access to thousands of apps from Android Market™. Motorola XOOM Wi-Fi also supports a Beta of Adobe® Flash® Player 10.2 downloadable from Android Market, enabling the delivery of Flash based web content including videos, casual games and rich Internet applications.

 

Motorola XOOM Wi-Fi also features a built-in gyroscope, barometer, e-compass, accelerometer and adaptive lighting; Motorola XOOM is leading the tablet revolution. Motorola XOOM supports up to 10 hours of video playback and charges in nearly half the time of competitive tablets on the market.

 

Motorola Smart Accessories

Motorola XOOM features an ecosystem of intelligent accessories to enhance the tablet experience:

  • A Standard Dock for watching video or listening to music through external speakers as the device charges. Available now for $49.95.
  • A Speaker HD Dock for sending HD content directly to a TV or clearly listening to music through two built-in speakers – eliminating the need to attach external speakers. Available now for $129.95.
  • A custom keyboard with Bluetooth® wireless technology and special AndroidTM shortcut keys. Available now for $69.95.

 

Motorola XOOM Wi-Fi is now available for $599.99 at Future Shop and Best Buy online, and will be available in-store beginning April 8. Visit Motorola.ca to learn more.

 

About Motorola Mobility

Motorola Mobility, Inc. (NYSE:MMI) fuses innovative technology with human insights to create experiences that simplify, connect and enrich people's lives. Our portfolio includes converged mobile devices such as smartphones and tablets; wireless accessories; end-to-end video and data delivery; and management solutions, including set-tops and data-access devices. For more information, visit motorola.com/mobility.

-30-

 

Media Contacts:

Kathryn Hanley
Hill & Knowlton for Motorola Mobility
416-413-4754
kathryn.hanley@hillandknowlton.ca

 

Alanna Glicksman
Hill & Knowlton for Motorola Mobility
416-413-4743
alanna.glicksman@hillandknowlton.ca

 

 

 

Certain features, services and applications are network dependent and may not be available in all areas; additional terms, conditions and/or charges may apply. All features, functionality and other product specifications are subject to change without notice or obligation. Contact your service provider for details.MOTOROLA and the Stylized M Logo are trademarks or registered trademarks of Motorola Trademark Holdings, LLC.  Android, Google, Google Maps, Gmail and Android Market, are trademarks of Google, Inc. All other product and service names are the property of their respective owners. © 2011 Motorola Mobility, Inc. All rights reserved.

 

 


 

 

http://www.hillandknowlton.com/oldbinaries/hksig_logo.gif

 

Alanna Glicksman

 

Assistant Consultant

 

Hill and Knowlton Canada

 

 

Direct Line: 416.413.4743

 

 

Mobile/Cell: 416.562.3029

 

 

Fax: 416.413.1550

 

 

alanna.glicksman@hillandknowlton.ca

 

 

 

 

 

160 Bloor Street East Suite 700, Toronto, Ontario, M4W 3P7 Canada

 

http://www.hillandknowlton.com

 

 

 



Privileged/Confidential Information may be contained in this message. If you are not the addressee indicated in this message (or responsible for delivery of the message to such person), you may not copy or deliver this message to anyone. In such case, you should destroy this message and kindly notify the sender by reply email. Please advise immediately if you or your employer does not consent to email or messages of this kind. Opinions, conclusions and other information in this message that do not relate to the official business of Hill & Knowlton Canada shall be understood as neither given nor endorsed by it.

Communitech’s Venture Services Program Expands to Meet Exponential Tech Sector Start-up Growth in Waterloo Region

 

___________________________________________

News Release

For Immediate Distribution

Communitech’s Venture Services Program Expands to Meet Exponential Tech Sector Start-up Growth in Waterloo Region

Waterloo Region, ON (April 7, 2011) – Communitech’s Venture Services program is expanding to support the burgeoning number of startup companies relying on Communitech for commercialization expertise, with more new companies “walking through the doors” every week, Communitech CEO Iain Klugman said today. The program provides expertise and resources to startup companies, engaging executive-level talent from the Region.

“Part of the tech ecosystem is ensuring that the wealth of executive knowledge in all aspects of entrepreneurship is shared with others who are the future leaders of successful ventures,” said Klugman. “It’s one of the reasons that hundreds of entrepreneurs have chosen Waterloo Region for their startups.”

More than 250 early-stage companies are actively engaged with the Venture Services Program, up from 50 since the inception of the EIR program five years ago, Klugman said. In 2010, more than 7000 hours were spent by EIRs coaching startups.

Communitech continually seeds its Executives-in-Residence team with high-level executives who have experience in “C-level” jobs and can coach startup tech firms, and the program has expanded from one to a complement of six EIRs. Each EIR has experience and expertise in a particular sector and a capability essential to business success. Klugman says most EIRs continue to be active in their field, either as senior executives or entrepreneurs.

Entrepreneurs work with the team of advisors best suited to their business, and have access not only to the expertise needed, but also resources and connections across a range of disciplines and sectors.

The Venture Services team at Communitech currently includes the following Executives-in-Residence:

-       Lillian Bass, a Chartered Accountant who provides leadership and helps get things done for fast-growing small and medium-sized businesses. Lillian was VP Finance and Operations at IGLOO Inc., an early stage business social software company, CFO for engineering company Brock Solutions, and Corporate Financial Manager for ATS Automation Tooling Systems and was involved with the inception of Angstrom Engineering.

-       Marc Castel, CEO at Maintenance Assistant Inc. and formerly CEO at ROBOsky, who brings extensive experience in the private and public sectors. Castel serves as Director of Commercialization for the Ontario Centres of Excellence, and works in collaboration with Angel Investment Groups in Ontario. Castel is also the founder of the Resource Alliance, Ontario’s largest network of commercialization professionals.

-       Cameron Hay, a professional from the global high-tech world, who was for six years president and CEO of Unitron and previously COO and VP Operations at Unitron; Hay also had experience at IBM and Celestica as a process engineer, and subsequently focused on both entrepreneurial businesses and global high-tech.

-       Chris Howlett has been involved with Communitech since its own startup days and applies his PhD in Mathematics to helping companies solve business problems with software systems. He has held executive positions as a VP at Geosign, as CTO at Maplesoft and as CEO at Freedom Intelligence/Aruna. In his current EIR role, Howlett is CTO-in-Residence at Communitech.

-       Dave Litwiller brings senior executive experience from Prinova Technologies where he was COO, as well as DALSA Corporation where he was Corporate VP Marketing and Business Development. At Prinova, Litwiller led R&D, Quality Assurance and Product Management for the company’s enterprise software development and delivery. Prior to joining DALSA, Litwiller was a design engineer at several high-tech startups in the wireless, fibre optic telecom and broadcast industries.

-       Brett Shellhammer, an expert on aligning marketing, sales and services activities around product lines to build successful organizations. Shellhammer was previously SVP of Marketing at Coreworx Inc. in Kitchener, and was previously SVP of Product Management at Eloqua in Toronto and VP and General Manager of the Global 2000 and Government business unit at OpenText. Shellhammer’s experience also includes having worked with five San Francisco Bay area startups.

Communitech and the Waterloo Accelerator Centre announced in late 2010 that they would team up to ensure one-stop shopping for early-stage companies looking for help taking their business to the next level. Now startups located at both the AC and The Communitech Hub have access to the same ‘Accelerator Program’, operated by the Accelerator Centre, which includes amenities for tenants, educational programming, in-house mentors and access to the Entrepreneurship Council and the Venture Services Program.

For more information about the Venture Services program at Communitech, go to http://www.communitech.ca/venture-services/ or contact Steve Currie, VP Business Services steve@cdmn.ca or Maggi Jones, Coordinator Venture Services Group maggi@communitech.ca.

About Communitech

Communitech www.communitech.ca is the hub for the commercialization of innovation in Waterloo Region, creating economic prosperity by helping tech companies start, grow and succeed. 

                    - 30 -

                    Media Contact

                    Shelley Grandy, Sr. PR Advisor, Communitech, shelley@cdmn.ca

IBM 2010 X-Force Trend & Risk Report finds a 27 per cent rise in cyber crime from 2009

 

 

IBM X-Force Report: 2010 Marked a Year of Sophisticated, Targeted Security Attacks

Latest report identified more targeted phishing, spam and mobile attacks, while cloud security continued to evolve


ARMONK, N.Y., March 31, 2011 – IBM (NYSE: IBM) today released results from its annual X-Force 2010 Trend and Risk Report, highlighting that public and private organizations around the world faced increasingly sophisticated, customized IT security threats in 2010.

Based on the intelligence gathered through research of public vulnerability disclosures, and the monitoring and analysis of more than 150,000 security events per second during every day of 2010, key observations from the IBM X-Force Research team included:

·          More than 8,000 new vulnerabilities were documented, a 27 percent rise from 2009.  Public exploit releases were also up 21 percent from 2009 to 2010. This data points to an expanding threat landscape in which sophisticated attacks are being launched against increasingly complex computing environments.

 

·         The historically high growth in spam volume leveled off by the end of 2010. This indicates that spammers may be seeing less value from increasing the volume of spam, and instead are focused on making sure it is bypassing filters.

 

·         While overall there were significantly fewer phishing attacks relative to previous years, “spear phishing,” a more targeted attack technique, grew in importance in 2010. This further indicates that cyber criminals have become more focused on quality of attacks, rather than quantity.

 

·         As end user adoption of smartphones and other mobile devices increased, IT security departments have struggled to determine the right way to bring these devices safely into corporate networks. Although attacks against the latest generation of mobile devices were not yet widely prevalent in 2010, IBM X-Force data showed a rise in vulnerability disclosures and exploits that target these devices.

 

“From Stuxnet to Zeus Botnets to mobile exploits, a widening variety of attack methodologies is popping up each day,” said Tom Cross, threat intelligence manager, IBM X-Force. “The numerous, high profile targeted attacks in 2010 shed light on a crop of highly sophisticated cyber criminals, who may be well-funded and operating with knowledge of security vulnerabilities that no one else has. Staying ahead of these growing threats and designing software and services that are secure from the start has never been more critical.”

In conjunction with this year’s report, IBM is launching the IBM Institute for Advanced Security in Europe to combat growing security threats in the region.  The IBM X-Force report stated that in 2010, nearly a quarter of all financial phishing emails targeted banks located in Europe.  It also identified the UK, Germany, Ukraine and Romania among the top 10 countries sending spam in 2010. This Institute joins its predecessor in Washington, D.C., focused on U.S. clients.

A new section in the IBM X-Force Trend and Risk Report is dedicated to the security trends and best practices for the emerging technologies of mobile devices and cloud computing.

Cloud Computing -- The report highlighted a shift in perception about cloud security as adoption continued to evolve and knowledge around this emerging technology increased.  Since security is still considered an inhibitor to cloud adoption, cloud providers must earn their customers' trust. This is achieved by providing an infrastructure that is secure by design with purpose-built security capabilities that meet the needs of the specific applications moving into the cloud. As more sensitive workloads move into the cloud, the security capabilities will become more sophisticated. Over time, IBM predicts the market will drive the cloud to provide access to security capabilities and expertise that is more cost effective than in-house implementations. This may turn questions about cloud security on their head by making an interest in better security a driver for cloud adoption, rather than an inhibitor.

Mobile Devices
-- Organizations are increasingly concerned about the security implications of personal mobile devices used by employees. Organizations must ensure control of their data regardless of where it is, including employee-owned or business-issued smartphones. In 2010, IBM X-Force documented increases in the volume of vulnerabilities disclosed in mobile devices as well as the disclosure of exploits that target them.  The desire to “jailbreak” or “root” mobile devices has motivated the distribution of mature exploit code that has been reused in malicious attacks. Nevertheless, malware is not yet common on the latest generation of mobile devices and most IT professionals view the data stored on them and how that can be misused or lost as the main security threats associated with these devices. According to the IBM X-Force Report, best practices for mobile security are evolving with enhanced password management and data encryption capabilities.

Additional trends highlighted in the report included:

The new, sophisticated face of cyber crime -- From a security standpoint, 2010 is most remembered as a year marked by some of the most high profile, targeted attacks that the industry has ever witnessed. For example, the Stuxnet worm demonstrated that the risk of attacks against highly specialized industrial control systems is not just theoretical. These types of attacks are indicative of the high level of organization and funding behind computer espionage and sabotage that continues to threaten a widening variety of public and private networks.

A significant decline in phishing -- If the IT security world is looking for a victory to chalk up in 2010, they should consider the relative decline in phishing attacks. Although phishing attacks still occurred, the peak volume of phishing emails in 2010 was less than a quarter of the peak volumes in the previous two years. This may indicate a shift toward other, more profitable, attack methodologies such as botnets and ATM skimming. Despite this decline, spear phishing, a more targeted attack technique, grew in importance in 2010, as meticulously crafted emails with malicious attachments or links became one of the hallmarks of sophisticated attacks launched against enterprise networks.

Spam volumes peaked, and then leveled off -- In 2010, spam volumes increased dramatically, reaching their highest levels in history. However, the growth in volume leveled off by the end of the year. In fact, by year's end, spammers seemed to go on vacation, with a 70 percent decline in traffic volumes occurring just before Christmas and returning early in the new year. Has the market for spam become saturated? It is possible that there are diminishing returns associated with increasing the total volume of spam, and we are starting to see spammers focus more on bypassing spam filters.

Web applications accounted for nearly half of vulnerabilities disclosed in 2010 -- Web applications continued to be the category of software affected by the largest number of vulnerability disclosures, representing 49 percent in 2010.  The majority represented cross site scripting and SQL injection issues, and the IBM X-Force data showed that these vulnerabilities are being targeted by attackers.  According to the report results, every summer for the past three years there has been a globally scaled SQL injection attack some time during the months of May through August. The anatomy of these attacks has been similar across the board, targeting .asp pages that are vulnerable to SQL injection.

A secure by design approach can improve security -- IBM X-Force has determined that taking proactive steps to evaluate web application security and improve development and quality assurance processes can result in a significant improvement in the security of web application software. The report included data showing that web applications scanned for vulnerabilities often showed significant improvements upon being retested – exhibiting less than half of the number of particular classes of vulnerabilities, on average, the second time they are assessed. This encouraging information points the way toward sustained improvements in Internet security.

Nearly half of vulnerabilities remain unpatched -- To help prevent attackers from exploiting vulnerabilities, organizations must focus on shortening the window of time between vulnerability disclosure and patch installation. Forty-four percent of all security vulnerabilities had no vendor-supplied patch at the end of 2010. However, even in cases where patches are made available on the same day that a vulnerability is publicly disclosed, there may be a significant gap in time before those patches are installed on vulnerable systems. Computer criminals often privately develop exploits that target publicly disclosed security vulnerabilities, and use those exploits to launch attacks. Later, when these private exploits have ceased to be valuable as attack tools, they are publicly disclosed. The IBM X-Force report data showed that exploits are often publicly disclosed tens or hundreds of days after the vulnerabilities they target. If it is taking a long time for these exploits to surface, it may be taking a long time for networks to patch.

Continued growth of Internet botnets -- IBM X-Force saw an upward trend in Trojan botnet activity during 2010. This growth is significant because despite increasing coordinated efforts to shut down botnet activity, this threat appeared to be gaining momentum. However, IBM X-Force’s data did illustrate the dramatic impact of a successful effort in early 2010 to shutdown the Waledac botnet, which resulted in an instantaneous drop off in observed command and control traffic. On the other hand, the Zeus botnet continued to evolve and constituted a significant portion of the botnet activity detected by IBM X-Force in 2010. Due to its extreme popularity with attackers, there are hundreds, or even thousands, of separate Zeus botnets active at any given time. The Zeus botnet malware is commonly used by attackers to steal banking information from infected computers.

About the IBM X-Force Trend and Risk Report

The IBM X-Force Trend and Risk Report is an annual assessment of the security landscape, designed to help clients better understand the latest security risks, and stay ahead of these threats.  The report gathers facts from numerous intelligence sources, including its database of over 50,000 computer security vulnerabilities, its global Web crawler and its international spam collectors, and the real-time monitoring of 13-billion security events every day for nearly 4,000 clients in more than 130 countries.  These 13-billion events monitored each day – more than 150,000 per second – are a result of the work done in IBM’s nine, global Security Operations Centers (SOC), which is provided as a Managed Security Service to clients.

With more than 40 years of security development and innovation, IBM is the only company with the breadth and depth of research, products, services, consulting and global business partners to deliver end-to-end security. IBM has nine worldwide research labs innovating security technology and nine security operations centers around the world to help global clients maintain the appropriate security posture.

To access the report, visit: http://www-03.ibm.com/security/landscape.html.
For more information on IBM Security Solutions, visit: www.ibm.com/security and http://www-03.ibm.com/press/us/en/presskit/33537.wss.
To learn more about the IBM Institute for Advanced Security, visit: http://www.instituteforadvancedsecurity.com/.

Deborah Boyce
Account Executive
+1 416 355 7425

Ketchum. Passion and Precision in Communication.
A proud partner of Room to Read; World Change Starts with Educated Children ®
Our goal is to reach more than 10 million children by 2015.

PRNews 2010 Large Firm of the Year and a Best Place to Work in PR

Please consider the environment before printing this e-mail.

 

 

----------------------------
This message is intended only for the person or entity to which it is addressed and may contain information that is privileged, confidential or otherwise protected from disclosure. Dissemination, distribution or copying of this message or the information herein by anyone other than the intended recipient, or an employee or agent responsible for delivering the message to the intended recipient, is prohibited. If you have received this message by mistake, please destroy it immediately and notify the sender.
----------------------------

CHECK POINT FIRST TO COMPLETE NSS LABS' NEXT GENERATION FIREWALL TEST AND EARN "RECOMMEND" RATING

Image001

 

 

NEWS RELEASE

 

CONTACTS:  David Eisenstadt                                                       

                        The Communications Group Inc.

                        416-696-9900 ext 36

                        deisenstadt@tcgpr.com

 

CHECK POINT FIRST TO COMPLETE NSS LABS’ NEXT GENERATION FIREWALL TEST

AND EARN “RECOMMEND” RATING

 

Check Point’s Power-1 receives 100 per cent effectiveness in firewall, application control and identity awareness tests

 

CALGARY, AB – APRIL 5, 2011Check Point® Software Technologies Ltd. (Nasdaq: CHKP), the worldwide leader in securing the Internet, today announced Check Point has completed testing by NSS Labs, achieving 100 per cent in firewall, identity awareness and application control enforcement tests – and earning the industry’s first NSS Labs “Recommend” rating for Next Generation Firewalls (NGFW).

 

“Firewalls have been the cornerstone of network security but are now being called to fulfill additional roles in light of emerging Web 2.0 trends and other business drivers,” said Rick Moy, president at NSS Labs. “In our tests, we took the same approach that today’s cybercriminals would in attempting to breach the firewall. The NSS Labs Next Generation Firewall Test is the only one of its kind and provides enterprises with a rigorous and truly independent analysis.”

 

NSS Labs, a leader in independent security product testing and research, is known to conduct the most comprehensive third-party testing in the industry, providing real-world research and analysis to enterprises, government agencies and organizations of all sizes. NSS Labs tested the Check Point Power-1 11065 against their Next Generation Firewall Test Methodology and is comprised of 1,179 live exploits and across a wide variety of traffic, payload sizes and protocols. According to the report, “Check Point’s management interface was well designed and intuitive. For multi-gigabit environments looking to upgrade defense from their current firewalls to a next generation firewall, the Check Point Power-1 11065 provides excellent protection and an outstanding three-year total cost of ownership (TCO).”

 

Key findings from the report highlight Check Point’s exceptional next generational firewall security capabilities, including:

 

·         Passed 100 per cent of Traditional Firewall Tests – passed comprehensive firewall security and policy enforcement requirements. In addition, Check Point Power-1 11065 also achieved a 97.3 percent tuned block rate for integrated IPS1 and 86.6 per cent out-of-the-box protection in a recent NSS Labs IPS Group test.

 

·         Passed 100 per cent of Application Identification and Control Tests – correctly identified a range of applications and enforced policies across a variety of applications, such as SSH, social networking, Instant Messaging, Skype and other Web 2.0 widgets.

 

·         Passed 100 per cent of User and Group Identity Awareness Tests – successfully identified users and enforced all firewall policies with direct integration to Active Directory.

 

·         Passed 100 per cent of Tested Evasions – successfully identified and blocked attacks using evasion and obfuscation techniques.

 

·         Low TCO – Delivering impressive price for performance to customers at $49 per Mbps-protected.

 

“Internet use in the office has changed dramatically with the wide adoption of social networking and Web 2.0 applications. To achieve the level of protection needed in modern day business environments, IT administrators must go beyond simply blocking specific ports or protocols, and instead, apply granular application control to enable better visibility and protection –without inhibiting the flow of business,” said Oded Gonda, vice president of network security solutions at Check Point Software Technologies. “The NSS Labs results validate our leadership in Next Generation Firewall and our ability to consistently deliver innovative, high-performing and trusted network security solutions to the market.”

 

Check Point’s latest software Release R75 based on the Software Blade Architecture™, enables organizations to benefit from easy access to Application Control, Identity Awareness and Intrusion Prevention capabilities at multi-gigabit speeds, in a single solution. The NSS results demonstrate Check Point’s ability to provide customers with a combination of robust security technology, user awareness and broad application control—each necessary for organizations to utilize Web 2.0 tools without jeopardizing the security of the business. In addition, customers benefit from unmatched application visibility by leveraging Check Point AppWiki, the world's largest application library, now with over 100,000 Web 2.0 applications and social networking widgets. For more information or to access the full NSS Labs Next Generation Firewall Test report, visit:http://www.checkpoint.com/campaigns/nss-next-gen-firewall/index.html.

 

“Attacks like Operator Aurora, Koobface and Stuxnet have changed the way the industry thinks about security. And while the threat landscape has evolved drastically over the past several years, our focus has always been to secure the Internet and enable businesses. We remain committed to providing our customers with the tools and protection they need to stay ahead of future threats,” concluded Gonda. 

 

1 NSS Labs Network Intrusion Prevention Systems Comparative Group Test, December 2010.

 

-30-

 

About NSS Labs, Inc.

NSS Labs, Inc. is the leading independent, information security research and testing organization. Its expert analyses provide information technology professionals with the unbiased data they need to select and maintain complex security products for their organizations. Pioneering intrusion detection and prevention system testing with the publication of the first such test criteria in 1999, NSS Labs evaluates firewall, unified threat management, anti-malware, encryption, web application firewall, and other technologies on a regular basis. The firm’s real-world test methodology is the only one to assess security products against live Internet threats. NSS Labs tests are considered the most aggressive in the industry. Founded in 1991, the company has offices in Carlsbad, California and Austin, Texas. For more information, visit www.nsslabs.com.

 

About Check Point Software Technologies Ltd. 

Check Point Software Technologies Ltd. (www.checkpoint.com), the worldwide leader in securing the Internet, is the only vendor to deliver Total Security for networks, data and endpoints, unified under a single management framework. Check Point provides customers with uncompromised protection against all types of threats, reduces security complexity and lowers total cost of ownership. Check Point first pioneered the industry with FireWall-1 and its patented stateful inspection technology. Today, Check Point continues to innovate with the development of the Software Blade architecture. The dynamic Software Blade architecture delivers secure, flexible and simple solutions that can be fully customized to meet the exact security needs of any organization or environment. Check Point customers include tens of thousands of businesses and organizations of all sizes including all Fortune 100 companies. Check Point's award-winning ZoneAlarm solutions protect millions of consumers from hackers, spyware and identity theft.

 

©2011 Check Point Software Technologies Ltd. All rights reserved.

Intel Xeon Processor E7 Family Delivers Record-Breaking Performance, New Security, Reliability and Energy Efficiency Features

Image001


Performance + Reliability + Security = Intel Xeon Processor Formula for Mission-Critical Computing

 

SANTA CLARA, Calif., April 5, 2011 – Enabling IT departments to better manage data-intensive environments through new security and reliability features and record-breaking performance, a new family of server processors that accelerate mission-critical computing have been announced by Intel Corporation.

 

The record-setting Intel® Xeon® processor E7-8800/4800/2800 product families build on Intel's previous generation of server processors to set a new standard for high-end computing applications, including business intelligence, real-time data analytics and virtualization. Strengthening the line of defense for data centers, the new processors also provide advanced security features that ensure greater data integrity.

 

Based on Intel's leading 32-nanometer (nm) process technology, the new Intel Xeon processors have up to 10 cores with Intel® Hyper-Threading Technology, and deliver up to 40 percent greater performance than the Intel® Xeon® 7500 series processor. Concurrently, a new energy-saving feature reduces the power draw of idle portions of the chip. Beginning today, more than 35 systems based on the Intel Xeon processor E7 family are expected to ship from manufacturers around the world.

 

"Intel has been changing the economics for mission-critical computing server deployments for more than a decade, and today we are raising the bar yet again," said Kirk Skaugen, vice president and general manager of Intel's Data Center Group. "The new Intel Xeon processor E7 family delivers record breaking performance with powerful new security, reliability and energy efficiency enhancements. The industry momentum we're seeing for this new server processor architecture is unparalleled in Intel's history. The days of IT organizations being forced to deploy expensive, closed RISC architectures for mission-critical applications are nearing an end."

 

Record-Breaking, Energy-Efficient Performance
The new processor family contains 18 new processors for two-, four- and eight-socket servers, and is expandable to servers with 256 sockets. It also sets more than a dozen world records in performance. A 40 percent improvement in generational compute-intensive performance can enhance the pace and accuracy of applications in such fields as scientific research and financial services where speed is essential. With up to 25 percent better performance with virtual machine
3 applications than the current generation, the new chips also hold the industry's highest virtualization performance.

 

IT managers seeking to achieve greater economic efficiencies can replace 18 dual-core servers2 with a single Xeon processor E7-based server. To help address rising energy costs, the new Xeon chips include Intel® Intelligent Power technology that dynamically reduces idle power consumption of the chip based on the workload while also delivering advanced processor power-management capabilities.

 

Recognizing the range of compute-intensive applications from climate modeling to real-time business analytics, and the need for uncompromised performance to run them, Intel is offering 10 advanced 10-core versions of the chip, led by the E7-8870, E7-4870 and E7-2870, all of which reach 2.4 GHz with a TDP (Thermal Design Point) of 130 watts.

 

The company also announced a version of the chip that combines the benefits of high performance with low voltage, as well as a frequency-optimized version. The 10-core low-voltage E7-8867L reaches 2.13 GHz with a TDP of 105 watts, while the eight-core frequency-optimized E7-8837 tops out at 2.67 GHz with a TDP of 130 watts.

 

Intel Xeon processor E7 family based-platforms add a massive 2 Terabyte of memory in a four-socket system supported by the new processors. Most of these chips also contain Intel® Turbo Boost Technology, Intel Hyper-Threading Technology and Intel® Virtualization Technology (VT), which can increase performance as required, ease multitasking and enhance reliability and manageability, respectively.

 

New Security, Reliability Features
Intel is bringing its leading security technologies available today in its mainstream Intel® Xeon® processor 5600 series, to the mission-critical server segment with the introduction of platforms based on the Xeon processor E7 family. Intel® Advanced Encryption Standard New Instruction (AES-NI) allows systems to quickly encrypt and decrypt data running over a range of applications and transactions, while Intel® Trusted Execution Technology (Intel TXT) creates a secure platform at boot-up by protecting applications from malicious threats.

 

Together, these security features can ensure that virtualized environments are more reliably secure when they are launched, migrated or at rest, as well as experience better performance and functionality.

 

Extensive Industry Support
Starting today, system manufacturers from around the world are expected to announce more than 35 Xeon processor E7 family-based platforms. These manufacturers include Bull*, Cisco*, Cray*, Dawning*, Dell*, Fujitsu*, Hitachi*, HP*, Huawei*, IBM*, Inspur*, Lenovo*, NEC*, Oracle*, PowerLeader*, Quanta*, SGI*, Supermicro* and Unisys*.

 

Numerous enterprise software vendors also support Xeon processor E7 family-based platforms, including IBM*, Microsoft*, Oracle*, Red Hat*, SAP AG* and VMware*.

 

Ideal Servers for Small Business
Intel also announced today the Intel® Xeon® processor E3-1200 family, an entry-level server processor built to meet the unique demands of small business applications, ranging from collaboration tools to storage and back-up applications. With up to 30 percent greater performance over the previous generation, the Xeon processor E3-1200 product family is faster and provides higher reliability than a desktop computer running similar applications. Support for Error Correcting Code (ECC) memory ensures system reliability by preventing glitches that cause data breaches and downtime, and with small businesses facing a harsher climate of security threats the Xeon processor E3-1200 product family helps ensure the integrity of valuable data with Intel AES-NI and Intel TXT.

 

Today's news follows the recent disclosures about the low-power, single-socket Intel Xeon processors E3-1260L and E3-1220L targeted for micro servers, and the announcement of the Intel® Xeon® processor E3-1200 product family for workstations.

 

Product, Pricing Details
The Xeon processor E7-8800/4800/2800 families range in price from $774 to $4,616 in quantities of 1,000. The Xeon processor E3-1200 family ranges in price from $189 to $612 in quantities of 1,000. Complete pricing details can be found in the multimedia press kit.

 

For more details on these new Intel Xeon processors, visit www.intel.com/xeon. For more details on world records and other claims, visit www.intel.com/performance/server/.

About Intel
Intel (NASDAQ: INTC) is a world leader in computing innovation. The company designs and builds the essential technologies that serve as the foundation for the world’s computing devices. Additional information about Intel is available at newsroom.intel.com and blogs.intel.com.

 

Intel, Intel Xeon and the Intel logo are trademarks of Intel Corporation in the United States and other countries.

 

* Other names and brands may be claimed as the property of others.

 

1 SPECint*_rate_base2006 benchmark comparing next-generation Intel® Xeon® processor E7-4870 (30M cache, 2.40GHz, 6.40GT/s Intel® QPI) scoring 1,010 (includes Intel Compiler XE2011 improvements accounting for about 11 percent of the performance boost) to X7560 (24M cache, 2.26GHz, 6.40GT/s Intel QPI) scoring 723 (Intel Compiler 11.1).  Source: Intel SSG TR#1131.

 

2 Intel measurements as of March 2011 of Xeon  E7-4800 and dual 4-socket systems. Performance comparison using SPECint_rate_base2006. Results have been estimated based on internal Intel analysis and are provided for informational purposes only. Any difference in system hardware or software design or configuration may affect actual performance.

 

3 Up to 2.8x scaling transaction improvement claim based on internal OLTP benchmark comparing next-generation Intel® Xeon® processor E7-4870 (30M cache, 2.40GHz, 6.40GT/s Intel® QPI, codenamed “Westmere-EX”) scoring 2.73M transactions (leading database vendor) to X5680 (12M cache, 3.33GHz, 6.40GT/s Intel QPI, formerly codenamed “Westmere-EP”) scoring 970K transactions. Source: Intel SSG TR#1120.

 

Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist in fully evaluating your contemplated purchases, including the performance of that product when combined with other products.

 

Performance tests and ratings are measured using specific computer systems and/or components and reflect the approximate performance of Intel products as measured by those tests. Any difference in system hardware or software design or configuration may affect actual performance. Buyers should consult other sources of information to evaluate the performance of systems or components they are considering purchasing. For more information on performance tests and on the performance of Intel products, visit www.intel.com/performance/resources or call (U.S.) 800-628-8686 or 916-356-3104

 


 

 

http://www.hillandknowlton.com/oldbinaries/hksig_logo.gif

 

Natasha Parnanzone

 

Consultant

 

Hill & Knowlton Canada

 

 

Direct Line: +1 416 413 4740

 

 

Fax: +1 416 413 1550

 

 

natasha.parnanzone@hillandknowlton.ca

 

 

 

 

 

160 Bloor Street East, Suite 700, Toronto, Ontario, M4W 3P7 Canada

 

http://www.hillandknowlton.com

 

 

 



Privileged/Confidential Information may be contained in this message. If you are not the addressee indicated in this message (or responsible for delivery of the message to such person), you may not copy or deliver this message to anyone. In such case, you should destroy this message and kindly notify the sender by reply email. Please advise immediately if you or your employer does not consent to email or messages of this kind. Opinions, conclusions and other information in this message that do not relate to the official business of Hill & Knowlton Canada shall be understood as neither given nor endorsed by it.

: Global Systems Integrator CSC Chooses Symplified to Power New Cloud Security Offering


CSC Introduces CloudIAM Identity and Access Management Solution

FALLS CHURCH, Va.--(BUSINESS WIRE)--CSC (NYSE: CSC) today announced CSC CloudIAM, a comprehensive cloud-based Identity and Access Management (IAM) solution built with cloud security company, Symplified®. CSC CloudIAM addresses the security and technical challenges faced by government and commercial enterprises who are transitioning applications to the cloud. This is accomplished by leveraging clients’ existing credential stores and extending to them IAM features such as Single Sign-On (SSO), Role-Based Access (RBAC) and centralized audit logging for Software-as-a-Service (SaaS) applications.

CloudIAM helps to overcome a primary inhibitor to cloud adoption – the management of access and control – when cloud-based SaaS applications are delivered by different service providers. The operational advantages of CloudIAM include:

• Providing an SSO experience to employees that maintains control over user credentials.

• Controlling access to applications based on individual employee functions.

• Providing automated on-boarding and off-boarding to improve efficiency and eliminate security holes when employees are hired and depart the company.

• The ability to quickly and efficiently respond to requests for detailed access logs for SaaS applications to meet compliance auditing requirements.

“CloudIAM is perfectly suited for companies that have a mixture of in-house and SaaS applications, and are experiencing difficulties managing identity and access,” said Siki Giunta, vice president, Cloud Computing and Software Services, CSC. “By offering this solution, CSC is providing the end-to-end capabilities that break down barriers to cloud adoption and help businesses achieve the agility, efficiency and competitive advantages of as-a-service.”

CSC CloudIAM is powered by Symplified, a cloud service for Identity and Access Management that includes access control, centralized authentication, single sign-on, user management, identity virtualization, compliance and auditing.

“In order for large enterprises and government agencies to adopt Cloud computing, they must be able to integrate this new environment with their existing IT infrastructures and enforce the requisite levels of security, access control, and policy enforcement,” said Eric Olden, CEO and Founder of Symplified. “Symplified provides a comprehensive identity and access management suite that was purpose-built for the Cloud, yet supports data center resources including directories, authentication systems and other identity technologies. We are pleased to be working with CSC to provide the underlying technology engine for the CloudIAM solution.”

CloudIAM is deployed from CSC’s Trusted Cloud Data Centers, and is being introduced first in North America with EMEA and other regions soon to follow. Initial set-up includes access to the administrative portal, seat license per end user, connectors to hundreds of leading SaaS and private cloud applications, ongoing administration, and customer support and training for local administrators of the solution. Optional CSC services for CloudIAM include IAM consulting and the creation of additional connectors which enable CloudIAM to control access to any SAML or HTTP-based application.

To learn more about how to mitigate risk and simplify administration with next generation Identity and Access Management solutions, tune into the CSC webinar on Wednesday, April 13, by registering here.
For more information on CSC Application Portfolio Management, visit www.csc.com/applications and for information on the CSC Trusted Cloud services, visit www.csc.com/cloud.

About CSC

CSC is a global leader in providing technology-enabled solutions and services through three primary lines of business. These include Business Solutions and Services, the Managed Services Sector and the North American Public Sector. CSC’s advanced capabilities include system design and integration, information technology and business process outsourcing, applications software development, Web and application hosting, mission support and management consulting. The company has been recognized as a leader in the industry, including being named by FORTUNE Magazine as one of the World’s Most Admired Companies for Information Technology Services (2011). Headquartered in Falls Church, Va., CSC has approximately 93,000 employees and reported revenue of $16.2 billion for the 12 months ended December 31, 2010. For more information, visit the company’s website at www.csc.com.

About Symplified | The Cloud Security Company

Symplified provides the trust fabric of the Cloud by enabling companies to extend and enforce identity and access management policies on cloud applications. The Company is the market share leader in cloud identity with more than 1 million seats of the Symplified Suite currently deployed by Fortune 500 and small medium businesses. The Symplified Suite is the only complete cloud security platform that unifies Web access management, federated SSO, auditing and user provisioning. Symplified’s management team has been developing pioneering identity and access management solutions for 15 years, and created Web access management market maker Securant and the ClearTrust product, which was acquired by RSA Security. Symplified is headquartered in Boulder, Colo., with offices in Palo Alto, Calif. Visit us on the Web at www.symplified.com.

###-----------------------------------------------------------------------
This message was sent to editor. If you no longer wish to receive email from us, please follow the link below or copy and paste the entire link into your browser. http://www.xmr3.com/rm/1517061-35188361-2-20-AV1-EF9A/pr@itincanada.ca/HCS8371

MetaSEO Awarded as a Leading SEO Company

 

MetaSEO.com, a Canadian search engine optimization company based in Montreal, has been awarded “Best in Search” and identified as an outstanding search engine optimization firm by TopSEOs

Is this email not displaying correctly?
View it in your browser.

 

MetaSEO Awarded as a Leading SEO Company

MetaSEO.com, a Canadian search engine optimization company based in Montreal, has been awarded “Best in Search” and identified as an outstanding search engine optimization firm by TopSEOs (http://canada.topseos.com/rankings-of-best-seo-companies), an independent authority on search vendors.

MetaSEO has secured the 4th rank on this month’s chart for the leading search engine optimization companies in Canada. The monthly rankings published by TopSEOs is a guide to the best internet marketing vendors in the industry.

TopSEOs compiles the monthly list of leading search marketing firms after a rigorous evaluation process which includes:

  • Competitive Edge
  • Services Offered and Pricing
  • Customer Service
  • Innovations and Development
  • Overall Efficiency
  • Overall Performance

MetaSEO is included in this list for its consistent performance and superior services rendered to its clients.

“The whole industry looks to us to identify reliable and accurate benchmarks and MetaSEO has proven by its performance that they deserve to be on this coveted list”, shared Jeev Trika, partner at TopSEOs.

As well as being rated Top 5 for search engine optimization services, MetaSEO also received Top 5 rankings for SEO-related services such as Link Building, Local Search, Reputation Management and Social Media Marketing.

Elazar Cohen, Founder & CEO at MetaSEO comments, “First of all, we would like to thank all our customers for putting their trust in our services and providing great feedback on services rendered. This is great news and we will strive to make sure we continue living up to our clients’ expectations. Our customers’ campaigns bring them great ROI, and this is truly gratifying for us.”

For more information about MetaSEO, log on to http://www.metaseo.com/

About METASEO

MetaSEO is a Canadian search engine optimization consulting firm with its headquarters in Montreal, Quebec. We provide you with the strategies and implementations necessary to drive traffic and sales to your online commerce or website. At MetaSEO we get your website to work for YOU !

 follow on Twitter | friend on Facebook | forward to a friend 

Copyright © 2011 MetaSEO - Internet Marketing Services, All rights reserved.
You are receiving this newsletter because you subscribed to our mailing list.
Our mailing address is:

MetaSEO - Internet Marketing Services

2320 Ward #602

Montreal, Quebec H4M 2V5


Add us to your address book

 unsubscribe from this list | update subscription preferences | view email in browser  

Image002

Nimsoft Launches Nimsoft Unified Manager, a Single Solution Combining IT Monitoring and Service Management

Image001


Nimsoft Launches Nimsoft Unified Manager, a Single Solution Combining IT Monitoring and Service Management

Highly Adaptable, Multi-Tenant IT Management-As-A-Service Solution  Designed to Meet Modern IT’s Rapidly Evolving Business Needs

 

CAMPBELL, Calif. – April 5, 2011 – Nimsoft today announced Nimsoft Unified Manager, a multi-tenant IT Management As-A-Service solution that combines industry-leading infrastructure monitoring and ready-to-use ITIL-based service management capabilities in a single solution.

 

By unifying monitoring and service management, Nimsoft Unified Manager empowers service providers and IT organizations to more efficiently and effectively optimize delivery of IT services to business users across internal and external IT infrastructures―including public and private cloud environments. 

 

The solution is built on the successful Nimsoft Monitoring Solution (now known as Nimsoft Monitor) and the customer-proven Nimsoft Service Desk technology.

 

“The need to constantly drive down costs, combined with ever-expanding technology complexity, are driving IT organizations to adopt new technologies and processes,” said David Coyle, research vice president, IT operations at Gartner.  “Flexible, unified solutions that promote integration between monitoring and management will be key selection criteria over the coming years.”

 

Nimsoft Unified Manager provides intuitive, out-of-the-box logic and bi-directional integration between monitoring and service management to meet the needs of today’s collaborative, fast-paced IT operations.  It will be offered either on-demand (SaaS) or on-premise.

 

This integration between monitoring and service management radically improves the productivity of IT operations―helping to ensure that problems and potential problems are quickly and accurately addressed based on their impact to the business.

 

"Managing client private cloud infrastructure and protecting sensitive client data in globally distributed data centers is our business. Now the Nimsoft Unified Manager gives our ZoneIT Private Cloud clients visibility into their virtual systems and our customer service team improved support tools to scale,” commented Dan Dayanim, Director, Client Services Delivery at IPR International, LLC.  “We’ve been searching for a unified solution that pulls together monitoring for our multi-vendor private cloud infrastructure with our ITIL service delivery model and a centralized multi-tenant client portal. We’re excited that the Nimsoft platform fits our strategic direction and will help drive growth."

 

Nimsoft Unified Manager features an intuitive, unified experience that guides users through ITIL-based workflows—from alarms to alerts to problem resolution—while streamlining service delivery, enabling reduced business downtime and improved service quality. 

 

Built on a proven, lightweight multi-tenant architecture, Nimsoft Unified Manager enables businesses and service providers to embrace established, emerging and future technology maximizing service quality and reducing total cost of ownership and overall IT complexity. 

 

Additional capabilities of Nimsoft Unified Manager include:

· Comprehensive monitoring of infrastructure elements—including servers, storage, network devices and security appliances—across public and private cloud environments

· Response-time monitoring of applications and services

· Intelligent threshold and policy driven alerting

· ITIL-based service management workflows

· Collaboration tools for operations and help-desk staff

· Shared configuration management database (CMDB)

· Intuitive dashboards and reporting

· Extensive APIs interface to third-party solutions and technologies

· Secure, segmented customer views

 

“Business moves too fast for companies to get bogged down in costly implementations of complex IT management applications that can’t respond to constant changes in modern IT infrastructure and services,” said Gary Read, Nimsoft CEO.  “With Nimsoft Unified Manager, our customers can maintain the deep visibility they need into the computing environments that form the central nervous system of today’s modern IT organizations and deliver critical highly available services at low costs whether in the data center or the cloud.”

 

Nimsoft Unified Manager features flexible licensing, deploy-as-you-need implementation, and will be offered with a choice of on-premise or on-demand SaaS delivery.

 

To view a live webcast on Nimsoft Unified Manager on April 5 from 8-10 AM Pacific Time, please visit http://live-webcast.com/events/nimsoft/announcement/registration.htm   For a replay, visit http://www.nimsoft.com/support/resources/webinars.

 

Supporting Quotes

Being able to offer our clients this combined SaaS monitoring and service desk solution is a significant benefit," commented Barry White, Operations Director at MNIS. "We see the offering as a clear path for us to increase the ways we can help our clients improve visibility, reporting and management of their business processes and operations, ultimately resulting in measurable business success.”

 

“We use Nimsoft solutions to nimbly and cost-efficiently deliver highly reliable services to a demanding and rapidly growing client base,” said Chris Poe, CTO at Atrion Networking Corporation, a New England-based service provider and systems integrator to the mid- and small enterprise market.  “By enabling the consolidation of an even broader set of infrastructure monitoring and service management capabilities into a single platform, we believe Nimsoft Unified Manager will empower service providers and IT organizations to provide even greater value to their clients and create improved operational efficiencies—allowing organizations to more effectively run their IT operations.”

 

“In today’s demanding business climate, where information is rapidly changing and moving in the data center and the cloud, failure is not an option,” said Kalyan Kumar, AVP and worldwide head cross tower functional services HCL Technologies. “The need for unified tools that can effectively manage the situation, drive down operational costs and mitigate risk has grown exponentially. This expansion of Nimsoft offerings to include both monitoring and service desk capabilities in Nimsoft Unified Manager provides us with a simple, proven way to manage a modern IT infrastructure."

 

“As a technology partner to Nimsoft, we expect to see strong market acceptance of the Nimsoft Unified Manager solution," said JF Lauri, Managing Director at ERP management company AGENTIL. “The solution combines proven capabilities, and gives service providers and IT organizations an efficient technology solution that to us, represents the next generation of ITSM management and monitoring."

 

“The Nimsoft Unified Manager solution helps us enable organizations to easily account for and manage the ever-changing needs of today's evolving business environment,” said Dave Lewis, CEO at systems integration, training and consultancy company Mibtree. “The fact that Nimsoft has successfully brought together the IT monitoring and service management sides of the equation will prove to be a tremendous asset to business. It’s yet another example of the company’s commitment to offering a comprehensive approach to IT for the modern organization.”

 

“As a Nimsoft IT service management alliance partner, we see tremendous business value in offering a wide variety of IT capabilities as a utility service,” said Jason Bystrak, Director of Sales, Ingram Micro North America’s Services Division. “Nimsoft Unified Manager will further enable our mutual cloud and managed service provider partners to offer detailed insight and comprehensive service management features to today's increasingly mobile and socially connected end user community. This flexible solution will help ensure our partners are well equipped to manage today's constantly evolving modern IT services and infrastructure in a more cost effective and efficient manner.”

 

About Nimsoft

Nimsoft provides integrated, modern IT management solutions for more than 1000 enterprise and service provider customers globally, including 1&1, CDW, SoftLayer, Sur La Table, TriNet, and Virgin America. The company’s Nimsoft Unified Manager is an industry-leading solution which helps organizations easily monitor and manage IT services in increasingly complex business environments. Nimsoft products integrate with existing solutions at any point from the data center to the cloud, and are available on a pay-as-you-go basis. For more information, visit www.nimsoft.com

 

Legal Notices

Copyright © 2011 CA. All Rights Reserved. One CA Plaza, Islandia, N.Y. 11749. ITIL is a Registered Trade Mark of the Office of Government Commerce in the United Kingdom and other countries. Nimsoft is a trademark of Nimsoft Inc. All other trademarks, trade names, service marks and logos referenced herein belong to their respective companies. 

 

 

 


 

 

http://www.hillandknowlton.com/oldbinaries/hksig_logo.gif

 

Rachel Halpern

 

Assistant Consultant

 

Hill & Knowlton Canada

 

 

Direct Line: 416.413.4646

 

 

Mobile/Cell: 416.500.4740

 

 

Fax: 416.413.1550

 

 

rachel.halpern@hillandknowlton.ca

 

 

 

 

 

160 Bloor Street East Suite 700, Toronto, Ontario, M4W 3P7 Canada

 

http://www.hillandknowlton.com

 

 

 



Privileged/Confidential Information may be contained in this message. If you are not the addressee indicated in this message (or responsible for delivery of the message to such person), you may not copy or deliver this message to anyone. In such case, you should destroy this message and kindly notify the sender by reply email. Please advise immediately if you or your employer does not consent to email or messages of this kind. Opinions, conclusions and other information in this message that do not relate to the official business of Hill & Knowlton Canada shall be understood as neither given nor endorsed by it.

News: Ingram, HP BladeSystem Matrix

From: "Marie Rourke (Meoli)" <marie@whitefoxpr.com>
Date: April 5, 2011 12:19:14 AM EDT
To: 'Christopher Rogers' <chris.rogers@itincanada.ca>, Michael O'Neil <michael.oneil@itincanada.ca>
Subject: News: Ingram, HP BladeSystem Matrix

Hi there!  Some quick news for you… technically, we’re still waiting for HP’s approval, but given the event is underway, I am pushing this out and asking for forgiveness.  
J  So here we go!
 
HP’s BladeSystem Matrix, and all the support that comes with it, are now offered in Ingram Micro’s Buffalo-based Solution Center. Given the demands around the technology, the addition of the HP BladeSystem Matrix in the Solution Center is a big win for Ingram Micro and its North America channel partners – especially those focused on the data center and private cloud.  
 
Now partners can demo the technology in action to help speed the sales cycle and show the value of the all-in-one converged solution to customers and prospects (and there’s no charge to use the Solution Center or demo the equipment). This added value, combined with the continued support of Ingram Micro’s Advanced Computing Division, gives HP partners the technical, sales and field expertise and resources they want (and need) to more effectively market and sell the HP BladeSystem Matrix.
 
Any Qs, let me know!  
 
 
 
 
 
For Immediate Release
Ingram Micro Empowers Channel Partners to Sell Next Generation
HP Data-Center Solutions
 
Distributor’s Advanced Computing Division Hosts HP Converged Infrastructure Launch Event in Buffalo, NY April 5-6; Unveils new HP BladeSystem Matrix in Solution Center
 
SANTA ANA, Calif., April 5, 2011  Building on its data center solutions expertise, the Advanced Computing Division of Ingram Micro Inc.(NYSE: IM) is pleased to announce the HP BladeSystem Matrix is now available for demonstration within the distributor’s multi-million dollar Buffalo, NY-based Solution Center.
 
To accelerate demand and generate greater awareness, the distributor is hosting a HP Converged Infrastructure training and education event in Buffalo, NY April 5-6.
 
The HP BladeSystem Matrix solution is supported by Ingram Micro’s Advanced Computing Division and available to authorized HP channel partners in the U.S. and Canada. In addition to using Ingram Micro’s best-in-class Solution Centers, HP and Ingram Micro channel partners have access to a variety of enablement resources. These include technology-focused and business-minded training and educational seminars, boot camps and webinars. Custom configuration services, technical support, pre- and post-sales support, and co-branded marketing collateral are also offered as part of the Division’s partner value-add.
 
“The HP BladeSystem Matrix is an all-in-one converged infrastructure solution that brings the benefits of shared services to life and makes it easier for channel partners to establish a private cloud for small and mid-sized businesses, as well as enterprise players,” says Fran Murello, senior engineer, Ingram Micro’s Buffalo-based Solution Center.  “It’s a great conversation starter for discussing the business value of converged infrastructure and cloud computing and now that it’s available for demo within the Ingram Micro Solution Center, channel partners can show their customers and prospects firsthand the technology in action.” 
 
As the market’s first truly converged infrastructure solution, the HP BladeSystem Matrix provisions complex infrastructure and applications in minutes rather than months, and helps channel partners reduce customers’ total cost of ownership by up to 56% versus traditional infrastructure reports HP. 
 
With the support of Ingram Micro’s Advanced Computing Division and Solution Centers, HP is able to provide mutual Ingram Micro channel partners with the technical, sales and field expertise and resources needed to effectively market and sell the HP BladeSystem Matrix.
 
For more information about Ingram Micro’s Solution Center visit www.im-sc.com. Ingram Micro’s Advanced Computing Division waslaunched last year to deliver greater opportunity, specialization and business value to channel partners throughout North America who market, sell and support higher-end technology solutions and services.
 
Follow Ingram Micro Inc. on Twitter at www.twitter.com/IngramMicroInc.