Global Market Share Report: Trend Micro #1 Again in Virtualization Security

Global Market Share Report: Trend Micro #1 Again in Virtualization Security
For the second consecutive year, Trend Micro takes the global market lead in virtualization security, according to independent third-party report.

CUPERTINO, Calif., June 18, 2012 /PRNewswire/ -- Trend Micro Inc. (TYO: 4704;TSE: 4704), a global cloud security leader, today announced that the company holds the largest share – 10 to 12 percent -- in the global virtualization security management solutions market, according to The Global Virtualization Security Management Solutions Market 2011-2015, published by independent market research company TechNavio. TechNavio also recently placed Trend Micro #1 in the cloud security market share.

The report cited Trend Micro's wide range of virtualization security solution offerings for virtual environments, and its geographic diversity compared to its competitors. The report also credits the strategic acquisition of Third Brigade, along with Trend Micro's strong partnership network with Microsoft, HP, IBM, VMware, and more for helping Trend Micro expand its virtualization security product offering and lead the market.

The healthy virtualization security market, stated the report, is expected to grow at a CAGR of 49.53 percent within the next three years. Although the Americas is the major contributor to the market, with a share of 51–53 percent, the Europe, Middle East, and Africa (EMEA) region and the Asia Pacific (APAC) region are also coming up as strong contributors in the market.

This follows other recent third-party reports that validate Trend Micro's stature in cloud and virtualization security:

Trend Micro™ Deep Security is the company's flagship virtualization security product. With the general availability of Deep Security 8, Trend Micro provides the industry's first and only agentless security platform combining agentless anti-malware, integrity monitoring, IDS/IPS, web application protection and firewall in a single security virtual appliance for VMware virtual machines.
First introduced to the market less than two years ago, Deep Security:

  • Provides system and application security across physical, virtual, and cloud environments, meeting the challenges of operational security and compliance needs of today's dynamic data center.
  • Combines intrusion detection and prevention, web application protection, firewall, integrity monitoring, log inspection and anti-malware capabilities in a single, centrally managed enterprise software solution.
  • Has over 1500 licensed customers – many from Global 2000 companies -- of its agentless security suite for virtual environments.  Of these, the largest agentless deployment was for over 6000 virtual machines, and another deployment targeting 300 virtual machines in production per host.
  • Is designed by a company that has been on the forefront of driving new innovation in virtualization security collaboratively with platform leaders like VMware. In recognition of its leadership in this space, Trend Micro was named VMware's Technology Alliance Partner of the Year in 2011 and the recipient of the first Cloud Security Alliance Industry Leadership Award in 2012.

"Our success in cloud and virtualization innovation continues to propel our business and technology strategies forward, and this report is another validation of that reality. In the post-PC cloud era, Trend Micro envisions a security framework that follows and protects both businesses and individuals across evolving computing environments, applications and devices," said Steve Quane, Chief Product Officer, Trend Micro.

About Trend Micro
Trend Micro Incorporated (TYO: 4704;TSE: 4704), a global cloud security leader, creates a world safe for exchanging digital information with its Internet content security and threat management solutions for businesses and consumers.  A pioneer in server security with over 20 years' experience, we deliver top-ranked client, server and cloud-based security that fits our customers' and partners' needs, stops new threats faster, and protects data in physical, virtualized and cloud environments. Powered by the industry-leading Trend Micro™ Smart Protection Network™ cloud computing security infrastructure, our products and services stop threats where they emerge – from the Internet. They are supported by 1,000+ threat intelligence experts around the globe. 

Additional information about Trend Micro Incorporated and the products and services are available at Trend Micro.com. This Trend Micro news release and other announcements are available at http://newsroom.trendmicro.com/  and as part of an RSS feed at www.trendmicro.com/rss.   Or follow our news on Twitter at @TrendMicro.

Sean Forkan Appointed New Country Manager for Symantec Canada

Sean Forkan Appointed New Country Manager for Symantec Canada

TORONTO, Canada – June 14, 2012 – Symantec Corp. (Nasdaq: SYMC) today announced the appointment of Sean Forkan as the new country manager for Symantec’s enterprise business in Canada.


No stranger to the technology landscape, Forkan has more than 20 years experience in a senior leadership and sales capacity within the Canadian operations of top tier multinationals. He joins Symantec from Oracle Canada where he served as the Area Vice President. Prior to this, Forkan achieved a series of progressively more senior positions during a ten year career at Cisco Systems.


Click to Tweet: Sean Forkan appointed new country manager for @SymantecCanada: http://bit.ly/KMHUNp


As the country manager, Forkan is responsible for managing the day to day operations driving Symantec’s sales, marketing and channel partnerships, distribution and systems engineering across Canada.


“Canada is an important market for Symantec and we took care to find the right person for the role,” said Rich Spring, senior vice president of Americas Sales at Symantec. “Our customer base in the enterprise and public sector will be well served by Sean’s experience and approach. Add to this his knowledge of the channel and it is clear this will help to make Symantec the demanded brand to protect and manage information in the Canadian market.”


Based in Toronto, Ontario, Forkan will report in to Brett Shirk, vice president East Region & Canada at Symantec.


“Sean is an enthusiastic leader with the ability to inspire confidence and secure commitment to achieving mutual goals,” said Shirk. “He is adept at developing innovative solutions to complex business problems, developing critical business alliances, and at identifying and seizing market opportunities.”


Sean has a Bachelor of Engineering and Management degree from McMaster University, Hamilton, Ontario.


About Symantec

Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world. Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com.

Gartner Identifies Five Tactics to Protect IT Investment Funding

Gartner Identifies Five Tactics to Protect IT Investment Funding

Analysts to Discuss IT Budget Management for New Projects at Gartner Program and Portfolio Management & IT Governance Summit 2012, June 19-20, in London

STAMFORD, Conn., June 13, 2012—

Almost every CIO identifies reducing operational expenditure and increasing the amount spent on IT investments as a top priority.* However, many fail to manage properly the operational costs of IT investment in new programs, which can erode investment funding, according to Gartner, Inc.

"Organizations that overspend on operational activity have little money left to invest in new projects. Without reinvestment, organizations cannot restructure and optimize their operational spending," said Stewart Buchanan, research vice president at Gartner. "This results in rising non-discretionary costs, which in turn result in further underinvestment, lack of competitiveness, failing client service and loss of revenue. This makes future spending even less affordable and even less avoidable. Program and project managers need to break their organization out of this spiral of terminal decline."

To help CIOs and IT professionals avoid this spiral, Gartner has identified five tactics to help manage IT investment in new programs.

  • Diagnose the investment challenges your organization faces and change governance to improve the way they are managed.

The cost of a new project's implementation, and the ongoing operational expenditure derived from it, are often treated separately. It's imperative to link project and operational spending together and not manage them in silos. If the increase in operating costs from new projects is not sustainable, it can drain IT budgets and reduce the scope for future investments, leading to a downward spiral.

  • Keep a log of nasty surprises your organization has faced in budget management. Plan ways to detect and avoid similar events in future.

Hidden costs can be most dangerous. In many organizations, particularly in Europe, the Middle East and Africa, it is now mandatory to forecast future operating costs in project plans. However, over optimism is still widespread when it comes to planning. Common misjudgments in planning new projects include: underestimating support costs because a new kind of service has never been managed before; dependency on sole suppliers, which then raise costs; failure to account for demand shifts.

  • Create a single portfolio view of assets, services and project spending.

Link project and operational spending management by removing silos. One way may be to require service managers and project managers to work together on business case approval. When working on business case approvals, ensure that new operating expenditures are identified through a total cost of ownership analysis. It is also important to create a process that funds new operational expenditure resulting from projects — some companies already provide a budget for operational spending as part of their project costs.

  • Plan asset and service lifecycles to identify when investment is needed.

New projects and the assets or services they create are often seen as being very valuable to organizations. However, this value tends to depreciate, and this process does not stop at zero because IT assets and services usually cost money to support, maintain and retire. For example, many IT assets or services contain data that must remain readable to ensure legal and regulatory compliance. Whether the decision is to replace, refresh or retire these assets or services, it can involve unforeseen expenditure that can eat away at IT budgets. Without proper lifecycle planning the organization may be unaware of cost implications and fail to plan for them. The result is that money badly needed for strategic projects may end up being used to "take out the trash."

  • Plan for success by agreeing how wider deployments will be paid for (for example, through chargeback, contingency funding or further projects).

Often IT is expected to deliver "more with less", and achieve exponential increases in computing power. However, many IT organizations are at a point where it is time to deliver "less with less", if there remains a business goal to continue reducing IT spending. The success of a project can have the effect of increasing demand. Therefore, it is just as important to manage demand for a service or asset as it is to manage the project itself. Otherwise, efficiencies and savings can be wiped out and funding for future projects jeopardized.

Mr. Buchanan will discuss IT investment funding at the Gartner PPM & IT Governance Summit 2012, which will run from June 19 to 20, in London. For additional information on the Summit, please visit www.gartner.com/eu/ppm. Members of the press can register by contacting Robert van der Meulen at Gartner on + 44 (0) 1787 267 738 or at rob.vandermeulen@gartner.com. Information from the event will be shared on Twitter at http://twitter.com/Gartner_inc using #GartnerPPM.

* Findings from Gartner 2012 Executive Program Worldwide CIO Survey http://www.gartner.com/it/page.jsp?id=1897514

Gartner PPM & IT Governance Summit 2012

The Gartner PPM & IT Governance Summit 2012 will focus on balancing resources, demand and benefits amid a volatile economic environment. The Summit aims to help organizations improve how they select, implement, and manage IT projects and investments. Gartner analysts will advise on how to master tactics that deliver reliably, maintain a lean and agile organization, gain an accurate view of all the different projects' strategic values, and ensure benefits are realized.

Contacts:

Christy Pettey
Gartner
+1 408 468 8312
christy.pettey@gartner.com

Rob van der Meulen
Gartner
+44 0 1784 267892
rob.vandermeulen@gartner.com


About Gartner:
Gartner, Inc. (NYSE: IT) is the world's leading information technology research and advisory company. Gartner delivers the technology-related insight necessary for its clients to make the right decisions, every day. From CIOs and senior IT leaders in corporations and government agencies, to business leaders in high-tech and telecom enterprises and professional services firms, to technology investors, Gartner is the valuable partner to clients in 12,000 distinct organizations. Through the resources of Gartner Research, Gartner Executive Programs, Gartner Consulting and Gartner Events, Gartner works with every client to research, analyze and interpret the business of IT within the context of their individual role. Founded in 1979, Gartner is headquartered in Stamford, Connecticut, U.S.A., and has 5,000 associates, including 1,280 research analysts and consultants, and clients in 85 countries. For more information, www.gartner.com.

Canada Smartphone Market Set to Grow at CAGR 14% Says TechSci Research

Canada Smartphone Market Set to Grow at CAGR 14% Says TechSci Research

Increasing competition, product innovation, low penetration and availability of smartphones in all price ranges to boost smartphone sales in Canada

FOR IMMEDIATE RELEASE

PRLog (Press Release) - Jun 15, 2012 -
Canadians are fast adaptor of new technology and hence, are shifting from feature phones to smartphones rapidly. Smartphones have added value to the traditional feature phones in a lot of sense and have become an integral part of people’s lifestyle, around the globe. It is estimated that around 9.1 Million Canadian have migrated from feature phones to smartphones by the end of 2011. There are several factors which are encouraging customer to buy smartphones such as emails, navigation systems, playing games, listening music, watching videos, accessing social networking websites and now the artificial intelligence apps like Apple’s Siri
.
According to recently published report by TechSci Research “Canada Smartphone Market Forecast & Opportunities, 2017” the Canadian Smartphone market was dominated by Research In Motion till 2011, which introduced Blackberry series feature phones initially and then, shifted to smartphones segment. However, Blackberry is facing stiff competition from rivals like Apples iPhone and Samsungs Galaxy series of Smartphone’s. According to the recent sales figures Apple has already pushed Blackberry to the second position in 2012. It is estimated that Canada would have 20 Million smartphone users by 2017.

The entry of the Asian players, especially from China and South Korea in the Canadian Smartphones arena are expected to cause dynamic alteration in the segment. Unlike other countries, where Samsung is dominating the smartphone market, Canada smartphone market depicts different trend. South Korean player, Samsung is expected to remain third largest vendor in the Canada smartphone market, behind RIM and Apple. Other Chinese players like ZTE and Huawei, are expected to increase their market share with the introduction of new technologies and features.

Canada Smartphone market is in the growing phase of the life cycle which is expected generate high return on investments considering the increasing demand from consumer for more advanced phones which can perform all the tasks one expects to do with a laptop or tablet pc.

“Canada Smartphone Market Forecast and opportunities, 2017” provides detailed and prejudiced overview on the Canadian Smartphone market. This report helps reader to identify the ongoing trends in the industry and anticipated growth in future depending upon changing industry dynamics in the coming years. The report will help industry consultants, smartphone manufacturers, application developers and other service providers to align their market centric strategies according to ongoing and expected trends in future.

PwCAnnounces 2012 BC Techmap Tracking Technology Sector Genealogy and Growth

PwCAnnounces 2012 BC Techmap Tracking Technology Sector Genealogy and Growth
Friday, June 15, 2012

Vancouver, BC, June 15, 2012--(T-Net)--The British Columbia technology sector is showing continued growth, innovation and diversification, in spite of uncertain economic times, according to new research released by PwC.


“PwC is excited to deliver this Beta version of the 2012 PwC BC Techmap, which provides a dynamic online resource for the technology industry, investors, government and other stakeholders, plus a valuable history of the BC technology sector,” said Michael Calyniuk, partner at PwC and leader of PwC's Techmap initiative. “PwC has invested considerable resources in the BC Techmap since 1997 as we strongly believe technology is a very important part of the BC economy. Technology companies bring innovation, investments, education options, stable and interesting employment opportunities to our province.”


The Beta version of the 2012 Techmap shows approximately 1400 technology companies, related research and educational institutions in BC, which is about 48% growth from the 942 shown in the 2003 edition of the BC Techmap.


In 2011 BC's technology sector employed approximately 89,000 people, accounting for about 4% of provincial employment. Since 2003 employment in the technology sector grew at a yearly average of 3.2% per year, compared to the average annual employment growth of 1.7% for all of BC. (Source: BC Statistics, British Columbia High Technology Sector -2010 Edition; PwC calculations)


The British Columbia TechmapTM (Techmap) was first developed by PwC in 1997 and updated in 2003 and 2012. The Techmap examines the genealogy of BC's technology companies dating back to the 1890's. Mergers, acquisitions, closures and the movement of technology and key industry people are depicted. The 2012 Techmap-Beta version is the product of over 10 months of research and is now presented in digital format.


In 2012 PwC surveyed over 3,100 BC technology companies and institutions; to date about 18% have responded. The final version of the 2012 Techmap is expected to be complete once more companies submit their survey responses, follow up interviews are held and data are verified. This process is expected to take a further 2 months.


Quick facts from the 2012 BC Techmap-Beta version:

  • Reflecting a more diverse industry, companies on the Techmap are now classified into 11 clusters, compared to nine in 2003: Software, Mobile & web, Cloud integration, Electronics & peripherals, Telecommunications & wireless communications, Life sciences, Digital & media, Advanced manufacturing & semi conductors, Energy technology, Clean technology, Services & analytics.
  • The Software cluster is currently the largest, with 981 companies.
  • The largest family tree originates from The University of British Columbia, with linkages to 60 organizations.
  • The former BC Tel is among the earliest technology pioneers, with roots going back to 1891.

Calyniuk added: “We decided on a Beta release for 2012 before going final. Based on PwC's experience with the 2003 Techmap many firms who were surveyed and did not submit data came forward after the Techmap was printed and wanted to participate. This time we are leaving the 2012 survey database open for another 30 or 40 days to give companies a chance to be included in the large printed poster of the 2012 Techmap. The online Techmap will continue to be available for update in the future.”


Digital depiction of the 2012 BC Techmap was supported by Overinteractive Media Inc. Online hosting of the 2012 Techmap is provided by Radiant Communications.


The PwC 2012 BC Techmap-Beta version will be available after 5:00pm PST on June 14 at : www.pwctechmaps.com


For further information or to arrange an interview with one of the PwC Techmap team, please contact Jim Nelson, PwC, at 604-806-7047, or at jim.nelson@ca.pwc.com.



About PwC Canada


PwC Canada helps organizations and individuals create the value they're looking for. More than 5,700 partners and staff in offices across the country are committed to delivering quality in assurance, tax, consulting and deals services. PwC Canada is a member of the PwC network of firms with close to 169,000 people in 158 countries. Find out more by visiting us at www.pwc.com/ca.© 2012 PricewaterhouseCoopers LLP, an Ontario limited liability partnership. All rights reserved.PwC refers to the Canadian member firm, and may sometimes refer to the PwC network. Each member firm is a separate legal entity. Please see www.pwc.com/structure for further details.

New Online Resource From KPMG Helps Business Execs Clarify "Tax In The Cloud" Questions

New Online Resource From KPMG Helps Business Execs Clarify "Tax In The Cloud" Questions
 

NEW YORK, June 14, 2012 /PRNewswire/ -- As organizations focus on how to use cloud technology in their business, KPMG International has launched a new online resource aimed at helping them navigate the tax challenges in the evolving landscape for cloud-related transactions.

The resource, Country Perspectives on Taxing the Cloud, examines how tax authorities are approaching the challenge of taxing the cloud in 18 key countries, and can be found at www.kpmg.com/taxingthecloud.

"Cloud computing is fast becoming an attractive option for managing operational and client service needs of businesses and consumers in the United States and across the globe," said Steven Fortier, principal-in-charge of KPMG's U.S. Tax in the Cloud initiative. "Yet most tax authorities have yet to develop detailed rules and guidance for cloud-based operating models, and many business executives are neither evaluating the tax implications of cloud nor do they know if these factors are being evaluated within their organizations."

The new KPMG tool is designed to help users and providers of cloud computing services as they plan their operations and activities and work to manage their tax exposure while gaining the desired benefits from this new technology.

"Companies should expect added scrutiny as tax authorities become more aware of revenue implications they may face with the switch to a cloud-based operating model," Fortier said.

In the new online tool, KPMG member firms worldwide provide insight into how tax authorities across the globe are approaching the challenge of analyzing cloud computing from a tax perspective by examining the local country provisions in place, the likely interpretations under such provisions and potential taxes associated with cloud transactions.

Key takeaways from KPMG's current analysis include the following:

  • A company moving to a cloud-based business model should examine its local country tax position to consider the character and source of the cloud income and/or payments and whether the cloud operations result in new or additional income, withholding or indirect taxes.
  • Executives need to be mindful of the location of the servers and other infrastructure to take advantage of local incentives, while managing possible permanent establishment challenges made in the jurisdiction in which the infrastructure is located.

In connection with these points, KPMG's Fortier advised companies to involve their tax department early in the shift toward Cloud technology. "By doing so," he said, "companies can best manage potential tax risks and help ensure they are not losing out on planning opportunities or subjecting themselves to additional direct or indirect taxes."

Commenting on the new online tool, Fortier said KPMG will continue to add countries to the resource as jurisdictions provide more clarity on the local treatment of cloud transactions. Even at this stage, it is clear that significant tax issues for both providers and users of cloud do exist and that those issues multiply when the transactions cross borders, he added.

About KPMG LLP

KPMG LLP, the audit, tax and advisory firm (www.kpmg.com/us), is the U.S. member firm of KPMG International Cooperative ("KPMG International"). KPMG International's member firms have 145,000 people, including more than 8,000 partners, in 152 countries.

About KPMG International

KPMG is a global network of professional firms providing Audit, Tax and Advisory services.  We operate in 152 countries and have 145,000 people working in member firms around the world.  The independent member firms of the KPMG network are affiliated with KPMG International Cooperative ("KPMG International"), a Swiss entity. Each KPMG firm is a legally distinct and separate entity and describes itself as such.

Contact:

Robert Nihen/Deborah Primiano


KPMG LLP


201-307-8296/8495

SOURCE KPMG LLP

Back to top RELATED LINKS
http://www.kpmg.com/us

WD(R) Enters Wireless Home Networking Market, Ushers in New Era of Blazing Fast HD Entertainment Streaming

WD® Enters Wireless Home Networking Market, Ushers in New Era of Blazing Fast HD Entertainment Streaming

My Net™ Family of Dual-Band Routers with Exclusive FasTrack™ Technology Accelerates Video and Games using Intelligent, Real-Time Entertainment Prioritization

IRVINE, Calif. – June 14, 2012 – Western Digital (NASDAQ:WDC), the world's leader in external storage solutions and maker of the popular WD TV® media player family, today unveils its first line of wireless home networking products, designed specifically to accelerate movies, video and gaming, delivering a premium high-definition entertainment experience. With the My Net family of powerful and easy-to-use home networking products, WD debuts its exclusive FasTrack™ technology that instantly detects entertainment traffic on the network and fast-forwards it to gaming consoles, media players, smart TVs, tablets, smartphones, computers and other Wi-Fi connected devices. 

“With so many people within the home simultaneously watching movies, playing games and browsing the Web via their iPad®, iPhone®, Xbox® and other devices, the network demands placed on today’s connected home has grown exponentially,” states Jim Welsh, executive vice president for WD's branded products and consumer electronics groups. “Our successes in creating Connected Home solutions with our WD TV media players and personal cloud products have given us valuable insights into the network-overload problems of  home wireless users, and entering the wireless home networking market offers WD an exciting opportunity to strengthen our Connected Home offerings that are aimed at enhancing the home entertainment experience for consumers.”

Accelerated Entertainment
According to Nielsen and NM Incite’s recent U.S. Digital Consumer Report1, data from the fourth quarter of 2011 shows that 33 percent of consumers streamed a movie or TV show from the Internet through a subscription service such as Netflix™ or Hulu Plus™. Internet video services, multi-player online gaming sites, and live video chat services, combined with the explosive growth of tablets, smartphones and other devices that connect to the home network, have created a new model of home entertainment and Internet usage.

With the industry’s only full line of HD dual-band wireless N routers, My Net customers can fully enjoy this new age of home entertainment. WD’s exclusive FasTrack optimization technology intelligently and automatically prioritizes Internet favorites like Netflix, Hulu Plus, VUDU, YouTube™, Xbox® LIVE, Skype™ and others, to create a smooth streaming experience in up to Full-HD 1080p quality. By using real-time analysis to maximize bandwidth for entertainment services, My Net routers provide a premium entertainment experience on any screen in the home that is connected to the router. 

Streamlined Setup and Ease-of-Use
The sleek hardware design of the My Net family of routers is complementary to the devices’ friendly and intuitive user interface, which was designed by a veteran team of developers to enable quick router setup from wireless or wired devices such as iPads and other mobile devices, as well as PCs and Mac® computers. The streamlined router setup is designed to make it easy for novice users to be up and running in minutes, while also providing all the customization tools expert users crave. The included My Net Dashboard makes it easy for users to customize, monitor or change the settings of the network, including setting parental controls, Internet security, guest network access, network name and password, printer and scanner settings, and mapping storage drives, all in one easy view.

New Combination Router, Personal Cloud and Automatic Wireless Backup
In addition to getting a premium home entertainment experience with My Net routers, customers can centralize storage and backup for all the computers in their home, as well as create a personal cloud for their digital media and remotely access those files anytime, anywhere. Part of the My Net family, My Net N900 Central is WD’s all-in-one N900 router with an integrated 1 TB or 2 TB internal hard drive. Remote access to My Net N900 Central is available on any computer through www.WD2go.com and with WD mobile apps for iPad, iPhone, iPod touch® or Android™ smartphones and tablets.       

In addition to keeping content safe at home and always accessible while away from home, users can rely on My Net N900 Central for automatic wireless backup with the included WD SmartWare™ software for Windows®, while Mac users can utilize all the features of Apple® Time Machine® backup software. Additionally, any WD external hard drive with SmartWare software can connect directly to a My Net router to wirelessly backup all PC computers in the home.

My Net Router Family

  • My Net N900 Central – The My Net N900 Central HD dual-band storage router provides accelerated HD streaming plus integrated storage for wireless backup and remote access. With FasTrack™ Plus optimization technology, My Net N900 Central delivers high quality, accelerated HD entertainment that is intelligently and automatically prioritized to ensure smooth streaming. The wireless-N storage router features fast wireless performance with speeds up to 900 Mbps (450 + 450 Mbps on the 2.4 and 5 GHz bands combined), as well as integrated 1 TB or 2 TB internal storage for automatic wireless backup. My Net N900 Central includes 4 LAN and 1 WLAN Gigabit Ethernet ports for up to 10/100/1000 Mbps wired speeds, 1 USB port for additional storage, printer and media share server use, and range amplifier antennas for extended range. Additionally, My Net N900 Central is Universal Plug and Play (UPnP) and Digital Living Network Alliance (DLNA) certified for easy detection and connection of Wi-Fi devices.
  • My Net N900 – The My Net N900 HD dual-band router also provides a premium entertainment experience for movies, games, video, music, video chat and more. The My Net N900 offers the ultimate performance for all connected devices in the home, even while streaming to multiple devices at the same time. The exclusive FasTrack Plus technology provides intelligent, real-time traffic prioritization for simultaneous HD and 3D media streaming and online gaming. The wireless-N router features high wireless performance with speeds up to 900 Mbps (450 + 450 Mbps on the 2.4 and 5 Ghz bands combined) and also includes 7 LAN and 1 WLAN Gigabit Ethernet ports for up to 10/100/1000 Mbps wired speeds, 2 USB ports for additional storage, printer and media share server use, and range amplifier antennas for extended range. Additionally, My Net N900 is UPnP and DLNA certified.
  • My Net N750 – The My Net N750 HD dual-band router is optimized to deliver multiple simultaneous HD media streams on the network, delivering accelerated video to all connected wireless and wired devices. WD’s exclusive FasTrack technology detects entertainment traffic and prioritizes bandwidth on the network to smoothly stream multiple HD movies, shows, games and more to connected devices. The router provides a combined data rate of up to 750 Mbps (300 + 450 Mbps) and features 5 Gigabit Ethernet ports and 2 USB ports.
  • My Net N600 – The My Net N600 HD dual-band router is ideal for simple and fast web surfing and entertainment streaming with FasTrack technology for a smooth HD viewing experience. The router provides a combined data rate of up to 600 Mbps (300 + 300 Mbps) and features 5 Fast Ethernet ports with 1 USB port.   
  • My Net Switch – My Net Switch is an 8-Port Gigabit home entertainment switch, ideal for instantly expanding your wired connections with super fast Gigabit Ethernet up to 10/100/1000 Mbps.

Pricing


My Net Switch

My Net N600

My Net N750

My Net N900

My Net N900 Central (1TB)

My Net N900 Central (2TB)

$69.99
MSRP USD

$79.99
MSRP USD

$119.99
MSRP USD

$179.99
MSRP USD

$299.99
MSRP USD

$349.99
MSRP USD

Availability
My Net N900, My Net N750, My Net N600 and My Net Switch will be available June 14 at select U.S. retailers and online at wdstore.com. My Net N900 Central will be available next quarter.

About WD
WD, a storage industry pioneer and long-time leader, provides products and services for people and organizations that collect, manage and use digital information. The company designs and produces reliable, high-performance hard drives and solid state drives that keep users' data accessible and secure from loss. Its storage technologies serve a wide range of host applications including client and enterprise computing, embedded systems and consumer electronics, as well as its own storage systems. Its home entertainment products enable rich engagement with stored digital content.

WD was founded in 1970. The company's products are marketed to leading OEMs, systems manufacturers, selected resellers and retailers under the Western Digital®, WD® and HGST™ brand names. Visit the Investor section of the company's website (www.westerndigital.com) to access a variety of financial and investor information.

This press release contains forward-looking statements, including statements relating to expected availability dates for My Net family of routers. These forward-looking statements are subject to risks and uncertainties that could cause actual results to differ materially from those expressed in the forward-looking statements, including changes in markets, demand, global economic conditions and other risks and uncertainties listed in Western Digital’s recent SEC filings, to which your attention is directed. Readers are cautioned not to place undue reliance on these forward-looking statements, which speak on as of the date hereof, and WD undertakes no obligation to update these forward-looking statements to reflect subsequent events or circumstances.

1 State of the Media: U.S. Digital Consumer Report, Q3-Q4 2011

Salesforce.com and Twitter Announce Global Strategic Alliance

SAN FRANCISCO, June 13, 2012 /PRNewswire/ -- Salesforce.com [NYSE: CRM], the enterprise cloud computing company (http://www.salesforce.com/cloudcomputing/), and Twitter today announced a strategic global alliance to provide Twitter's Firehose of public Tweets to Salesforce Radian6 customers. This powerful combination allows businesses to analyze the more than 400 million Tweets generated daily to listen, fuel engagement and gain customer insight. This latest effort builds on an existing three-year relationship between the two social pioneers.  

Comments on the News:

  • "Twitter has changed the way people around the world communicate and interact with brands," said Marcel LeBrun, SVP and GM for Salesforce Radian6. "The alliance between Twitter and salesforce.com enables companies to apply the power of social listening and engagement to over 400 million Tweets daily, providing opportunities for social enterprises to engage, solve problems, gain followers and build brand identity."
  • "Companies look to Twitter to connect with their customers in real time about the things that matter to them. Salesforce.com understands how to facilitate these interactions," said Jana Messerschmidt, vice president of Business Development at Twitter. "Combining the power of Salesforce Radian6 with Twitter helps companies understand and respond to their customers as these conversations are happening."

Salesforce.com and Twitter Global Strategic Alliance

Salesforce.com and Twitter have announced a global strategic alliance that provides full access to the Twitter Firehose of public Tweets to Salesforce Radian6 customers. This alliance allows social enterprises to turn the massive volume of social conversations about their products, brand and industry into dynamic engagements that strengthen customer relationships. As companies continue to transform their business for today's social world, this alliance empowers them to engage with customers in entirely new ways.

Supporting Resources

About Salesforce.com

With more than 100,000 customers, salesforce.com is the enterprise cloud computing company that is leading the shift to the social enterprise. Social enterprises leverage social, mobile and open cloud technologies to put customers at the heart of their business. Based on salesforce.com's real-time, multitenant architecture, the company's platform and application services allow customers to:

  • Create employee social networks with Salesforce Chatter, Salesforce Rypple and Salesforce Force.com.
  • Develop customer social networks with the Salesforce Sales Cloud, Salesforce Service Cloud and Salesforce Data.com.
  • Connect with customers on public social networks with Salesforce Heroku, Salesforce Radian6 and Salesforce Site.com.
  • Empower small businesses to become social enterprises with Salesforce Desk.com and Salesforce Do.com.
  • Extend a company's social enterprise with apps from the leading enterprise app marketplace, AppExchange.
  • Run apps on Database.com, the first social enterprise database.

Any unreleased services or features referenced in this or other press releases or public statements are not currently available and may not be delivered on time or at all. Customers who purchase salesforce.com applications should make their purchase decisions based upon features that are currently available. Salesforce.com has headquarters in San Francisco, with offices in Europe and Asia, and trades on the New York Stock Exchange under the ticker symbol "CRM." For more information please visit http://salesforce.com, or call 1-800-NO-SOFTWARE.

©2012 salesforce.com, inc. All rights reserved. Salesforce.com, Salesforce, Chatter, Sales Cloud, Service Cloud, Radian6, Jigsaw, AppExchange, Force.com, Heroku, and all associated logos are trademarks of salesforce.com, inc. in the United States and other countries. Salesforce.com offers its Siteforce products and services in Germany under the Force.com Sites trademark. Other names used herein may be trademarks of their respective owners.  Other names used herein may be trademarks of their respective owners.

SOURCE salesforce.com

McAfee Report Reveals a Disconnect Between Perceived and Real Security Levels in Canadian Governments

McAfee Report Reveals a Disconnect Between Perceived and Real Security
Levels in Canadian Governments

Eighty per cent were ‘Confident’ or ‘Very Confident’ in their
Ability to Protect Mission Critical Data, Yet 82.5 per cent Experienced
a Data Breach in the Past 12 Months

Markham, ON - June 14, 2012 - According to a recent report released
today by McAfee - conducted by Leger Marketing, titled, “McAfee’s
Canadian Public Sector Security Report,”  -  77.5 per cent of Canadian
government IT security software decision-makers identify security as a
strategic objective. The findings also suggest that for the most part,
government bodies seem to be more reactive than proactive and strategic
when it comes to managing and implementing their security strategies.

“Despite their larger than average IT department size, governments
just don’t seem to have the time, resources or budget to effectively
stay ahead of the threats curve,” said Ross Allen, Vice President,
Canada, U.K. and Ireland at McAfee, Inc. “Understanding security
challenges and threats begins at the top level of government in order to
establish sufficient IT budgets that will support trusted security
strategies and technologies to combat today’s ever-evolving threats
more successfully.”

Sixty-two point five per cent (62.5%) of respondents indicated that
identifying security threats is a bigger challenge when compared with
remediating attacks. However, 57.5 per cent (57.5%) of respondents
reported more time was spent on remediation efforts, which indicates a
reactionary approach to security. Almost 88 per cent (87.5%) of
respondents reported difficulty in learning about new threats and
solutions, while dealing with existing security issues.

Other Key Findings:

Security Threats In the Past 12 Months
● 97.5% have been exposed to some type of security challenge or
threat over the past year
● While 80% of respondents were ‘confident’ or ‘very
confident’ in their ability to protect mission critical data, 82.5%
have experienced data loss or suffered from a breach
● The most common types of threats dealt with over the past year were
virus attacks (75%), malware (60%), end-user exposure to malicious
websites
(40%), network attacks (37.5%), and end-user installation of
unauthorized applications on computer or mobile devices (35%)

Impact of Data Breaches and Cost of Threats Suffered
● 40% of respondents experienced loss of productivity as a result of
a data breach
● 37.5%  suffered reputational damage and 35% experienced a loss of
public confidence
● 30% have lost confidential information
● 30% were subject to a privacy investigation
● 82.5% of respondents estimated the total IT support costs of
dealing with security threats are between three to 25% (55% from 3-10%;
27% from 11-25%)

Understanding of and Protecting Against Breach Activity
● While 70% indicated they have the security infrastructure in place
to mitigate current breach activity, 30% do not believe they can protect
against present-day breach activity or said they don’t know
● 37.5% do not understand their current risk exposure
● 77.5% of government IT managers and IT specialists indicated a
disconnect between themselves and their CIOs and Directors when it comes
to their perception of real and perceived threats
● IT managers and IT specialists are more likely to emphasize a need
to focus budget on end-user behaviour and staffing (audit, tracking,
education and IT security skillsets), while CIOs and Directors are more
likely to focus IT budgets on the purchase of products, services and
functionality
● Most respondents learn about emerging threats from industry
publications (67.5%) and colleagues (52.5%), followed by mainstream
media coverage and other technology vendors, each at 37.5%
● The biggest security concerns are network security (72.5%), data
centre security (62.5%), mobile security (57.5%) and bring your own
device (BYOD) security (55%)

Social Media and BYOD
● 62.5% of respondents allow their employees to access social media
sites and 56 per cent of those believe this increases their exposure to
risk
● Of the 37.5% who do not allow their employees to access social
media sites, 73.3% believe this mitigates risk
● 40% allow BYOD and access to the network, but of those, only 25%
have a sound security policy in place for BYOD

Management Approach and Security Investment
● While only 22.5% manage networks, devices, systems, databases and
endpoints from a single or unified console, 45% would prefer having an
integrated single management view or outsourcing it to a third-party
service provider (32.5%)
● 50% indicate that 21% or more of IT time is spent on ensuring IT
security is compliant with regulations; while 22.5% estimate this to
take between 41% and 60% of IT time
● 65% indicate new security software purchases in the next 12 months
are ‘likely’ or ‘100% certain, while 25% are ‘neutral’ and 10%
are ‘not likely’ or ‘not likely at all’ to purchase new
software
● 80% of respondents say security will require an increase in
spending over the next one to three years
● Although 50% do not feel lack of budget is the primary factor
inhibiting security investment, 42.5% indicated lack of budget was the
number one factor inhibiting security investment
● Other than lack of budget, the greatest factors inhibiting security
investment are poor interoperability of solutions (37.5%), the
complexity of security software (32.5%) and little recognition of
security problems (30%)

“We have seen a real shift in the threat landscape over the past five
or six years,” said Warren Shiau, Director of Research at Leger
Marketing. “There has been a significant increase in breaches
resulting from end-user behaviour and organizations need to be better
prepared to manage these risks. It is not just about protecting against
malicious links, it is about educating and raising the overall security
awareness of employees.”

Conclusions/Recommendations
● Enhance national mechanisms to share security knowledge. Security
issues are not static - they are constantly evolving. Governments must
look for cost-effective ways to share information about e
merging threats
and especially those that are introduced with new corporate initiatives
such as cloud computing and bring your own device (BYOD).
● Enable the creation, maintenance and sharing of security best
practices. Securing government organizations is more than just about
investing in new security countermeasures. Government organizations need
more guidance when it comes to successfully deploying and maintaining
security tools that are not only effective against attacks, but are also
cost-effective. In some instances, acquired technologies are never
implemented and as a result, many do not reach their full potential. The
sharing of information across all levels and departments of governments
will help increase user awareness levels about what security
technologies exist, how to properly integrate them and how to measure
their effectiveness.
● Bridge the private sector to help. In the cases of threat knowledge
and enabling protective programs, the government should build bridges
with the private sector to build better capacity for expertise, training
initiatives and best practices.
● Increase awareness around the protection and movement of data.
Malicious activity has transitioned away from the intent to create
computing chaos to benefits from outcomes like financial gain and
embarrassment. Having an understanding of an organization’s storage
policies and the value of its data will help make prioritizing efforts
easier to ensure better protection.
● Governments need to become more adept at responding to new
technologies and threats. One example is BYOD where only 25 per cent
(25%) of respondents have a sound security policy in place. As trends
such as the consumerization of IT continue to grow in popularity, more
people rely on their personal and corporate-owned mobile devices to do
their jobs. Governments need to be build mechanisms where they see the
onset of emerging technologies and must engage early so they can gain
knowledge, develop protection strategies and share information across
the country.

“Companies spent far too long with their heads in the sand,” said
Chris Timmons, Senior Manager of Information Security at Edmonton-based
ATB Financial, a crown corporation with 5,000 employees. “If users
really want to do something, they will find a way. You need to be
proactive with your security policies because users will do it, whether
you want them to or not.”

About the Report
McAfee Canada commissioned Leger Marketing to interview IT security
software decision-makers in Federal, Provincial and Municipal
governments. The interviews were completed during the month of February
2012 and included a total of 40 randomly selected IT security software
decision makers with final decision making authority on security
software purchases, or selection, within the total population of
Canadian government top IT security software professionals. The
interviews represent a “snapshot” of the current Government security
software landscape and are indicative of government IT security
experience, behaviour and intent; they are not, however, equivalent to a
probability sample yielding quantitative margin of error.

About McAfee
McAfee, a wholly owned subsidiary of Intel Corporation (NASDAQ:INTC),
is the world's largest dedicated security technology company. McAfee
delivers proactive and proven solutions and services that help secure
systems, networks, and mobile devices around the world, allowing users
to safely connect to the Internet, browse and shop the Web more
securely. Backed by its unrivaled Global Threat Intelligence, McAfee
creates innovative products that empower home users, businesses, the
public sector and service providers by enabling them to prove compliance
with regulations, protect data, prevent disruptions, identify
vulnerabilities, and continuously monitor and improve their security.
McAfee is relentlessly focused on constantly finding new ways to keep
our customers safe. http://www.mcafee.com.

McAfee Canada is headqua
rtered in Markham, Ontario, with regional
offices across Canada. The company's Consumer Software Research and
Development facility in based in Waterloo, Ontario.

About Leger Marketing
Leger Marketing - the largest Canadian-owned polling firm - also owns
The Research Intelligence Group (TRIG) in the United States,
LegerWeb.com, the biggest panel in Canada with 400,000 panelists, Leger
Analytics, for advanced statistical analysis, and Leger Strategic
Consulting, a division that specializes in communication and strategic
positioning.

-30 -

Sean Forkan Appointed New Country Manager for Symantec Canada

Sean Forkan Appointed New Country Manager for Symantec Canada

 

TORONTO – June 14, 2012 – Symantec Corp. (NASDAQ: SYMC) today announced the appointment of Sean Forkan as the new country manager for Symantec's enterprise business in Canada.

No stranger to the technology landscape, Forkan has more than 20 years experience in a senior leadership and sales capacity within the Canadian operations of top tier multinationals. He joins Symantec from Oracle Canada where he served as the Area Vice President. Prior to this, Forkan achieved a series of progressively more senior positions during a ten year career at Cisco Systems.

Click to Tweet: Sean Forkan appointed new country manager for @SymantecCanada: http://bit.ly/KMHUNp

As the country manager, Forkan is responsible for managing the day to day operations driving Symantec's sales, marketing and channel partnerships, distribution and systems engineering across Canada.

"Canada is an important market for Symantec and we took care to find the right person for the role," said Rich Spring, senior vice president of Americas Sales at Symantec. "Our customer base in the enterprise and public sector will be well served by Sean's experience and approach. Add to this his knowledge of the channel and it is clear this will help to make Symantec the demanded brand to protect and manage information in the Canadian market."

Based in Toronto, Ontario, Forkan will report in to Brett Shirk, vice president East Region & Canada at Symantec.

"Sean is an enthusiastic leader with the ability to inspire confidence and secure commitment to achieving mutual goals," said Shirk. "He is adept at developing innovative solutions to complex business problems, developing critical business alliances, and at identifying and seizing market opportunities."

Sean has a Bachelor of Engineering and Management degree from McMaster University, Hamilton, Ontario.

 

About Symantec

Symantec’s Canadian operations are headquartered in Toronto with offices in Montreal, Ottawa, Calgary and Vancouver.  For more information on Symantec products or current promotions, access Symantec’s Canadian Web site at www.symantec.ca. Symantec is an active member of the Business Software Alliance (BSA). Symantec is a global leader in providing security, storage and systems management solutions to help consumers and organizations secure and manage their information-driven world.  Our software and services protect against more risks at more points, more completely and efficiently, enabling confidence wherever information is used or stored. More information is available at www.symantec.com or by connecting with Symantec at: go.symantec.com/socialmedia.  

                                                                                            

###