<?xml version="1.0" encoding="utf-8"?>
<rss version="2.0" xmlns:media="http://search.yahoo.com/mrss/" xmlns:georss="http://www.georss.org/georss">
  <channel>
    <image>
      <title>ReleaseWire</title>
      <url>http://media.releasewire.com/photos/show/?id=68004&amp;size=small</url>
      <link>http://www.releasewire.com/</link>
    </image>
    <title>MediaPR.net, Inc - Latest Press Releases on ReleaseWire</title>
    <link>http://www.releasewire.com/company/mediaprnet-inc-14081.htm</link>
    <description/>
    <language>en-us</language>
    <link xmlns="http://www.w3.org/2005/Atom" href="http://sbwire.superfeedr.com/" rel="hub"/>
    <link xmlns="http://www.w3.org/2005/Atom" href="http://feeds.releasewire.com/rss/full/company/14081" rel="self"/>
    <item>
      <title>Free Version of Defect Documentation Tool for Testers / Software Developers Available</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">QASymphony offers free version of qTrace that cuts defect reporting by 70%.</p><p>Atlanta, GA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 06/11/2012 --  QASymphony (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a>), the developer of qTrace, an intelligent defect documentation Quality Assurance tool that helps testers create practical, detailed and informative defect records, today announced a free version of its popular qTrace tool for testers and software developers.<br />
<br />
qTrace solves the sometimes agonizing and time-consuming practice of reproducing and reporting of found defects during the software testing process.  While simple defects are easy to replicate, complex or intermittent defects require a lot more effort by testers to document and report.<br />
<br />
qTrace is not a screen or video capture tool but is instead an intelligent capture technology similar to those found in sophisticated test automation tools.   In less than 5 minutes, a tester can have qTrace running, integrated with their defect tracking system, and more quickly create better defect records.  <br />
<br />
qTrace (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a>) tracks user&apos;s interactions with an application and uses that information to automatically create detailed defect documentation.  qTrace supports the recording of a wide range of applications and technologies on the browser as well as desktop apps.<br />
<br />
"Software development testers are frustrated by the amount of effort it takes to communicate complex defects clearly to the development team," says Vu Lam, CEO of QASymphony. "qTrace is an elegant solution that makes it simple for testers to isolate, highlight, and report software issues. It intelligently produces defect reports that contain detailed scripts of each test step, complete with screen shots and system information."<br />
<br />
qTrace expedites the QA process with more accuracy and brings products to market by as much as 20% faster and cuts everyday defect reporting by 70%.<br />
<br />
Useful editing features include annotation tools such as call-out boxes, pointers/arrows, blurring and cropping, making it easy to further enhance the clarity of the defect report.  <br />
	<br />
qTrace is available as a free edition or low-cost Pro edition and can be downloaded  at <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a>.  In summary, qTrace:<br />
<br />
- Reduces manual documentation efforts and increases accuracy of defect descriptions;<br />
- Shortens defect resolution time by providing more information to the bug fix team;<br />
- Complements and integrates with existing application lifecycle management (ALM) and defect tracking tools.<br />
<br />
To see a video of qTrace: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://youtu.be/P43ZJhSdZGI" href="http://youtu.be/P43ZJhSdZGI">http://youtu.be/P43ZJhSdZGI</a><br />
<br />
About QASymphony<br />
Founded in June 2011 with offices in Dublin, Calif. and Ho Chi Minh City, Vietnam, QASymphony is a software company built to revolutionize how software is tested, adopted, and supported. We are an early stage, self-funded, software-loving team, united by a common belief that software could be better, and better tested. For more information, visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a>.<br />
<br />
Website: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a><br />
Facebook: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.facebook.com/qasymphony" href="http://www.facebook.com/qasymphony">http://www.facebook.com/qasymphony</a><br />
Twitter: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.twitter.com/qasymphony" href="http://www.twitter.com/qasymphony">http://www.twitter.com/qasymphony</a><br />
<br />
Press &amp; Media Contact:<br />
Victor Cruz, Principal<br />
MediaPR.net Inc<br />
Atlanta, GA - USA<br />
+1 978-594-4134<br />
vcruz@mediapr.net<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz, Principal<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/144014">Click to Email Victor Cruz, Principal</a><br />Web: <a rel="nofollow" href="http://www.qasymphony.com">http://www.qasymphony.com</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=144014&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 11 Jun 2012 08:00:00 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>IDC Research Paper Looks at Ensuring and Proving Big Data Is Tamper-Free</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">"Data Integrity in the Big Data Digital Age" gives data its proof in court.</p><p>San Francisco, CA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 05/02/2012 --  A new executive brief published by IDC examines one of the major obstacles organizations face when committing resources and applications to cloud computing. At stake is the issue of validating the integrity and authenticity of data within a cloud environment.<br />
<br />
"When the data is hosted onsite, this process of data integrity can certainly be a challenge. However, when data is not hosted within the traditional internal IT data center environment, there needs to be a method of ensuring indisputable data integrity," cites the report.<br />
<br />
Titled "Data Integrity in the Big Data Digital Age", the research paper ties the current Big Data phenomenon with cloud computing, making a case for how organizations must grapple with analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the authenticity of this data.<br />
<br />
Questions the report seeks to answer include: Has my data been tampered with? Is the data source legitimate? How can indisputable proof be offered that data integrity remains intact? And in cases that involve the legal system, how to bring documents, log files, or audio files to the level where they can be admitted as irrefutable evidence?<br />
<br />
These questions take the data integrity argument well beyond the premise and perimeter of IT security matters. Few options exist today that can achieve tamper-proof data security outside of the reliance on third-party certification authorities, or the unwieldy management of a public key infrastructure. What&apos;s required is a way to validate, verify, and self-authenticate the data independently of any third-party agency.<br />
<br />
Sponsored by GuardTime, ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) the executive brief details a compelling case for the adoption of Keyless Signatures, explaining how the mathematically-driven system works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and integrity for electronic data.<br />
<br />
"The goal of the keyless signature technology is to provide mass-scale, non-expiring data validation while eliminating the need for secrets or other forms of trust, thereby reducing or even eliminating the need for more complex certificate-based solutions, as these are ripe with certificate management issues, including expiration and revocation," the paper explains.<br />
<br />
"A keyless signature provides an alternative method to key-based technologies by providing proof and non-repudiation of electronic data using only hash functions for verification. The implementation of keyless signature is done via a globally distributed machine, taking hash values of data as inputs and returning keyless signatures that prove the time, integrity, and origin (machine, organization, individual) of the input data."<br />
<br />
"Any client using the keyless signature service can make a request to sign any data item it has access to; a log file, XML file, office document, database record, SWIFT transaction, FPML message, eDiscovery productions, etc. In return, the client will receive a keyless signature which can be stored along side the signed data, within the signed data, or in a repository separate from the signed data for backup and archival purposes."<br />
<br />
By signing the data using GuardTime&apos;s Keyless Signatures ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ), an organization can automatically detect when and where the data was created or transferred, and if the data has been tampered with or not. An alert is sent to the customer when an abnormal status is detected.<br />
<br />
In this manner, organizations can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data usage and storage in the Cloud.<br />
<br />
The report concludes with "The keyless nature of this technology helps reduce the footprint by removing the need for cipher keys and passwords, which arguably can also be lost or mislaid, and since the integrity can be validated by the document owners, the ability to leverage the cloud computing platform places it well for future adoption."<br />
<br />
The full report can be found here: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com/whitepapers" href="http://www.guardtime.com/whitepapers">http://www.guardtime.com/whitepapers</a><br />
<br />
About GuardTime<br />
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime&apos;s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime&apos;s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world&apos;s most promising financial technology start-ups. Visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> for more information about using Keyless Signatures for signing your data.<br />
<br />
Press &amp; Media Contact:<br />
Victor Cruz, Principal<br />
MediaPR.net Inc<br />
San Francisco, CA - USA<br />
+1 978-594-4134<br />
vcruz@mediapr.net<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/137480">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://mediapr.net/">http://mediapr.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=137480&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Wed, 02 May 2012 15:09:53 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Anvato and EndPlay Partner to Provide Seamless Web &amp; Video Content Management to Local Broadcasters</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Anvato Inc., today announced a partnership with EndPlay Inc. a Los Angeles-based provider of content management, engagement and monetization solutions delivered as software-as-a-service (SaaS) applications in the cloud.</p><p>Mountain View, CA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 05/02/2012 --  Anvato Inc. ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.anvato.com" href="http://www.anvato.com">http://www.anvato.com</a> ), developers of video content management systems for live and on-demand video publishing, distribution and monetization in broadcast quality, today announced a partnership with EndPlay Inc. ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.endplay.com" href="http://www.endplay.com">http://www.endplay.com</a> ), a Los Angeles-based provider of content management, engagement and monetization solutions delivered as software-as-a-service (SaaS) applications in the cloud.<br />
<br />
EndPlay has tightly integrated its platform with Anvato&apos;s video content management system, including its Broadcast Capture and Live Editing modules. EndPlay&apos;s media customers will benefit from a reduction in video editing and publishing time of up to 60 percent through a seamless process to publish web videos from live broadcasts.<br />
<br />
"The EndPlay content management, engagement and monetization solution, integrated with Anvato&apos;s video platform, gives local broadcasters a one-stop solution for web and video content management," said Alper Turgut, Anvato CEO. "This provides users an incredible amount of flexibility and time savings in capturing, editing and publishing video to their web sites and mobile devices."<br />
<br />
EndPlay&apos;s cloud-based platform intelligently delivers audio, video, text and rich media across brand websites and to virtually any end-user device for companies across media and entertainment, consumer packaged goods (CPG) and retail spaces. <br />
<br />
Says Dr. Christos M. Cotsakos, Founding Chairman, CEO and President of EndPlay: "We realized an opportunity to better service our clients by offering them the best tools available today for the daily management and monetization of all their digital assets across multiple web and mobile devices. Anvato&apos;s video content management system can seamlessly capture and edit TV broadcast, publish it online, and syndicate it to affiliates and partners in near real time. We have found a very solid partner in Anvato."<br />
<br />
Anvato ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.anvato.com" href="http://www.anvato.com">http://www.anvato.com</a> ) is the recipient of the Frost &amp; Sullivan Global Innovation Award in Online Video with innovative broadcast customers such as Journal Broadcast Groupand Univision.<br />
<br />
About EndPlay<br />
EndPlay is a leading provider of SaaS Content Management, Engagement and Monetization solutions delivered in the cloud. Powered by its unique &apos;Intelligent Rendering&apos; technology, EndPlay&apos;s end-to-end Platform provides a streamlined user experience that empowers clients to seamlessly produce, manage and instantly deliver content optimized for virtually any device. The company&apos;s extensible architecture and integrated partners ensure EndPlay clients can expand, engage, monetize and leverage their content management solution against the complexities facing all brands in the era of Big Data and Quantum Content.<br />
<br />
Enterprise clients in media, entertainment, consumer packaged goods (CPG) and education verticals have turned to EndPlay&apos;s experienced Client Services team to support collaboration, implementation and optimization of their EndPlay solutions. EndPlay&apos;s commitment to innovation and customer-centric approach enables clients to stay ahead of their competition, increase audience engagement, and future-proof their digital business investment.<br />
<br />
EndPlay is headquartered in Los Angeles, with a regional office in Palm Beach Gardens, and is currently establishing regional offices in Boston, Dallas, San Francisco and Seattle. For more information, visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.endplay.com" href="http://www.endplay.com">http://www.endplay.com</a>.<br />
<br />
About Anvato, Inc.<br />
An innovator in broadcast-to-online video, Anvato ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.anvato.com" href="http://www.anvato.com">http://www.anvato.com</a> ) is the only video platform that combines live and on-demand video publishing, distribution, and monetization in broadcast quality. Our solution includes broadcast-specific modules such as live editing of broadcast streams, and live broadcast capture. Anvato automatically identifies television commercials and replaces them with audience-targeted advertising to achieve superior monetization revenue, both for web and mobile. Anvato applications include: Live broadcast capture, live video editing, live streaming, video syndication, monetization, TV Everywhere and video analytics and reporting.Anvato maintains a world-class R&amp;D team in Mountain View, CA, and its products incorporate patented Perceptual Signature™ video fingerprint technology. <br />
<br />
Contacts:<br />
For Anvato<br />
Victor Cruz<br />
press@anvato.com<br />
+1 978.594.4134<br />
<br />
For EndPlay<br />
Marissa Arnold or Jesse Odell<br />
endplay@launchsquad.com<br />
+1 212.564.3665 (New York)<br />
+1 415.625.8555 (California)<br />
<br />
Press &amp; Media Contact:<br />
Victor Cruz, Principal<br />
MediaPR.net Inc<br />
465 N. Whisman Road, Suite 600<br />
Mountain View, CA 94043 - USA<br />
+1-978-594-4134<br />
press@anvato.com<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.anvato.com" href="http://www.anvato.com">http://www.anvato.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/137476">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://mediapr.net/">http://mediapr.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=137476&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Wed, 02 May 2012 15:06:15 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Corero Network Security to Present on DDoS Attacks and Mitigation Techniquesat Interop Las Vegas</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Corero Network Security (CNS: LN), today announced that they are presenting on the evolving DDoS threat landscape at Interop, being held May 6-10 in Las Vegas, Nevada.</p><p>Hudson, MA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 04/23/2012 --  Corero Network Security (CNS: LN), the leading provider of Distributed Denial of Service (DDoS) Defense Solutions, (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/dds/dds_overview" href="http://www.corero.com/en/products_and_services/dds/dds_overview">http://www.corero.com/en/products_and_services/dds/dds_overview</a>) today announced that they are presenting on the evolving DDoS threat landscape at Interop, (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.interop.com/lasvegas/conference/information-security-and-risk-management.php#Wednesday-1" href="http://www.interop.com/lasvegas/conference/information-security-and-risk-management.php#Wednesday-1">http://www.interop.com/lasvegas/conference/information-security-and-risk-management.php#Wednesday-1</a>) being held May 6-10 in Las Vegas, Nevada.<br />
<br />
Ashley Stephenson, executive vice president, will be a featured presenter at Interop. The event will take place at the Mandalay Bay Convention Center in Las Vegas from May 6-10, 2012.<br />
<br />
WHO: Ashley Stephenson, Corero Network Security Executive Vice President<br />
WHAT: "Application Layer DDoS Attacks: Motives, Mechanisms, and Mitigation" <br />
WHERE: The Mandalay Bay ConventionCenter, Las Vegas<br />
WHEN: Thursday, May 10, 2012, 9:00 am PDT<br />
<br />
During the session Stephenson will examine the motivations behind today&apos;s DDoS attacks, highlighting how hackers increasingly are using them as smokescreens to divert attention from surreptitious attacks aimed at stealing data. He also will take an in-depth look at the evolving mechanisms used to launch attacks, both newlow and slow application-layer DDoS attacks (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/dds/dds_faq" href="http://www.corero.com/en/products_and_services/dds/dds_faq">http://www.corero.com/en/products_and_services/dds/dds_faq</a>) and traditional bandwidth consuming network-layer DDoS attacks. In addition, hewill share real-world attack scenarios and discuss ways to stop DDoS attacks. (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/dds/dds_overview" href="http://www.corero.com/en/products_and_services/dds/dds_overview">http://www.corero.com/en/products_and_services/dds/dds_overview</a>)<br />
<br />
About Corero Network Security<br />
Corero Network Security (CNS:LN) (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/ps_services/securewatch_plus" href="http://www.corero.com/en/products_and_services/ps_services/securewatch_plus">http://www.corero.com/en/products_and_services/ps_services/securewatch_plus</a>) is an international network security company and the leading provider of Distributed Denial of Service (DDoS) defense and Next Generation Intrusion Prevention System (IPS) solutions (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/ips/products_and_services_ips_overview" href="http://www.corero.com/en/products_and_services/ips/products_and_services_ips_overview">http://www.corero.com/en/products_and_services/ips/products_and_services_ips_overview</a>). Corero&apos;s products and services (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/ps_services/securewatch_plus" href="http://www.corero.com/en/products_and_services/ps_services/securewatch_plus">http://www.corero.com/en/products_and_services/ps_services/securewatch_plus</a>) provide comprehensive, integrated, high-performance protection against constantly evolving network-borne cyber threats. Customers include enterprises, service providers and government organizations worldwide. Corero&apos;s appliance-based solutions are highly adaptive and preemptively respond to modern cyber attacks, known and unknown, protecting critical information and online assets. Corero&apos;s products are transparent on the network, highly scalable, and feature the lowest latency and highest reliability in the industry. Corero is headquartered in Hudson, Mass., with offices around the world.<br />
<br />
Press &amp; Media Contact:<br />
Victor Cruz, Principal<br />
MediaPR.net Inc<br />
1 Cabot Road<br />
Hudson, MA 01749 - USA<br />
(978) 594-4134<br />
vcruz@mediapr.net<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com" href="http://www.corero.com">http://www.corero.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/137177">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://mediapr.net/">http://mediapr.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=137177&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 23 Apr 2012 12:15:29 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Corero Network Security Appoints Ashley Stephenson As Executive Vice President</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Veteran Technology Entrepreneur will lead Corero’s Global Expansion Strategy.</p><p>Hudson, MA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 04/23/2012 --  Corero Network Security (CNS: LN), the leading provider of DDoS Defense and Next Generation IPS (NGIPS) solutions, today named veteran IT industry expert Ashley Stephenson as executive vice president. An Internet technology entrepreneur, Stephenson, who has operating experience in the United States, Europe and Asia, will lead Corero&apos;s global expansion strategy.<br />
<br />
"We are delighted to have someone of Ashley&apos;s caliber join Corero. His proven executive leadership experience, international expertise and channel know-how will help us take the company&apos;s solutions to the next level in the escalating battle against cyber attacks," said Marty Meyer, CEO of Corero.<br />
<br />
Stephenson co-founded or led several IT companies as chairman or CEO including Reva Systems, acquired by ODIN, and Xedia Corporation, acquired by Lucent. Most recently, he has provided strategic advisory services to leading companies on the evolution of the global IT market. Stephenson has served on the board of directors of several startups and industry consortia. He also was awarded "CEO of the Year" by the Massachusetts Telecommunications Council.<br />
<br />
"I&apos;m very excited to join Corero. The company&apos;s game-changing DDoS Defense and Next Generation IPS technology make this a unique opportunity to expand the business as the network security market continues to experience explosive growth," Stephenson said.<br />
<br />
"We will continue to build on our strategy to work with key partners around the globe to build out an intelligent next generation defense infrastructure against cyber attacks. The more enterprises and institutions we protect, the more we learn about the evolving nature of the threats. It is a win-win-win for our partners, our customers and Corero," Stephenson added.<br />
<br />
Corero&apos;s products and services provide its customers with a robust, high-performance defense against the constantly evolving and increasingly sophisticated realm of cyber attacks. Its DDoS Defense System (DDS), which stops DDoS attacks, and NGIPS solutions are pro-actively protecting the networks and IT resources of enterprises, service providers and government organizations worldwide.<br />
<br />
About Corero Network Security<br />
Corero Network Security (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/ps_services/securewatch_plus" href="http://www.corero.com/en/products_and_services/ps_services/securewatch_plus">http://www.corero.com/en/products_and_services/ps_services/securewatch_plus</a>)(CNS: LN) is an international network security company and the leading provider of Distributed Denial of Service (DDoS) defense and Next Generation Intrusion Prevention System (IPS) solutions (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/ips/products_and_services_ips_overview" href="http://www.corero.com/en/products_and_services/ips/products_and_services_ips_overview">http://www.corero.com/en/products_and_services/ips/products_and_services_ips_overview</a>). Corero&apos;s products and services (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com/en/products_and_services/ps_services/securewatch_plus" href="http://www.corero.com/en/products_and_services/ps_services/securewatch_plus">http://www.corero.com/en/products_and_services/ps_services/securewatch_plus</a>) provide comprehensive, integrated, high-performance protection against constantly evolving network-borne cyber threats. Customers include enterprises, service providers and government organizations worldwide. Corero&apos;s appliance-based solutions are highly adaptive and preemptively respond to modern cyber attacks, known and unknown, protecting critical information and online assets. Corero&apos;s products are transparent on the network, highly scalable, and feature the lowest latency and highest reliability in the industry. Corero is headquartered in Hudson, Mass., with offices around the world.<br />
<br />
Press &amp; Media Contact:<br />
Victor Cruz, Principal<br />
MediaPR.net Inc<br />
1 Cabot Road<br />
Hudson, MA 01749 - USA<br />
(978) 594-4134<br />
vcruz@mediapr.net<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com" href="http://www.corero.com">http://www.corero.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/137172">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://mediapr.net/">http://mediapr.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=137172&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 23 Apr 2012 09:00:00 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Boston Wireless Changes Name to Harbor Networks</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p>Framingham, MA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 04/09/2012 --  After 17 years of successfully running a telecommunications business as Boston Wireless, the company today announced that it will now be known as Harbor Networks ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.harbornetworks.com" href="http://www.harbornetworks.com">http://www.harbornetworks.com</a> ).<br />
<br />
In addition to the name change, the company rolled out an expanded suite of products and services and announced its expansion into Connecticut and New York with two new regional offices.<br />
<br />
The name Harbor Networks ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.harbornetworks.com" href="http://www.harbornetworks.com">http://www.harbornetworks.com</a> ) is designed to reflect a clearer image of how the business has grown and transformed in concert with the unified communications industry. It also fosters and promotes continued geographic expansion, as Harbor Networks currently has customers in 41 of 50 United States and in 14 different countries.<br />
<br />
Today, Harbor Networks is an integrator of unified communications technology. The company designs, implements, and supports IP telephone systems and IT infrastructures. Key partnerships are with industry leaders such as ShoreTel, Extreme, Avaya, Cisco, Lifesize, Ruckus, HP, and Verizon.<br />
<br />
Harbor Networks ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.harbornetworks.com" href="http://www.harbornetworks.com">http://www.harbornetworks.com</a> ) also announced an updated Managed Services model.  This new model will strengthen the company&apos;s ties to customers by proactively assessing, monitoring, and backing up the key performance elements of corporate network infrastructures.  These services coincide with Harbor Networks&apos; recently opened, state-of-the-art Unified Communications Center, which is built and staffed to support customer networks 24 hours a day, 7 days a week.<br />
<br />
Despite the exciting changes, the company remains committed to its original mission to provide the highest level of professional experience and service to a market that demands it.<br />
<br />
"We want to be sure to stay close to our Boston roots," says CEO and President Greg Bertschmann. "We think that having Harbor as part of our name will reflect this. There are few harbors in the world as beautiful and historic as Boston harbor. We trust that our customers will soon realize that Harbor Networks is a safe and well-protected place where they can have confidence in our company as their unified communications provider. We still believe that achieving service excellence means continuously evolving key partnerships and delivering the support, services, and products our customers need. We will continue to listen to our customers, adapt our breadth of knowledge, and remain an important valued partner to all of them."<br />
<br />
"We are all very excited to announce our new identity," added Bertschmann, "Yet after all is said and done, it is people, not a name, that define a company. The most important element of our identity, a very bright team of dedicated employees, will not change a bit when our name does."<br />
<br />
About Harbor Networks Inc.<br />
Founded in 1995 and headquartered in Framingham, MA, Harbor Networks (formerly Boston Wireless) has continued to evolve over the past 17 years.  Our core business of installing and maintaining business communications products has remained consistent.  We remain committed to constantly evaluating our product line, providing reliable leading edge solutions, and supporting all of our customers as partners in our success for the years ahead. Harbor Networks Inc., 50 Speen Street, Framingham, MA 01701 Tel: (508) 650-5900.  <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.harbornetworks.com" href="http://www.harbornetworks.com">http://www.harbornetworks.com</a>.<br />
<br />
Press &amp; Media Contact:<br />
Victor Cruz, Principal<br />
MediaPR.net Inc<br />
50 Speen Street, Suite 200<br />
Framingham, MA 01701 - USA<br />
(978) 594-4134<br />
vcruz@mediapr.net<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.harbornetworks.com" href="http://www.harbornetworks.com">http://www.harbornetworks.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/135561">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://mediapr.net/">http://mediapr.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=135561&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 09 Apr 2012 11:14:22 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Anvato Powers Journal Broadcast Group Live Video Editing</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Journal Broadcast uses Anvatovideo platform tocreateand syndicate video clips from live broadcast.</p><p>Mountain View, CA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 03/30/2012 --  Anvato Inc. ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.anvato.com" href="http://www.anvato.com">http://www.anvato.com</a> ), the only video platform that combines live and on-demand video publishing, distribution and monetization in broadcast quality, today announced it has signed Journal Broadcast Group of Milwaukee, Wisconsin, a successful operator of 14 television stations and 33 radio stations stretching from Florida to California.<br />
<br />
Journal Broadcast is already realizing the benefits of using the Anvato&apos;s Live Capture Editor to create clips in near real-time, from all of Journal&apos;s local television broadcasts.<br />
<br />
"Anvato makes publishing video to our multi-platform properties easier and faster than ever before," said Michael Gay, Vice President of Interactive Media for Journal. "Our stations are using Anvato&apos;s tool to publish within moments of video airing in broadcast.  The HD capture enables the quality of the video to be exceptional on our sites, on mobile devices, and in our syndication outlets.  Plus, because Anvato is web-based, we can have editors generate and publish those clips from anywhere."<br />
<br />
Live Capture boxes installed at local stations allow Journal&apos;s content producers to capture high definition video directly from live broadcast signals. Journal video editors are able to access the video feed remotely, through a browser, to cut out and edit video clips such as TV shows, or news reports.<br />
<br />
"It is about creating premium inventory faster and more effectively from live broadcasts," said Anvato CEO Alper Turgut. "Broadcast cue tones, combined with Anvato&apos;s computer vision based video fingerprint called Anvato Perceptual Signature™, infallibly detect scene and context changes to automatically segment the live broadcast stream. Editors can cut clips and fine-tune under a minute."<br />
<br />
Anvato&apos;s Auto-Segmenter tool ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.anvato.com" href="http://www.anvato.com">http://www.anvato.com</a> ) utilizes computer vision to locate television commercials and remove them from the clip in one click. The resulting clip is free of commercials, ready to be monetized for the web. Other productivity features include closed-caption navigation, and automatic clip meta-data population based on electronic program guides.<br />
<br />
Anvato has been an innovator in video. It is the recipient of the Frost &amp; Sullivan Global Innovation Award in Online Video with customers such as Univision, Journal Broadcast Group and Endplay.<br />
<br />
About Journal Broadcast Group<br />
Journal Broadcast Group owns and operates 33 radio stations and 13 television stations in 12 states and operates an additional television station under a local marketing agreement. Headquartered in Milwaukee, Wisconsin, it is the broadcast business of Journal Communications Inc., a diversified media company with operations in publishing, radio and television broadcasting, and interactive media.<br />
<br />
About Anvato<br />
An innovator in broadcast-to-online video, Anvato ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.anvato.com" href="http://www.anvato.com">http://www.anvato.com</a> ) is the only video platform that combines live and on-demand video publishing, distribution, and monetization in broadcast quality. Our solution includes broadcast-specific modules such as live editing of broadcast streams, and live broadcast capture. Anvato automatically identifies television commercials and replaces them with audience-targeted advertising to achieve superior monetization revenue, both for web and mobile. Anvato applications include: Live broadcast capture, live video editing, live streaming, video syndication, monetization, TV Everywhere and video analytics and reporting.<br />
<br />
Anvato maintains a world-class R&amp;D team in Mountain View, CA, and its products incorporate patented Perceptual Signature™video fingerprint technology. It is the recipient of the Frost &amp; Sullivan Global Innovation Award in Online Video.  Its customers include Univision, Journal Broadcast Group and Endplay.<br />
<br />
Contacts:<br />
Victor Cruz, for Anvato<br />
Principal, MediaPR<br />
press@anvato.com<br />
+1-978-594-4134<br />
<br />
For Journal Broadcast Group<br />
Jim Thomas<br />
VP, Marketing and Programming<br />
jthomas@jrn.com<br />
414-967-5293<br />
<br />
Press &amp; Media Contact:<br />
Victor Cruz, Principal<br />
MediaPR.net Inc<br />
465 N. Whisman Road, Suite 600<br />
Mountain View, CA 94043<br />
+1-978-594-4134<br />
press@anvato.com<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.anvato.com" href="http://www.anvato.com">http://www.anvato.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/134392">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://mediapr.net/">http://mediapr.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=134392&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Fri, 30 Mar 2012 15:11:58 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>App Development Software Company QASymphony Launches, Introduces qTrace</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">New QA tool decreases defect capture time by 30-50% and decreases fix time by 10-30%.</p><p>Dublin, CA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 02/23/2012 --  QASymphony ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a> ), a SaaS provider focusing on bringing intelligent software testing tools to market, announced its launch today. <br />
<br />
"The cloud-powered software development lifecycle is beginning to be fully realized," said Vu Lam, CEO of QASymphony. "Todays&apos; developers and testers require testing tools that provide more than basic record-keeping and collaboration. They require tools that support cloud-based software development and testing processes along with agility, scalability and, most importantly, intelligence into how the software is being designed, deployed and used. Our mission is to provide these tools from our cloud-based platform."<br />
<br />
As a first step, QASymphony ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a> ) is releasing its first product, qTrace, an easy-to-use, defect capture tool for bug discovery that provides insight into how software is used.<br />
<br />
qTrace captures all steps, screens, and system information associated with a defect along with out-of-the-box integration enabling the user to submit the defect trace to any bug tracking system of choice.<br />
<br />
qTrace provides testers an easier and faster way to report defects. In the past, software testers worked through an application to find bugs and the drudgery starts; retracing steps, doing screen captures, making notes, compiling a report, opening a defect tracking tool, and then finally submitting a ticket. Not fun, not productive, and often time resulting in defect reports that were missing key pieces of information.<br />
<br />
With qTrace, testers simply turn on the tool as they start their testing session. qTrace runs in the background and captures every screen and every step performed during testing. qTrace then automatically generates a detailed defect report from the captured information that includes how the application was being used along with associated environmental information. While in stealth mode the company had qTrace in beta testing, and customers found that qTrace decreases defect capture time by 30-50% and decreases fix time by 10-30%.<br />
<br />
"qTrace&apos;s seamless integration with our bug tracker is a huge plus; combined with the ease of use, qTrace definitely helps us reduce testing cycles," said Lakshmi Janardhan, QA manager for Compuware Corporation.<br />
<br />
"We are really excited about getting qTrace in use across our entire testing organization," said Gwendolyn Sanders, senior QA analyst at Silverpop. "The beta showed us that we could cut in half the time it takes to capture screens and record defects."<br />
<br />
"qTrace is so easy to use. It took me a few minutes to download and install, then I was able to start capturing and submitting defects right away without having to look at a user manual," said Kevin Konishi, development program manager, Next Step Learning.<br />
<br />
qTrace Benefits Include:<br />
- Ease of use. With qTrace, testers use simple point-and click commands to start recordings, modify records, and publish reports. <br />
- Automation. qTrace automates the capture of complete bug reports-including the steps that precipitated the defect&apos;s occurrence. Testers can easily add details or modify the record, or just move forward with submitting a ticket.<br />
- Seamless Integration. Through its integration with leading bug-tracking tools, qTrace enables testers to create new defect records and submit complete details into a bug-tracking tool-with a single mouse click. qTrace also provides an API that allows custom integration with any defect tracking tool.<br />
- Defect reporting quality improvement. By eliminating a lot of manual, error-prone efforts, qTrace helps improve the accuracy and specificity of defect descriptions.<br />
- Productivity boost. With qTrace, teams can spend less time on documentation, and more time on testing. Consequently, testers get better at what&apos;s most important: validating functionality. qTrace helps turn even novice testers into proficient testing experts.<br />
- Product development acceleration. With qTrace, application development teams can speed QA cycles, enhance collaboration and provide better information to development, so the organization can more quickly get quality products to market.<br />
<br />
"All of us at QASymphony are passionate about software quality. We are launching the company on Valentine&apos;s Day because we love software developers and testers, and we are confident that in time software developers and testers will come to love us as well," said Vu Lam, QASymphony CEO ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a> ). "Our roots are in software development; we are passionate developers and testers ourselves. Having provided development and testing services to over 75 companies in the past, we understand their needs. The products we will introduce to the market will help testers and developers release high quality products faster. We believe our first product, qTrace, will become an indispensable application for them."<br />
<br />
Pricing and Availability:<br />
qTrace is available today. Customers can download a free trial at <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com/download.html" href="http://www.qasymphony.com/download.html">http://www.qasymphony.com/download.html</a>. The purchase price is $49.99.<br />
<br />
About QASymphony<br />
QASymphony is a software company built to revolutionize how software is tested, adopted, and supported. We are an early stage, self-funded, software loving team, united by a common belief that software could be better. For more information, visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a>.<br />
<br />
QASymphony website: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.qasymphony.com" href="http://www.qasymphony.com">http://www.qasymphony.com</a><br />
Facebook page: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.facebook.com/qasymphony" href="http://www.facebook.com/qasymphony">http://www.facebook.com/qasymphony</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/128448">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href=""></a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=128448&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Thu, 23 Feb 2012 13:07:03 -0600</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>GuardTime and NRI Secure Collaborate on Cloud Security</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">GuardTime today signed an agreement with Tokyo-based NRI SecureTechnologies, Ltd., a one stop-solution provider for information security, to do business collaboration in the area of cloud computing security.</p><p>Tokyo, Japan -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 01/05/2012 --  GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ), creator of the Keyless Signature technology used to provide indisputable proof of time, origin, and integrity for electronic data, today signed an agreement with Tokyo-based NRI SecureTechnologies, Ltd., a one stop-solution provider for information security, to do business collaboration in the area of cloud computing security. <br />
<br />
GuardTime developed and provides the solution code-named "DataConductor," which can detect changes and/or transfers of any data stored in the datacenter. By signing the data using GuardTime&apos;s Keyless Signatures, ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) DataConductor can automatically detect when and where the data was created or transferred, and if the datahas been tampered with or not. An alert is sent to the customer when an abnormal status is detected. DataConductor can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data storage in the Cloud. DataConductor enables regulatory compliance for archiving with commodity cloud storage. <br />
<br />
As a leading provider of information security, NRI Secure has accumulated extensive and profound consulting knowledge with product offerings that, together with one-stop services, provide comprehensive security solutions to customers in sectors such as the government, financial services, retail, and enterprises. In particular, as cloud computing demand grows, NRI Secure is increasingly undertaking a number of projects for the secure building and management of cloud services.<br />
<br />
GuardTime and NRI Secure will leverage the solutions and know-how on both sides to collaborate in the following areas:<br />
<br />
- Solution service integration:<br />
Planning and development on the integration of GuardTime DataConductor into NRI Secure&apos;s security management solutions and services.<br />
<br />
- Joint marketing and sales activities:<br />
Both companies will jointly hold seminars and conferences to introduce the solutions.Both companies will jointly identify business opportunities and propose solutions to existing and new customers.<br />
<br />
About NRI SecureTechnologies, Ltd<br />
NRI SecureTechnologies, a leading provider of information security solutions, is one of the group companies of Nomura Research Institute, Ltd. Established in 2000, it examines information security at business corporations from the aspects of technology and business management and offers a one-stop service from consulting to solution implementation, training, management and surveillance. For more information visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.nri-secure.co.jp/en/index.html" href="http://www.nri-secure.co.jp/en/index.html">http://www.nri-secure.co.jp/en/index.html</a><br />
<br />
About GuardTime<br />
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. <br />
<br />
GuardTime&apos;s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime&apos;s mission is to change the world to one where Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world&apos;s most promising financial technology start-ups. Visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> for more information about using Keyless Signatures for signing your data.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/121486">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href=""></a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=121486&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Thu, 05 Jan 2012 19:15:00 -0600</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Estonia Adopts GuardTime Digital Signatures</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">GuardTime, today announced that the Estonia Ministry of Economic Affairs and Communications signed a memorandum of co-operation, according to which Estonia will start looking for opportunities to implement digital signatures in e-state information systems.</p><p>Tallinn, Estonia -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 12/21/2011 --  GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) creator of the Keyless Signature technology used to provide indisputable proof of time, origin, and integrity for electronic data, today announced that the Estonia Ministry of Economic Affairs and Communications signed a memorandum of co-operation, according to which Estonia will start looking for opportunities to implement digital signatures in e-state information systems.<br />
<br />
"GuardTime&apos;s technology allows documents to be signed easily and securely, making forgeries and changing an already signed document without the signer&apos;s consent impossible," said the Estonian Minister of Economic Affairs and Communications Juhan Parts. "Estonia&apos;s ambition is to be the most secure e-states in the world and GuardTime provides significant alternatives in the realization of Estonian public sector security measures," Parts added.<br />
<br />
The digital timestamp technology was developed by Estonian scientists AhtoBuldas and MaertSaarepera. GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) provides a mathematically based digital signature service that proves authenticity of documents and data. GuardTime&apos;s technology is already used by companies both in and outside of Estonia, but Estonia is progressive with its information technology and is the first country in the world to adopt Keyless Signatures in the public sector.<br />
<br />
According to GuardTime Estonia ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) CEO Raul Vahisalu, cracking digital timestamps is mathematically impossible and signatures cannot be forged or changed without the author&apos;s consent. "These reasons make it a perfect data protection solution for countries, which have to keep their data secured on one hand, but also make it accessible to citizens. We are very keen to start co-operation," said Vahisalu.<br />
<br />
The first Estonian public sector organization working on implementing GuardTime&apos;s signature is the National Archive of Estonia. "For long-term storage, ensuring authenticity is one of the key issues," said LauriLeht, head of the National Archive&apos;s digital preservation bureau. "Implementing timestamps for digitized documents coming into the archive and signing internal materials gives an objective proof that the files have not been changed by unauthorized users," added Leht.<br />
<br />
GuardTime&apos;s digital signature ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) can be verified by a code published in the Financial Times that contains a hash value, date and time record. In Estonia, GuardTime&apos;s technology has already been adopted by SEB Bank.<br />
<br />
GuardTime&apos;s founders invented an algorithm that mathematically proves the time, location and integrity of electronic data at rest and in motion. GuardTime&apos;s Keyless Signatures ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) enable enterprises to switch to a cloud compute model with confidence, maintaining an independent audit trail of all data and related activities while complying with regulatory and legal admissibility requirements.<br />
<br />
About GuardTime<br />
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. <br />
<br />
GuardTime&apos;s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime&apos;s mission is to change the world to one where Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world&apos;s most promising financial technology start-ups. Visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> for more information about using Keyless Signatures for signing your data.<br />
<br />
Contacts:<br />
UunoVallner<br />
Director of the Division of Information Technology Architecture at the Estonian Ministry of Economic Affairs and Communications<br />
+372 513 7174<br />
uuno.vallner@riso.ee<br />
<br />
LauriLeht<br />
Head of the National Archive&apos;s Digital Preservation Bureau<br />
+3727387535<br />
lauri.leht@ra.ee</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Raul Vahisalu<br />+372 509 0385<br />GuardTime Estonia<br />Telephone: CEO<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/119285">Click to Email Raul Vahisalu</a><br />Web: <a rel="nofollow" href=""></a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=119285&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Wed, 21 Dec 2011 00:00:00 -0600</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>ArivisWebView Allows 3D Image Viewing of Gigabyte Images in Web Browsers</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">First of its kind, WebView3D can visualize volumetric data.</p><p>Berlin, Germany -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) --12/20/2011 --  Arivis ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.arivis.com" href="http://www.arivis.com">http://www.arivis.com</a> ), the leading provider of software for the visualization and analysis of high-dimensional image data of almost unlimited size, today announced beta version of WebView 3.0 with 3D rendering.<br />
<br />
WebView3D ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://webview3d.arivis.com" href="http://webview3d.arivis.com">http://webview3d.arivis.com</a> ) is a new SaaS-based tool that allows users to view, manipulate, annotate and collaborate on multi-gigapixel images and render 3D image stacks using popular and common Internet browsers. WebView 3D is part of ArivisWebView, a modular framework for image visualization and annotation on the Internet.<br />
<br />
In short, WebView3D visualizes volumetric data. For example, in a life sciences or medical application WebView3D could be used to show large computer tomography scans over the web.<br />
<br />
"The idea behind WebView3D is to allow for the easy sharing and manipulation of volumetric data and large 3D images such as those generated by microscopical or X-ray computed tomography, or industrial CT scanning, for example," says Arivis founder Christian Goetze. "Size is never an issue. Our products incorporate, combine, manage, visualize, and analyze image data, independent from its origin, dimensionality and dimension."<br />
<br />
WebView3D ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://webview3d.arivis.com/" href="http://webview3d.arivis.com/">http://webview3d.arivis.com/</a> ) takes advantage of the platform-independent WebGL interface based on OpenGL standards and freely available on Google Chrome, Mozilla Firefox, Apple Safari, and the open source Opera browser. WebView3D support for Microsoft Explorer is forthcoming. (No plug-ins necessary.)<br />
<br />
The ArivisWebView framework ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.arivis.com" href="http://www.arivis.com">http://www.arivis.com</a> ) also provides a layer of collaboration tools such as marking annotations directly on regions of interest, editorial tracking by author, time and date stamping, and archiving. For example, Boston doctors can share virtual pathological slides from a cancer patient and get a second opinion by specialists from Berlin without having to download or upload the massive file locally.<br />
<br />
Although WebView3D can be used for sharing and viewing 3D images in life sciences, neuroscience, and biotechnology, its applications are not limited strictly to applied sciences.<br />
<br />
Using the new WebGL technology, WebView3D can render interactive 3D data quickly and at high resolution quality in standard web browsers. Being a standard compliant solution, the 3D technology can be implemented in any web application and interact with existing systems or used in third-party applications.<br />
<br />
WebView3D will be available as a software-as-a-service (SaaS) model, or sold as server software. The beta version can be demoed by visiting: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://webview3d.arivis.com/" href="http://webview3d.arivis.com/">http://webview3d.arivis.com/</a>.<br />
<br />
About Arivis<br />
With offices in Berlin, Germany and Seattle, Arivis products incorporate, combine, manage, visualize, and analyze image data, independent from its origin, dimensionality and dimension. Its software solutions are designed to give users fast and easy access on any pixel images from scientific sources as microscopes and computer tomographs (CT). The company provides modular software systems for scientific image processing and image analysis, finding solutions for a cost-effective and time-efficient processing of nearly indefinitely large, complex image data and in cases where conventional software fails because of excessively large image data. For further information, please visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.arivis.com" href="http://www.arivis.com">http://www.arivis.com</a>.<br />
<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.arivis.com" href="http://www.arivis.com">http://www.arivis.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/119283">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href=""></a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=119283&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Tue, 20 Dec 2011 23:45:00 -0600</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>eGestalt's New HI-SCAN Tool Paves Way for HIPAA Security and Compliance Automation on the Quick</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">eGestalt Technologies, announced HI-SCAN, a quick and inexpensive way for healthcare service providers to quickly identify and manage high-risk medical practices and business associates that are short on fulfilling HIPAA/HITECH compliance requirements.</p><p>Santa Clara, CA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 11/15/2011 --  eGestalt Technologies ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.eGestalt.com" href="http://www.eGestalt.com">http://www.eGestalt.com</a> ), a leading provider of cloud-based, SaaS-delivered, security and IT governance, risk management and compliance solutions for SMBs to enterprises, announced HI-SCAN, a quick and inexpensive way for healthcare service providers to quickly identify and manage high-risk medical practices and business associates that are short on fulfilling HIPAA/HITECH compliance requirements.The HI-SCAN tool can be used by both medical providers and theirmany business associates - contractors, hazardous waste collectors, blood work laboratories, et. al. -that serve covered entities on a daily basis.<br />
<br />
Says eGestalt President Anupam Sahai, "There are some 3 million medical providers and business associates who can use HI-SCAN to snap a valuable audit/assessment picture; to understand high-risk problem areas that need immediate attention in order to comply with HIPAA/HITECH and avoid being sacked by fines."<br />
<br />
HI-SCAN is a low-cost self-assessment tool that can be added on to the base SecureGRC solution which can be used to e-mail a short questionnaire of 20+ critical requirements to flag areas of non-compliance. It helps medical practices gain control and improve more than 200+ HIPAA/HITECH compliance points, before they are flagged as serious problems.<br />
<br />
Based on its results, users can quickly identify and prioritize the problem areas that need to be escalated. Given that medium to large covered entities deal with about 100+ BAs in the course of running their business, HI-SCAN is a quick solution for generating a quick audit/assessment, alerting both the CE and BA of problem areas in fulfilling their mandatory HIPAA compliance ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.egestalt.com" href="http://www.egestalt.com">http://www.egestalt.com</a> ) requirements and focus on the high-risk associates and consultants who need immediate attention.<br />
<br />
"A critical aspect of doing business within the Healthcare community, and as required by HIPAA/HITECH, is anyone who has access to PHI, is bound by the same regulations as the customers they serve," added Sahai. "And the penalties for non-compliance are getting stiffer. It is no longer a paltry $100 as the fines have been raised to a maximum of $50,000.And if it is proven that you are willfully neglectful, the fines can increase from $25,000 to $1.5 million with criminal penalties."<br />
<br />
Healthcare data breaches have affected nearly 11.6 million individuals, out of which 6 million records were irresponsibly handled by BAs. The average number of individuals per breach through the BA was 102,678. [Source: HHS]. <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/postedbreaches.html" href="http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/postedbreaches.html">http://www.hhs.gov/ocr/privacy/hipaa/administrative/breachnotificationrule/postedbreaches.html</a><br />
<br />
The Federal government has set aside $20 billion for upgrading the healthcare IT infrastructure by the year 2014 - spelling a huge upside for the channel. Service providers can pursue federal &apos;meaningful use&apos; dollars to the tune of $40,000 per qualified physician practice. SecureGRC generates the necessary reports for proving compliance.<br />
<br />
eGestalt&apos;s channel strategy involves the certification of Managed Compliance Providers (MCPs), a channel program based around a proprietary "cookbook" that serves as an introduction and training guide for partners just getting started with delivering managed compliance services.<br />
<br />
About eGestalt Technologies Inc.<br />
eGestalt (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.egestalt.com" href="http://www.egestalt.com">http://www.egestalt.com</a>) is a world-class, innovation driven, leading provider of cloud-computing based enterprise solutions for information security and IT-GRC management. eGestalt is headquartered in Santa Clara, CA, and has offices in the US, Asia-Pacific and Middle East. eGestalt was nominated Breakthrough Technology Vendor at XChange Americas, Aug. 2010, and selected by SiliconIndia among the "Top 10 Security Companies to Watch."  Its SecureGRC application was voted runner-up in the Managed Services Category at XChange Tech Innovators, Nov. 2010. The company was selected by Everything Channel as a 2011 CRN Emerging Technology Vendor, and a 2011 Tech Innovator in the Managed Services category.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net for eGestalt Technologies<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/114616">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.egestalt.com/">http://www.egestalt.com/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=114616&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Tue, 15 Nov 2011 13:58:10 -0600</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>eGestalt Named a 2011 Tech Innovator for 'Managed Services' by UBM Channel's CRN</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">eGestalt Technologies, announced today that its SecureGRC solution was named a runner-up in the Managed Services category at the 9th annual CRN 2011 Tech Innovator awards ceremony.</p><p>San Francisco, CA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 11/04/2011 --  eGestalt Technologies (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.eGestalt.com" href="http://www.eGestalt.com">http://www.eGestalt.com</a>), a leading provider of cloud-based, SaaS-delivered, security and information technology governance, risk management and compliance solutions for SMBs to enterprises, announced today that its SecureGRC solution was named a runner-up in the Managed Services category at the 9th annual CRN 2011 Tech Innovator awards ceremony. SecureGRC&apos;s award-winning, patent-pending technology affords MSPs the power to offer their installed base of customers a SaaS-based security and compliance solution at 1/10 the cost, with less overhead than software-only point solutions.<br />
<br />
The Tech Innovator listing celebrates vendors that have introduced new products or solutions to drive advances in the technology channel. Companies on this exclusive list recently implemented innovative methods to bridge the gap between current problems and solutions facing channel executives today. <br />
<br />
CRN selected eGestalt SecureGRC as a runner-up winner because it was built exclusively for the channel with the benefit of being a cloud-based security and risk assessment, auditing and remediation application.<br />
<br />
Starting at $750 per year, SecureGRC&apos;spatent-pending multi-tenant cloud-based SaaS architecture allows completely secure instances to be created on a per partner and end-customer basis leading to a very cost-effective, pay-as-you-go services model for customer.<br />
<br />
SecureGRC offers peace of mind to channel partners servicing SMBs to large enterprises, including medical providers and their Business Associates. SecureGRC has been widely adopted by numerous channel partners who offer security and compliance services thereby gaining entry into the lucrative markets of compliance and security, including healthcare IT, one of the fastest growing segments for the MSP business.<br />
<br />
"MSP partners can realize tremendous upside by reaching out to these covered entities&apos; Business Associates who must also comply with HIPAA/HITECH ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.egestalt.com/vulnerability-management.html" href="http://www.egestalt.com/vulnerability-management.html">http://www.egestalt.com/vulnerability-management.html</a> ) and PCI regulations," said eGestalt President Anupam Sahai. "These BAs are desperate for a simple, low-cost cloud solution like SecureGRC, and MSP partners can add bundled services to the deal for additional profit-making opportunities."<br />
<br />
eGestalt&apos;s channel strategy involves the certification of Managed Compliance Providers (MCPs), a channel program based around a proprietary "cookbook" that serves as an introduction and training guide for partners just getting started with delivering managed compliance services.<br />
<br />
For further details please call (408) 689-2586 or email sales@egestalt.com. For further details about the product, please visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.egestalt.com" href="http://www.egestalt.com">http://www.egestalt.com</a>.<br />
<br />
SecureGRC also offers an automated PCI-DSS compliance management software ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.egestalt.com/securegrc-integrated-and-automated-it-security-and-compliance-management.html" href="http://www.egestalt.com/securegrc-integrated-and-automated-it-security-and-compliance-management.html">http://www.egestalt.com/securegrc-integrated-and-automated-it-security-and-compliance-management.html</a> ) that helps meet PCI-DSS requirements in terms of building and maintaining a secure network; protecting card holder data; maintaining a vulnerability management solution; ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.egestalt.com/vulnerability-management.html" href="http://www.egestalt.com/vulnerability-management.html">http://www.egestalt.com/vulnerability-management.html</a> ) implementing strong access control measures; regularly monitoring and testing networks, and maintaining robust IT security policies. For more information visit: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.egestalt.com/automated-pci-compliance-management.html" href="http://www.egestalt.com/automated-pci-compliance-management.html">http://www.egestalt.com/automated-pci-compliance-management.html</a><br />
<br />
"In today&apos;s challenging business environment, it&apos;s more important than ever to discover, nurture and reward new ideas," said Kelley Damore, Vice President, Editorial Director for UBM Channel. "This year&apos;s Tech Innovator Awards recognizes technology companies that have used original methods or technologies to deliver cutting-edge products and partner support. We congratulate this year&apos;s winners and runners-up on their successes, and applaud them for breaking away from traditional thinking to create completely new and unique channel opportunities."<br />
<br />
CRN&apos;s 2011 Tech Innovators were nominated by their individual companies, with winners and runners-up selected by the editors of CRN and the CRN Test Center. More than 250 nominations were reviewed. The Tech Innovator awards were presented on October 5th at the 2011 NexTI Conference at the Doral Resort in Miami, FL.<br />
<br />
Winners and runners-up were presented awards in the following 18 categories:<br />
* Cloud<br />
* Digital Signage<br />
* Display-Projection<br />
* Handhelds<br />
* Managed Services<br />
* Networking-Enterprise<br />
* Networking VoIP<br />
* Networking-Wireless<br />
* Portables<br />
* Workstations<br />
* Printing and Imaging<br />
* Security<br />
* Servers<br />
* Software-Enterprise Mngt<br />
* Software Productivity<br />
* Storage<br />
* Virtualization<br />
* Editor&apos;s Choice<br />
<br />
Expanded coverage of the 2011 Tech Innovators will be featured in the December issue of CRN Magazine and online at www.crn.com.<br />
<br />
About UBM Channel(<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.ubmchannel.com" href="http://www.ubmchannel.com">http://www.ubmchannel.com</a>)<br />
UBM Channel is the premier provider of IT channel-focused events, media, research, consulting, and sales and marketing services. With over 30 years of experience and engagement, UBM Channel has the unmatched channel expertise to execute integrated solutions for technology executives managing partner recruitment, enablement and go-to-market strategy in order to accelerate technology sales. UBM Channel is a UBM company. <br />
<br />
About eGestalt Technologies Inc.<br />
eGestalt ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.egestalt.com" href="http://www.egestalt.com">http://www.egestalt.com</a> ) is a world-class, innovation driven, leading provider of cloud-computing based enterprise solutions for information security and IT-GRC management. eGestalt is headquartered in Santa Clara, CA, and has offices in the US, Asia-Pacific and Middle East. eGestalt was nominated Breakthrough Technology Vendor at XChange Americas, Aug. 2010, and selected by SiliconIndia among the "Top 10 Security Companies to Watch." Its SecureGRC application was voted runner-up in the Managed Services Category at XChange Tech Innovators, Nov. 2010. In Feb. 2011 eGestalt VP of Worldwide Sales Jim Hare was been named a Channel Chief by Everything Channel&apos;s CRN. In Sept. 2011 it was selected by Everything Channel as a 2011 CRN Emerging Technology Vendor.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />Media PR<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/112503">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://mediapr.net/">http://mediapr.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=112503&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Fri, 04 Nov 2011 11:30:00 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>GuardTime, Inventor of Keyless Signatures, Appoints New CFO and COO</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">GuardTime today appointed Tim Fitzpatrick as its new Chief Financial Officer. Fitzpatrick replaces the previous CFO Bart Matusow, who has been appointed as GuardTime’s new Chief Operating Officer.</p><p>Singapore -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 10/10/2011 --  GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ), creator of the Keyless Signature technology used to provide indisputable proof of time, origin, and integrity for electronic data, today appointed Tim Fitzpatrick as its new Chief Financial Officer. Fitzpatrick replaces the previous CFO Bart Matusow, who has been appointed as GuardTime&apos;s new Chief Operating Officer.<br />
<br />
Before joining GuardTime, Fitzpatrick served as General Counsel for five years to a $3 billion NYSE-listed medical devices company.  Prior to that, he practiced law in the corporate finance practice of international law firms in the United States and Hong Kong. Fitzpatrick received his MBA from the Kellogg-HKUST Executive MBA Program in Hong Kong, in addition to a JD degree from the University of California/Los Angeles School of Law, and an MA degree in Political Science from University of California/San Diego, and a BA in Political Science from Hamilton College.<br />
<br />
"We&apos;re excited to have Tim Fitzpatrick join our executive team," said CEO Mike Gault. "Given his impressive credentials we&apos;re confident that Tim will help drive our growth plans in not just the legal and financial services industry but other key verticals."<br />
<br />
As GuardTime&apos;s new COO, Bart Matusow has 20 years of financial industry experience covering money markets, commercial paper, foreign exchange, corporate bonds and derivatives. Prior to serving for nearly three years as CFO for GuardTime, he was a Director at Credit Suisse and before that, a Trader at the Commonwealth Bank of Australia. He received a Bachelor&apos;s degree in Economics and English from Rutgers University.<br />
<br />
"Bart Matusow performed a great service for us in the CFO role," added Gault."I&apos;m excited to have him step up in a broader role as COO to manage the company&apos;s growth into the future."<br />
<br />
Most recently, GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) was selected co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world&apos;s most promising financial technology start-ups.<br />
<br />
About GuardTime<br />
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime&apos;s Keyless Signatures provide proof of origin and that not a single bit has changed since a point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime&apos;s mission is to change the world to one where Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the cloud. Visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> for more information about using Keyless Signatures for signing your data.<br />
<br />
All company names are trademarks of their respective owners.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/110337">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.guardtime.com/">http://www.guardtime.com/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=110337&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 10 Oct 2011 09:00:00 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>GuardTime Wins $50,000 Innotribe Start-Up Challenge for Most Promising Fintech Startup</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">GuardTime is honored to announce it was selected a winner in the Innotribe$100K Start-Up Challenge, honoring the company as one of the most promising financial technology start-ups in 2011.</p><p>Toronto, ON -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) --10/10/20 11 --  GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ), creator of the Keyless Signature technology providing indisputable proof of time, origin, and integrity for electronic data, is honored to announce it was selected a winner in the Innotribe$100K Start-Up Challenge, honoring the company as one of the most promising financial technology start-ups in 2011. Selected from over 100 applicants, this year&apos;s judges awarded the prize to two winners, each receiving $50,000. The other winning company announced is Truaxis (formerly BillShrink), for its Statement Rewards application that creates transaction-based services for financial institutions, merchants and consumers.<br />
<br />
The 2011 Innotribe $100K Start-up Challenge was designed to introduce the most promising FinTech and Financial Services start-ups to SWIFT&apos;s community of more than 9,700 banking organizations, securities institutions and corporate customers in 209 countries. The award was presented in front of an audience of roughly 8000 financial industry professionals during the Innotribe@Sibos conference in Toronto on 22 September.<br />
<br />
"We&apos;re thrilled to be recognized by the financial services industry for innovation that creates indisputable and mathematically-sound audit trails for all electronic data, making it ideal for applications such as Internet banking, mobile payments, digital log forensics and eDiscovery," said Mike Gault, CEO, GuardTime. ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) "This award further validates why our customers partnered with us, and the benefits they&apos;ve realized from using GuardTime."<br />
<br />
KostaPeric, Head of Innovation at SWIFT, said: "The Start-Up Challenge is a vital component of Innotribe&apos;s work to nurture new solutions to common financial industry challenges, and Innotribe@Sibos is the ideal environment in which to foster collaborative engagement with the most exciting new propositions coming out of the start-up community. This year&apos;s winners, including GuardTime, represent innovation at its best."<br />
<br />
GuardTime customer/partners include:<br />
<br />
* ARKIBIZ, a leader in cloud-based e-documents and records management solutions;<br />
<br />
* Authentify, a leader in telephone-based, multi-factor authentication services;<br />
<br />
* Brother Industries of Japan;<br />
<br />
* Cernam, a cloud-based eDiscovery service provider;<br />
<br />
* Ftopia, an online collaboration and storage service;<br />
<br />
* Rakuten Bank, Japan&apos;s largest online bank;<br />
<br />
* SEB Estonia Bank, one of the most wired banks in the world;<br />
<br />
* Joyent, a web-hosting provider and cloud application developer, whose customers include Twitter and LinkedIn.<br />
<br />
Aboout GuardTime<br />
GuardTime was founded with the goal of solving one of the biggest problems in computing: trust. GuardTime&apos;s Keyless Signatures provide proof of data integrity, signing authority, and time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime&apos;s mission is to change the world to one where Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the cloud.Visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> for more information about using Keyless Signatures for signing your data.<br />
<br />
All company names are trademarks of their respective owners.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/109388">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.guardtime.com/">http://www.guardtime.com/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=109388&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 10 Oct 2011 09:00:00 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>NetGenieHome Wi-Fi Router Adds Parental Controls for iPad tablets, Smartphones and PCs</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Enter NetGenie, a Wi-Fi router for the home that plugs directly into the cable modem and which also offers security protection from invasive malware and viruses.</p><p>Edison, NJ -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 10/04/2011 --  With kids and teens doing more and more of their Internet browsing on smartphones and tablets like the iPad, a software-based approach to monitoring and blocking Internet access to adult content or age-inappropriate websites will no longer work. <br />
<br />
Enter NetGenie (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.netgenie.net" href="http://www.netgenie.net">http://www.netgenie.net</a>), a Wi-Fi router for the home that plugs directly into the cable modem and which also offers security protection from invasive malware and viruses.<br />
<br />
Developed by 12-year Internet security veteran Cyberoam, NetGenie is the first Wi-Fi router that comes pre-configured with parental controls and anti-virus.<br />
<br />
NetGenie parental controls provide default settings according to age group, blocking websites and applications deemed inappropriate, yet allowing the administrator (mom or dad) to grant permissions by adding to a whitelist of allowed sites.<br />
<br />
NetGenie offers parents a smart way for dealing with unruly Internet access and distractions, especially during homework time.  Being a Wi-Fi router that plugs directly into the home&apos;s cable modem, the device can control access to smartphones, gaming consoles and popular tablets such as the iPad and Android tablets. <br />
<br />
Any device connected to the home&apos;s Wi-Fi signal can be managed.<br />
<br />
For example, parents can suspend Internet access per individual for an allocated date or block of time, say from 7:00 pm to 10:00 pm Monday through Thursday, allowing free access Friday to Sunday if they so choose to.<br />
<br />
NetGenie (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.netgenie.net" href="http://www.netgenie.net">http://www.netgenie.net</a>) is also equipped with Internet security safeguards including a firewall, anti-virus protection, and intrusion prevention.<br />
<br />
"We designed NetGenie to make it simple for families to protect their kids from unsafe and adult Internet content, and to control the time they spend online on social networks, shopping or gaming sites, or anything else you want to manage," said Jacob Thankachen, Associate Vice President for Americas, Cyberoam. "We also made it a no-brainer to keep hackers, viruses and other intruders at bay when your family surfs the Internet."<br />
<br />
Additionally, the device can generate reports on Internet activities such as websites visited, applications used, attempts made to visit blocked websites or applications, along with virus and intrusion reports. <br />
<br />
NetGenie can be configured using any Internet-access device in the home. Settings for individual members of the family can be made.<br />
<br />
Pricing &amp; Availability<br />
NetGenie is available now and will retail for $199 with support for an unlimited number of home users.A SOHO version is also available for $249. To buy NetGenie contact:  Jacob Thankachen, Tel: (201) 301-2851. Jacob.thankachen@us.cyberoam.com.  Or email: sales@netgenie.net.<br />
<br />
About Cyberoam<br />
Cyberoam Identity-based UTM appliances offer comprehensive protection against existing and emerging Internet threats, including viruses, worms, Trojans, spyware, phishing, pharming and more. Cyberoam UTM delivers the complete range of security features such as stateful inspection firewall, VPN, gateway anti-virus, gateway anti-malware, gateway anti-spam, and intrusion prevention system, content filtering in addition to bandwidth management and multiple link management over a single platform. The Cyberoam solution portfolio includes Cyberoam iView, a logging and reporting appliance solution, Cyberoam SSL VPN appliances and Cyberoam Endpoint Data Protection suite to protect data and manage assets over endpoints in organizations. Cyberoam is certified with CheckMark UTM Level 5 Certification, ICSA Labs, and is a member of the Virtual Private Network Consortium. Cyberoam was positioned as a "Visionary" in the Magic Quadrant for SMB Multi-function Firewalls by Gartner. Cyberoam has also continuously received SC Magazine&apos;s 5 Star Rating. Cyberoam has offices in Woburn, MA and India. For more information, please visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.cyberoam.com" href="http://www.cyberoam.com">http://www.cyberoam.com</a> and <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.netgenie.net" href="http://www.netgenie.net">http://www.netgenie.net</a>.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/109763">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.netgenie.net/">http://www.netgenie.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=109763&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Tue, 04 Oct 2011 11:05:12 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Reports Show Targeted Computer Attacks Spike With Heavy SMB Focus</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p>Hudson, NH -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 10/04/2011 --  According to a recent Symantec blog, attackers are targeting SMBs at a greater rate than larger companies of more than 500 people. Some other interesting facts from Symantec&apos;s cloud research:<br />
<br />
"The percentage of employees who received a targeted Trojan during 2010 was much higher for the SMB sector than for large companies. One small business, in particular, had targeted Trojans sent to all 488 of their employees. SMB industry sectors such as mineral/fuel, non-profit, engineering, marketing and recreation received the most attacks compared with other industry sectors, showing that they are at higher risk. They also found that attackers target intellectual property and market-leading research - focusing their efforts on education and market research organizations, in particular."<br />
<br />
Commtouch, a provider of antivirus technology to industry, is indicating in its blog that targeted emails with malicious attachments have increased dramatically since August to two billion or more per day. These are not emails with links to bogus or malicious websites, but attachments that may look like normal document files typical in business. These attacks are not spam but something far more sinister.<br />
<br />
These targeted attacks are aimed at specific individuals in specific organizations, contain embedded malware, and are designed largely to capture credentials and gain access to valuable data. Much of this targeted email with malicious attachments bypasses antivirus and gateway protections. It lands squarely in a target&apos;s inbox as legitimate email. The embedded malware is designed to be unique and unknown to anti-virus and anti-malware.<br />
<br />
If you find yourself reading an email with an attachment that seems to be legitimate, think twice, it may not be. A targeted email attack often uses information about you to gain your trust. It will seem like a normal email.<br />
<br />
So what do you do? Symantec&apos;s blogger suggests that you "use common sense" and "be smart." Your business associates send you data files that you open all of the time. The attacker will pose as one of them, but will bury a program inside. You can&apos;t possibly know for sure, regardless of how much common sense you apply.<br />
<br />
The new SavantEnforcer (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.savantprotection.com" href="http://www.savantprotection.com">http://www.savantprotection.com</a>) client will block malicious attachments automatically because it denies by default any unknown executable. It&apos;s a simple and powerful antidote for the avalanche of targeted malware and it can be installed on a computer for about a dollar per month. Should you use common sense, good security practices and keep your software protection up to date? Of course you should. But you may also want to consider a solution that gives you the confidence to open an attachment without the risk of compromise.<br />
<br />
About Savant Protection<br />
Savant Protection is a leading privately held vendor of innovative application whitelisting solutions that fill major gaps in the functionality of other endpoint security and management products and provide significant operational and financial benefits to customers. The company&apos;s solutions are easy to integrate with existing systems, are not dependent on a central whitelist database, and can stop zero-day attacks and address the increasing inability of existing endpoint solutions, such as signature-based anti-virus products, to effectively protect against the growing proliferation of sophisticated, targeted malware.Savant Protection&apos;s customers are able to lower costs and increase their organization&apos;s productivity by minimizing endpoint incidents that require remediation and cause unproductive downtime for users. Savant Protection is headquartered in Hudson, New Hampshire, USA. <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.SavantProtection.com" href="http://www.SavantProtection.com">http://www.SavantProtection.com</a></p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />MediaPR.net<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/109754">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.savantprotection.com/en/index.php">http://www.savantprotection.com/en/index.php</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=109754&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Tue, 04 Oct 2011 10:14:08 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Arkibiz Partners With GuardTime to Provide Auditable E-Documents and Records Management in the Cloud</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Truly paperless, fully auditable, all cloud.</p><p>Singapore -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 09/23/2011 --  GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ), creator of the patented Keyless Signature technology used to provide indisputable proof of time, origin, and integrity for electronic information, today announced that its Keyless Signatures will be adopted by ARKIBIZ, a leader in cloud-based information management solutions aimed at providing proof of data and transaction integrity for e-documents and records management.<br />
<br />
Up to 80% of today&apos;s business information is created and managed in unstructured form; it is expected to rise to 90% or more in the coming years. According to recent IDC estimates, every 5.5 years ofdata managed by enterprises will grow by a factor of 10.According to collaborative research conducted by NetApp and marketing research firm ACNielsen, ERP, CRM, and corporate emails are the leading causes of this massive growth in data, where roughly 62% of the total enterprise data is affected.<br />
<br />
Document and records management solutions have become an essential part of the everyday IT infrastructure. However, not all organizations can invest in enterprise-level solutions such as those from vendors like IBM, Oracle, and EMC. The Ebikko solution from ARKIBIZ is a cloud-based, full multi-tenant EDRMS solution with a highly-customizable workflow module. The rich functionalities of the EDRMS are accessed seamlessly through a web browser on the desktop without the user ever having to install any software.<br />
<br />
GuardTime&apos;s Keyless Signature (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a>) technology is used by ARKIBIZ to sign the records and archived files managed by the ARKIBIZ EDRMS solution. This provides consumers with undeniable proof of authenticity and integrity of both the process and the data. Having audit-ready, independently-verifiable data that captures all transactions and documents solves a variety of compliance issues and a host of potentially business-damaging disputes otherwise left to trust. By converting trust to proof, companies can also reduce their dependency on paper-based transactions while improving overall productivity across their entire document workflow process.<br />
<br />
"GuardTime&apos;s innovative technology (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a>) changes the game for the EDRMS market," said Steve Kucia, Director of Global Sales and Marketing, ARKIBIZ. "With the integration of Keyless Signatures in our offering, our customers gain proof of authenticity for their data and surrounding workflow, regardless of the information being stored on their disks, crossing the wire, or hosted in the cloud."<br />
<br />
"Technologies brought to market prior to GuardTime&apos;s patented Keyless Signatures have failed to deliver simple and lasting solutions for digital data integrity," said Mike Gault, GuardTime CEO. "There has been an unacceptable amount of reliance on the various layers of security designed to &apos;trust&apos; the data. This issue of trust is totally exposed in the cloud, where the data itself needs to carry with it the proof of time, integrity and origin. With GuardTime&apos;s Keyless Signature Service ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ), an organization&apos;s most valuable digital assets are assured with provable integrity regardless of where they are stored, who needs to verify them, and when."<br />
<br />
This announcement follows a string of similar partner integration deals that include such companies as Japan&apos;s Brother Industries, web-hosting provider Joyent, whose customers include Twitter and LinkedIn, and cloud-based eDiscovery service provider, Cernam.<br />
<br />
About ARKIBIZ<br />
ARKIBIZ assists companies in the management of their information according to their business lifecycles, enabling them to comply with local and international standards and regulations. ARKIBIZ provides cloud-based data management solutions for records, documents, business process information, and archives. ARKIBIZ Ebikko solution platform is sold by over 40 resellers in more than 10 countries.<br />
<br />
About GuardTime<br />
A Red Herring Global 100 Winner and Frost &amp; Sullivan Product Innovation Award Winner, GuardTime was founded with the goal of solving one of the biggest problems in computing: trust. GuardTime&apos;s Keyless Signatures provide proof of data integrity, signing authority, and time. The verification of the signature can be done offline without the reliance on keys, secrets, or the existence of a trusted third party. GuardTime&apos;s mission is to change the world to one where keyless signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the cloud. Visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> for more information about using Keyless Signatures for signing data.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/108137">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.guardtime.com/">http://www.guardtime.com/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=108137&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Fri, 23 Sep 2011 09:30:00 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>GuardTime Keyless Signatures Sign 98% of SEB Estonia Banking Transactions, Protecting Against Fraud</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">GuardTime, today announced that SEB Estonia, a member of the international SEB Group,has selected the Keyless Signature Service for assuring the integrity for all of their electronic banking transactions, providing customers with indisputable proof that the bank’s assets are protected against insider attacks, external breaches and fraud.</p><p>Singapore,  -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 09/22/2011 --  GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ),creator of the patented Keyless Signature technology used to convert the trust relationship between business operations and data to one based on proof, today announced that SEB Estonia, a member of the international SEB Group, has selected the Keyless Signature Service for assuring the integrity for all of their electronic banking transactions, providing customers with indisputable proof that the bank&apos;s assets are protected against insider attacks, external breaches and fraud.<br />
<br />
Ninety-eight percent of all banking transactions at SEB Estonia are carried out electronically; at an ATM, online via the web, or through a mobile device. By signing their banking transaction logs using the GuardTime Keyless Signature Service, ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) SEB Estonia can be assured that attacks against, and the misuse of, their systems and data becomes impossible to conceal.<br />
<br />
"With GuardTime&apos;s unique Keyless Signatures service, we are now able to independently prove the time, origin and content for all of our electronic banking transactions," said Kaido Raiend, Head of IT Security Analysis for SEB Estonia. "As tampered data becomes mathematically-capable to detect, we have the legal proof necessary to confirm that the transactions were conducted and recorded at the times specified and that they remain intact and accurate" even if GuardTime ever ceased to exist."<br />
<br />
GuardTime&apos;s Keyless Signatures ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) are stored and archived with each and every SEB Estonia transaction log, providing SEB Estonia proof of time and integrity for the life of their data. As the signatures do not use any public/private encryption keys for long-term verification, the proof will never expire. The signatures are portable, thereby enabling SEBE stonia to electronically archive their signed logs without loss of legal strength; this substantially reduces the bank&apos;s risk as well as their overall paper-based and digital archiving costs. <br />
<br />
Around the globe, financial institutions, hardware manufacturers, Telco operators, cloud service providers, legal entities, and insurance companies are using the GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) service to make the electronic world a safer place; a world based on proof rather than trust.<br />
<br />
About SEB Estonia<br />
AS SEB Pank, a member of SEB Group, is an Estonian financial group that serves private individuals, companies and the public sector. The bank is a universal bank that offers its customers a wide range of financial services. The more than 820,000 customers of SEB Pank Group are served by 1300 employees. The customers are served through many different channels such as 38 branch offices, 226 on-line post offices, 350 ATMs, 6191 POS-terminals. There are more than 500 000 debit and credit cards in use. ¾ of customers are served over Internet bank. For more information, visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.seb.ee" href="http://www.seb.ee">http://www.seb.ee</a>.<br />
<br />
About GuardTime<br />
A Red Herring Global 100 Winner and Frost &amp; Sullivan Product Innovation Award Winner, GuardTime was founded with the goal of solving one of the biggest problems in computing: trust. GuardTime&apos;s Keyless Signatures provide proof of data integrity, signing authority, and time. The verification of the signature can be done both online and offline and does not rely on keys, secrets, or the existence of a trusted third party. GuardTime&apos;s mission is to change the world to one where keyless signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit or in the cloud.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />mediapr.net<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/108146">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.mediapr.net">http://www.mediapr.net</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=108146&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Thu, 22 Sep 2011 12:00:47 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Brainloop September 15 Webinar Looks at "Trends in Online Collaboration: When Security, Compliance &amp; Productivity Collide"</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Brainloop, today announced a September 15th webinar featuring Gartner analyst Jeffrey Mann.</p><p>Boston, MA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 09/12/2011 --  Brainloop ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.brainloop.com" href="http://www.brainloop.com">http://www.brainloop.com</a> ), a leading supplier of software solutions for high-security collaboration on confidential documents, today announced a September 15th webinar featuring Gartner analyst Jeffrey Mann.<br />
<br />
Titled, "Trends in online collaboration: When security, compliance &amp; productivity collide," the webinar is scheduled for Thursday, September 15, 2011 at 2:30pm EDT / 11:30am PDT<br />
<br />
To register click <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://webinars.brainloop.com/content/Gartner_Webinar_Registration_Americas" href="http://webinars.brainloop.com/content/Gartner_Webinar_Registration_Americas">http://webinars.brainloop.com/content/Gartner_Webinar_Registration_Americas</a><br />
<br />
When companies share sensitive documents with partners outside the corporate network, security, compliance and collaboration are often seen as a tradeoff. You can lock information down behind the firewall with strict policies and centralized control, but without collaboration. Or you can use a collaboration portal, but at the expense of security and the ability to enforce corporate confidentiality policies.<br />
<br />
In this Brainloop ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.brainloop.com" href="http://www.brainloop.com">http://www.brainloop.com</a> ) webinar, featured speaker and Gartner analyst Jeffrey Mann will discuss industry trends and demands for security and compliance in online collaboration. Mr. Mann&apos;s discussion will be followed by comments from Brainloop Vice President Paul Hands about Brainloop&apos;s approach to secure collaboration using document compliance management, and a lively Q&amp;A session.<br />
<br />
Who should attend:<br />
* Information security leaders interested in developing and rolling out confidentiality policies<br />
* Senior managers in companies subject to regulatory requirements or contractual obligations to protect confidential information <br />
* Anyone whose work involves sharing documents outside the company for<br />
- Collaboration on R&amp;D<br />
- Intellectual property<br />
- Legal affairs<br />
- Corporate governance<br />
- Boards of directors<br />
- Mergers and acquisitions<br />
- Investor relations<br />
- Strategic alliances<br />
- Work with outside consultants or others outside the enterprise<br />
<br />
About Gartner Analyst Jeffrey Mann<br />
Jeffrey Mann is a research vice president for collaboration and social software at Gartner Research. Mr. Mann focuses on social software, team workspaces, the collaboration market, cloud-based collaboration platforms and user adoption.Prior to joining Gartner, Mr. Mann was with Meta Group, where he served as a senior analyst covering e-business, collaboration, content management, portals, knowledge management and compliance. Previously, he was with Dutch software development vendor Uniface International, where he was the eighth employee. <br />
<br />
He continued with the organization after it was acquired by Compuware. During his 10 years there, he was a documentation writer, support manager, product manager and director of product strategy.<br />
<br />
About Brainloop<br />
Brainloop, with offices in Boston and Munich, uses document compliance management (DCM) to make online collaboration safe and compliant, giving users the peace of mind to focus on their business goals. Brainloop&apos;s web based solution automatically manages security and compliance, allowing highly confidential documents to be easily edited and distributed inside and outside the corporate network. Encryption and operator shielding protect all documents from insider threat and external attacks, providing a highly secure collaboration framework. The solution enables the complete transparency and auditability of all accesses and changes to documents, supporting corporate and regulatory compliance directives. <br />
<br />
Frequent uses include contract negotiations, collecting data and writing up quarterly reports, and any other communication that contains confidential information. To learn more, visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.brainloop.com" href="http://www.brainloop.com">http://www.brainloop.com</a>.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />MediaPR.net Inc<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/106743">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.brainloop.com/">http://www.brainloop.com/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=106743&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 12 Sep 2011 08:00:00 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>GuardTime Selected As Top 10 Finalist for Innotribe Start-Up Challenge</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">GuardTime, is pleased to announce that it has been selected as a top 10 finalist in the Innotribe $100K Start-Up Challenge, honoring the company as one of the most promising financial technology and financial services start-ups.</p><p>Singapore -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 09/08/2011 --  GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ), creator of the Keyless Signature technology providingin disputable proof of time, origin, and dataintegrity for electronic information, is pleased to announce that it has been selected as a top 10 finalist in the Innotribe $100K Start-Up Challenge, honoring the company as one of the most promising financial technology and financial services start-ups.<br />
<br />
GuardTime&apos;s Keyless Signatures ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) allow for the creation of provable audit trails for all electronic data, making it ideal for financial services applications such as Internet banking, mobile payments, business-to-business and business-to-consumer communications, digital log forensics, and eDiscovery.<br />
<br />
Early investors in GuardTime include Ambient Sound Investments,Horizons Ventures, and the Infocomm Development Agency (IDA) of Singapore.<br />
<br />
The Innotribe Challenge was open to over 80 innovative technology start-ups and technology-enabled financial service companies from more than 15 countriesworking in areas such as payments, securities, trading, social media tools, big data/data analytics, security, identity, b2b or b2b2c mobile, and small business apps &amp; services and/or IT infrastructure.<br />
<br />
On September 21, 2011 at Sibos in Toronto, GuardTime ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> ) and nine other finalists, selected by expert judges and community votes will present to an invitation-only audience of dozens of decision-makers from the world&apos;s largest financial institutions, serial entrepreneurs, investors, and media. On September 22, two of these finalists will each be presented with a check for $50,000 in front of Sibos&apos; audience of 8,000 financial industry professionals.<br />
<br />
GuardTime looks forward to the opportunity to accept two invitations to the post-competition networking dinner with investors and executives from institutions such as CITI,Credit Agricole, Deutsche, DNBNor, HSBC, JP Morgan, OCBC, and Standard Chartered.<br />
<br />
More information can be found at: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://innotribestartup.myreviewroom.com/pages/details" href="http://innotribestartup.myreviewroom.com/pages/details">http://innotribestartup.myreviewroom.com/pages/details</a><br />
<br />
About GuardTime<br />
GuardTime captured the top spot in the public vote for the Innotribe Start-Up Challenge (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://bit.ly/oOLkxc" href="http://bit.ly/oOLkxc">http://bit.ly/oOLkxc</a>).Also a Red Herring Global 100 Winner and Frost &amp; Sullivan Product Innovation Award Winner, GuardTime was founded with the goal of solving one of the biggest problems in computing: trust. GuardTime&apos;s Keyless Signatures provide proof of data integrity, signing authority, and time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime&apos;s mission is to change the world to one where Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the cloud.Visit <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.guardtime.com" href="http://www.guardtime.com">http://www.guardtime.com</a> for more information about using Keyless Signatures for signing your data.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />MediaPR<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/106751">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://mediapr.net/">http://mediapr.net/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=106751&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Thu, 08 Sep 2011 20:30:00 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>VoltUp to Award $100 Gift Card for Essay Contest, "How Longer Battery Life Saved My Day"</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p>Boston, MA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 09/06/2011 --  VoltUp ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.volt-up.com" href="http://www.volt-up.com">http://www.volt-up.com</a> ) a battery extender for Android smartphones that can double battery life, today announced an essay contest to award the winning entry with a $100 Amazon gift card. The essay can be any length and should address, "How a longer battery life saved my day." The contest will run from September 1st to September 15th, 2011.<br />
<br />
Entries can be emailed to feedback@volt-up.com  or posted on our Facebook page "PowerMax by VoltUp - extend Smartphone battery life."<br />
<br />
Entries can also be mailed to: PowerMax Contest, Suite 202, 1337 Massachusetts Ave, Arlington, MA 02476.<br />
<br />
PowerMax by VoltUp offers a free version and can be downloaded from Android Market by clicking: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="https://market.android.com/details?id=com.voltup.powermax" href="https://market.android.com/details?id=com.voltup.powermax">https://market.android.com/details?id=com.voltup.powermax</a> . A permanent license can be purchased once the free trial concludes.<br />
<br />
Most smartphones are stacked with power-hungry applications that typically drain batteries in less than eight hours.  Volt-Up&apos;s patent-pending technology controls  how a device&apos;s many radios - 2G/3G/4G, WiFi, FM, GPS, Bluetooth - are managed.  PowerMax by VoltUp puts these radios to sleep when the user wants to trade functionality for battery life.<br />
<br />
About VoltUp<br />
BatteryStorm Mobile Inc. is the parent company behind VoltUp, a growing company providing technology to extend battery life of mobile devices. At VoltUp, our mission is to lead the mobile device power management optimization market and open up a new world of possibilities for users. To date, VoltUp and its PowerMAX application has achieved more than 350,000 downloads.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Principal<br />VoltUp<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/106393">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.volt-up.com/">http://www.volt-up.com/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=106393&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Tue, 06 Sep 2011 11:37:28 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>VoltUp Extends Battery Life by 2x for Android Phones</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">300,000 trial downloads in only six months.</p><p>Boston, MA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 07/25/2011 --  When Carl Johnson got the call about his daughter&apos;s car accident, he rushed to the emergency room. After consulting with doctors, he made calls to his wife and family members. He was in the middle of giving an update on his daughter&apos;s condition when his smartphone&apos;s battery died.<br />
<br />
This incident was the inspiration for founding VoltUp ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.volt-up.com" href="http://www.volt-up.com">http://www.volt-up.com</a> ) last year, a Boston-based start-up headed by Joseph "Yossi" Weihs, an embedded devices engineer and a 20-year tech veteran.<br />
<br />
"Smartphones that carry the Google Android platform can rest assured their phones will not fail them when they need them most," said Weihs, "Of course we can&apos;t make the battery last forever, but in most cases we can double battery life, which can make all the difference, especially during emergencies."<br />
<br />
A simple mobile phone (tongue in cheek "dumb" phone) can last two weeks on a single battery charge. But most smartphones are stacked with power-hungry applications that typically drain batteries in less than eight hours.<br />
<br />
Volt-Up&apos;s patent-pending technology controls how a device&apos;s many radios - 2G/3G/4G, WiFi, FM, GPS, Bluetooth - are managed. PowerMax by VoltUp puts these radios to sleep when the user wants to trade functionality for battery life..<br />
<br />
Limiting a cellphone&apos;s radio frequencies also bodes well for the controversy surrounding the use of cellphones causing brain tumors, although the National Cancer Institute found this link "inconclusive."<br />
<br />
PowerMax by VoltUp analyzes personal usage patterns, essentially learning how the owner uses the phone. The app reads information on how fast the battery is discharging and lets users know how much battery power is being saved and used.<br />
<br />
PowerMax by VoltUp offers a free version and can be downloaded from Android Market by clicking: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="https://market.android.com/details?id=com.voltup.powermax" href="https://market.android.com/details?id=com.voltup.powermax">https://market.android.com/details?id=com.voltup.powermax</a> . A permanent license can be purchased once the free trial concludes. Over 300,000 copies of PowerMax have been installed (as reported by Flurry).<br />
<br />
About VoltUp<br />
BatteryStorm Mobile Inc. is the parent company behind VoltUp, a growing company providing technology to extend battery life of mobile devices. At VoltUp, our mission is to lead the mobile device power management optimization market and open up a new world of possibilities for users.</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />VoltUp<br />Telephone: 978-594-4134<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/101460">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.volt-up.com/">http://www.volt-up.com/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=101460&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 25 Jul 2011 13:38:27 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Corero Expands Management Team with Executive Appointment</title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Leader in IPS and DDoS Defense Systems Names Paul Jones as Vice President of Engineering.</p><p>San Francisco, CA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 07/20/2011 --  Corero Network Security (CNS:LN), a leading global provider of Network Intrusion Prevention Systems (IPS) and Distributed Denial of Service (DDoS) Defense Solutions, named technology veteran Paul Jones as vice president of Engineering to the company management team.<br />
<br />
As VP of Engineering, Paul is responsible for the company&apos;s engineering infrastructure and processes including executing Corero&apos;s aggressive product development roadmap. Paul brings a breadth of experience in strategic and tactical product engineering for networking products. He managed Engineering at Sonus Networks (VoIP), Indus River Networks (Managed VPN), Stratus Computer (Fault Tolerant Computing) and Stellar Computer (Graphics Supercomputing). He holds a Bachelor of Arts degree in English Literature from Brown University and a Master of Science degree in Electrical and Computer Engineering from the University of Massachusetts.<br />
<br />
"Paul joins Corero at an exciting time of transformational growth for the company, marked by the recent introduction of our dedicated anti-DDoS product line," said Marty Meyer, General Manager and CFO at Corero Network Security. "Paul&apos;s proven track record in bringing to market cutting edge products will bolster our efforts to address the latest cyber threats that are increasing in frequency and sophistication. We are delighted that he&apos;s joined the Corero team and look forward to benefiting from the experience that we believe he&apos;s uniquely able to provide."<br />
<br />
Corero ( <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com" href="http://www.corero.com">http://www.corero.com</a> ) is a global provider of innovative Network Intrusion Prevention Systems (IPS) and a leading provider of DDoS Defense Systems (DDS).  Corero is developing and bringing to market network security infrastructure solutions that help commercial and government organizations protect their critical on-line assets from the losses and risks associated with cyber threats. Its family of IPS appliances is designed with the most advanced protection capabilities against known and unknown attacks at the highest tested performance rates. It also announced the launch of a new anti-DDoS product line, DDS, which provides advanced DDoS protection on both the network- and application-layers.<br />
<br />
About Corero Network Security<br />
Corero Network Security (CNS:LN), formerly Top Layer Security, is a leading global provider of Network Intrusion Prevention Systems (IPS) and Distributed Denial of Service (DDoS) Defense Solutions (DDS) that enable enterprise organizations to protect their critical on-line assets against risks associated with network-borne cyber threats. Corero has been consistently recognized through the years for its product innovation and leadership by customers, media and industry analysts alike. Corero is headquartered in Massachusetts, U.S. with sales and services support worldwide. For more information please visit: <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.corero.com" href="http://www.corero.com">http://www.corero.com</a> .</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />Corero Network Security<br />Telephone: 978-212-1500<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/100549">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.corero.com/">http://www.corero.com/</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=100549&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Wed, 20 Jul 2011 11:55:28 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
    <item>
      <title>Brainloop Productivity and Security Features Cited in Two Leading Industry Analyst Reports  </title>
      <link>http://www.releasewire.com/press-releases/release-3.htm</link>
      <description><![CDATA[<div class="newsleft"><div class="newsbody"><p class="subheadline">Research defines Virtual Data Rooms & Board of Directors Communications Systems.</p><p>Boston, MA -- (<a rel="nofollow" href="http://www.sbwire.com/">SBWIRE</a>) -- 04/25/2011 --   Brainloop (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.brainloop.com" href="http://www.brainloop.com">http://www.brainloop.com</a>), a leading supplier of software solutions for high-security management of confidential documents, today announced that it was cited in two analyst reports published by the research firm Gartner, Inc.<br />
<br />
Two reports published by the research firm Gartner point to cloud solutions for securing confidential documents. <br />
<br />
One report, "Introduction to Virtual Data Rooms" (ID# G00211311), written by Gartner Analysts Jay Heiser and Jim Murphy, defines virtual data rooms (VDRs) as "a class of SaaS primarily used for financial investing communications, and also for life sciences, litigation and other sensitive external collaboration scenarios. Individuals looking for temporary or permanent mechanisms to support a highly controlled sharing of proprietary and regulated data outside of the enterprise should consider one of these services."<br />
<br />
"We are honored to be included in these important Gartner research reports, as we believe they confirm our market approach to reducing information risk by means of a secure document compliance management solution," said Peter Weger, Brainloop CEO. (<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.brainloop.com" href="http://www.brainloop.com">http://www.brainloop.com</a>) "Companies need to become more aware of the indispensible boost to productivity, security and compliance that these solutions offer to organizations as they seek to better manage and secure their most confidential documents."<br />
<br />
Brainloop has achieved much success, with its document security and compliance management solution being used by multinational companies for such applications as corporate development, contract management, financial reporting, boardroom meetings and other confidential communications.<br />
<br />
Also published simultaneously with the VDR report and serving as a companion report, "Introduction to Board of Directors Communications Systems," (by Jay Heiser and Jim Murphy, Gartner ID# G00211442) cites key findings, recommendations and analysis on Board Communications Systems (BCSs).<br />
<br />
Gartner defines board communications systems as applications that "simplify the task of creating and compiling hundreds of pages of documentary information into the quarterly board book, securely disseminating that material to board members. Any organization that is mailing out paper board books containing highly sensitive and topical information should consider portal-based solutions for efficiency and security reasons."<br />
<br />
"Board communications systems (BCSs) are software as a service (SaaS)-based trusted portals that are used by public and private organizations to share board meeting material with internal and external board and committee members. Organizations with a board of directors should consider using one of these services."<br />
<br />
About Brainloop<br />
Brainloop, with offices in Boston and Munich, is the leading supplier of document compliance management solutions (DCM) for the high security handling of confidential documents. These web based solutions allow highly confidential documents to be edited and distributed inside and outside the corporate network. Encryption and operator shielding protect all documents from unauthorized internal and external attacks, providing a highly secure collaboration framework. The solutions enable the complete transparency and auditability of all accesses and changes to documents, supporting corporate and regulatory compliance directives. Frequent uses include contract negotiations, collecting data and writing up quarterly reports, and any other communication that contains confidential information. <a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.brainloop.com" href="http://www.brainloop.com">http://www.brainloop.com</a> <br />
<br />
Press &amp; Media Contact:<br />
Victor Cruz<br />
MediaPR.net, Inc<br />
Boston, MA<br />
(401) 349-3369<br />
vcruz@mediapr.net<br />
<a class="extlink"  rel="nofollow noopener"  target="_blank"  title="http://www.brainloop.com" href="http://www.brainloop.com">http://www.brainloop.com</a><br />
<br />
Copyright © 2011, Brainloop AG. All rights reserved. All trademarks mentioned in this document are the property of their respective owners.<br />
</p><p>For more information on this press release visit: <a rel="nofollow" href="http://www.releasewire.com/press-releases/release-3.htm">http://www.releasewire.com/press-releases/release-3.htm</a></p></div><h2>Media Relations Contact</h2><p>Victor Cruz<br />MediaPR.net, Inc<br />Telephone: 401-349-3369<br />Email: <a rel="nofollow" href="http://www.sbwire.com/press-releases/contact/89127">Click to Email Victor Cruz</a><br />Web: <a rel="nofollow" href="http://www.brainloop.com">http://www.brainloop.com</a><br /></div><div><p><img src="https://cts.releasewire.com/v/?sid=89127&amp;s=f&amp;v=f" width="1" height="1" alt=""><span></span></p></div>]]></description>
      <pubDate>Mon, 25 Apr 2011 13:42:32 -0500</pubDate>
      <guid>http://www.releasewire.com/press-releases/release-3.htm</guid>
    </item>
  </channel>
</rss>
