Tag Archives: cloud computing

Data Integrity Solution Provider Appoints Gustav Poola as Vice President of Products

Guardtime announced today that Mr. Gustav Poola has joined the company as Vice President of Products.

Palo Alto, CA (USA), Tuesday – June 05, 2012 — Guardtime ( http://www.guardtime.com ) announced today that Mr. Gustav Poola has joined the company as Vice President of Products. Poola brings to Guardtime a robust track record of performance and innovation based on more than 20 years of hardware design and managerial experience.

“Guardtime Keyless Signature technology represents a breakthrough in data validation for the enterprise, cloud, and telecommunications industries. I look forward to contributing to its widespread adoption, growth, and success,” Poola said.

For 12 years, Poola served as CEO of Artec Group, a leading provider of electrical engineering services with customers including STMicroelectronics and National Semiconductor. Under Poola’s management, Artec Group grew to over 70 employees and engineered many successful products such as the Geode SoC-based ThinCan product line, a reference design that revolutionized thin-computing in 2006. Prior to Artec, Poola worked for ZF Micro Solutions, Fujitsu, and Cabelco Technologies.

“I’m very pleased to welcome Gustav to the team,” said Guardtime CEO Mike Gault. “Guardtime’s technology is playing a critical role in providing independent validation of data and virtual machines in a cloud environment. Cloud computing is in its infancy, and aside from his general track record in creating successful products, we hope to leverage Gustav’s experience in appliance design to extend our scope deep into the hardware level.”

Guardtime’s patented Keyless Signature technology ( http://www.guardtime.com ) provides irrefutable proof of integrity for data stored on disk, residing in the Cloud, or in transit across networks. Keyless Signature-based solutions are being adopted by governments, telecommunications service providers, and cloud infrastructure vendors around the globe in order to enhance transparency and provide stakeholders an independent and irrefutable method of proving that the implemented data security measures are working properly.

About Guardtime:
Guardtime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. Guardtime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. Guardtime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

All company names are trademarks of their respective owners.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Palo Alto, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

IDC Research Paper Looks at Ensuring and Proving Big Data is Tamper-Free

“Data Integrity in the Big Data Digital Age” gives data its proof in court.

San Francisco, CA (USA), Wednesday – April 18th, 2012 — A new executive brief published by IDC examines one of the major obstacles organizations face when committing resources and applications to cloud computing. At stake is the issue of validating the integrity and authenticity of data within a cloud environment.

“When the data is hosted onsite, this process of data integrity can certainly be a challenge. However, when data is not hosted within the traditional internal IT data center environment, there needs to be a method of ensuring indisputable data integrity,” cites the report.

Titled “Data Integrity in the Big Data Digital Age”, the research paper ties the current Big Data phenomenon with cloud computing, making a case for how organizations must grapple with analyzing and basing decisions on petabytes of unstructured data, yet rarely questioning the authenticity of this data.

Questions the report seeks to answer include: Has my data been tampered with? Is the data source legitimate? How can indisputable proof be offered that data integrity remains intact? And in cases that involve the legal system, how to bring documents, log files, or audio files to the level where they can be admitted as irrefutable evidence?

These questions take the data integrity argument well beyond the premise and perimeter of IT security matters. Few options exist today that can achieve tamper-proof data security outside of the reliance on third-party certification authorities, or the unwieldy management of a public key infrastructure. What’s required is a way to validate, verify, and self-authenticate the data independently of any third-party agency.

Sponsored by GuardTime, the executive brief details a compelling case for the adoption of Keyless Signatures, explaining how the mathematically-driven system works. The Keyless Signature technology is used to provide indisputable proof of time, origin, and integrity for electronic data.

“The goal of the keyless signature technology is to provide mass-scale, non-expiring data validation while eliminating the need for secrets or other forms of trust, thereby reducing or even eliminating the need for more complex certificate-based solutions, as these are ripe with certificate management issues, including expiration and revocation,” the paper explains.

“A keyless signature provides an alternative method to key-based technologies by providing proof and non-repudiation of electronic data using only hash functions for verification. The implementation of keyless signature is done via a globally distributed machine, taking hash values of data as inputs and returning keyless signatures that prove the time, integrity, and origin (machine, organization, individual) of the input data.”

“Any client using the keyless signature service can make a request to sign any data item it has access to; a log file, XML file, office document, database record, SWIFT transaction, FPML message, eDiscovery productions, etc. In return, the client will receive a keyless signature which can be stored along side the signed data, within the signed data, or in a repository separate from the signed data for backup and archival purposes.”

By signing the data using GuardTime’s Keyless Signatures ( http://www.guardtime.com ), an organization can automatically detect when and where the data was created or transferred, and if the data has been tampered with or not. An alert is sent to the customer when an abnormal status is detected.

In this manner, organizations can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data usage and storage in the Cloud.

The report concludes with “The keyless nature of this technology helps reduce the footprint by removing the need for cipher keys and passwords, which arguably can also be lost or mislaid, and since the integrity can be validated by the document owners, the ability to leverage the cloud computing platform places it well for future adoption.”

The full report can be found here: http://www.guardtime.com/whitepapers

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world’s most promising financial technology start-ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
San Francisco, CA – USA
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

GuardTime and RDG China Collaborate on Digital Rights Management (DRM)

GuardTime today signed an agreement with Beijing-based RDG China, Read Digital Science & Technology Co., Ltd., to collaborate in the area of digital rights management.

Beijing, China, Monday – April 02, 2012 — GuardTime ( http://www.guardtime.com ), creator of the Keyless Signature technology providing indisputable proof of time, origin, and integrity for electronic data, today signed an agreement with Beijing-based RDG China, Read Digital Science & Technology Co., Ltd. ( http://www.chinardg.com ), an application development firm offering products, solutions and services for the Chinese publishing industry, to collaborate in the area of digital rights management.

“We are excited to use GuardTime Keyless Signature technology in our large scale content signing for digital rights management. We have being searching for data signature solutions that should be scalable, cost effective, easy to integrate yet without an expiration date, for the Chinese publishing industry. Fortunately, we found GuardTime,” said Sarah Wang, CEO of RDG China. “With advanced technology provider GuardTime, we will strive to create digital publishing solutions that will help the Chinese publishing industry enhance their digital publishing capabilities quickly.”

With sizable research projects lined up for its central and provincial publishing regulation offices, RDG China is starting to push for a cloud-based system involving regulating offices, publishers, web sites, mobile phone SP and other digital content distribution channels with digital rights management as a core offering. This project can potentially bring a revolution to copyright protections in China and become a standard in the Chinese publishing industry.

GuardTime Keyless Signatures ( http://www.guardtime.com ) will be a key technology in this project.

About Read Digital Science & Technology Co., Ltd.:
RDG China is a large-scale application development firm, providing products, solutions and information technology professional services mainly for Chinese publishing industry. The company is headquartered in Beijing, with branch offices overseas. The company is committed for the publication and distribution, government, large corporations and industry customers to provide in-depth and long-term consulting, customized development and system integration services. For more information visit http://www.chinardg.com/en/pl.jsp

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit has changed since a specific point in time. The verification of the signature can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one in which Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Beijing, China
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Netkiller Takes Fire Safety Onto the Cloud

RFSignalman, a division of Niemann Technology Inc. (NTI), implemented a Google Apps Engine-based system, designed by Netkiller, that allows them to streamline the process of helping their clients meet fire code specifications.

San Jose, CA (USA), Friday – January 27, 2012 — Pure Google Apps Solutions are finding their way into more and more industries, and Netkiller is helping them get there. This January, RFSignalman, a division of Niemann Technology Inc. (NTI), implemented a Google Apps Engine-based system, designed by Netkiller, that allows them to streamline the process of helping their clients meet fire code specifications*.

RFSignalman ( http://rfsignalman.com/fire-code-510-emergency-responder-radio-coverage/ ) is an independent testing company located in Elk Grove, CA that helps property owners comply with fire code regulations by meeting indoor radio coverage requirements. They work with both property owners and Public Safety, providing accurate data that is utilized to improve Public Safety communications.

In order to accommodate the large volume of data and communication between property owners, field engineers, and Public Safety, Netkiller needed to build an application that could provide discrete functions for different groups of users, as well as store data, generate reports, and streamline communication. All of this, with the addition of security, remote access, and reliability meant that the Google Apps Engine was the clear choice.

The result is an application which accommodates separate functions for the customer, the field engineer, Public Safety, and administration through discrete and secure access interfaces. Customers use the application to request radio coverage measurement services for their properties. Then, the field engineer gathers measurement data from the physical location into CVS files. These files are uploaded to the application, which then generates PDF reports to certify that the building complies with fire codes. Public Safety then uses the application to review and export information about buildings with signal data under their jurisdiction.

The powerful application developed by Netkiller ( http://www.netkiller.com ) supports four separate levels of access, streamlining the process and keeping it secure by separating the information presented to customers, field engineers, and Public Safety into separate user interfaces. Each user interface connects to a Google doc-based database that stores customer information and field test data. The information is then used to produce online map displays of tested buildings, certification test reports, summary and adhoc reports for Public Safety, as well as online billing, scheduling, and more. Netkiller built the entire application on the web using the Google Apps Engine, and the entire process occurs online.

Paul Niemann, President of RFSignalman.com said, “By integrating automated measurement equipment, a powerful custom application developed for us by Netkiller and Google technologies to collaborate and share information, RFSignalman is able to provide an economical field service and an accurate documentation platform. Having on-line access to radio coverage data directly improves the safety for our emergency responders and our community.”

*Since the events of September 11, 2001 and the subsequent investigation into building safety by both FEMA and the National Institute of Standards and Technology (NIST), fire codes have been modified by the National Fire Protection Agency (NFPA) to include a mandatory annual certification of sufficient radio coverage for Public Safety emergency responders within buildings. Meeting these codes is the responsibility of the property owner.

About Netkiller:
Netkiller is an Information Technology integration firm based in San Jose, Seoul, and Tokyo. The name originated from the ‘Network Trouble Killers’ community (over 25,000 members), which has been active since 1997 and was incorporated in 2004. Netkiller has almost a 10 year history of innovation in IT and Cloud Computing.

Press & Media Contact:
Harry Jung
Netkiller
2033 Gateway Place, Suite 500
San Jose, CA 95110 – USA
+1-408-573-6891
admin@netkiller.com
http://www.netkiller.com

GuardTime and NRI Secure Collaborate on Cloud Security

GuardTime today signed an agreement with Tokyo-based NRI SecureTechnologies, Ltd., a one stop-solution provider for information security, to do business collaboration in the area of cloud computing security.

Tokyo, Japan, Tuesday – January 03, 2012 — GuardTime ( http://www.guardtime.com ), creator of the Keyless Signature technology used to provide indisputable proof of time, origin, and integrity for electronic data, today signed an agreement with Tokyo-based NRI SecureTechnologies, Ltd., a one stop-solution provider for information security, to do business collaboration in the area of cloud computing security.

GuardTime developed and provides the solution code-named “DataConductor,” which can detect changes and/or transfers of any data stored in the datacenter. By signing the data using GuardTime’s Keyless Signatures, DataConductor can automatically detect when and where the data was created or transferred, and if the datahas been tampered with or not. An alert is sent to the customer when an abnormal status is detected. DataConductor can assure the integrity of data and confirm the location where data exists, providing a full audit trail of data storage in the Cloud. DataConductor enables regulatory compliance for archiving with commodity cloud storage.

As a leading provider of information security, NRI Secure has accumulated extensive and profound consulting knowledge with product offerings that, together with one-stop services, provide comprehensive security solutions to customers in sectors such as the government, financial services, retail, and enterprises. In particular, as cloud computing demand grows, NRI Secure is increasingly undertaking a number of projects for the secure building and management of cloud services.

GuardTime and NRI Secure will leverage the solutions and know-how on both sides to collaborate in the following areas:

* Solution service integration:
Planning and development on the integration of GuardTime DataConductor into NRI Secure’s security management solutions and services.

* Joint marketing and sales activities:
Both companies will jointly hold seminars and conferences to introduce the solutions.Both companies will jointly identify business opportunities and propose solutions to existing and new customers.

About NRI SecureTechnologies, Ltd:
NRI SecureTechnologies, a leading provider of information security solutions, is one of the group companies of Nomura Research Institute, Ltd. Established in 2000, it examines information security at business corporations from the aspects of technology and business management and offers a one-stop service from consulting to solution implementation, training, management and surveillance. For more information visit http://www.nri-secure.co.jp/en/index.html

About GuardTime:
GuardTime was founded with the goal of solving one of the biggest problems in computing: how to be sure electronic data is authentic. GuardTime’s Keyless Signatures provide proof of origin and that not a single bit of the data has changed since a specific point in time. The verification of the signatures can be done offline without reliance on keys, secrets, or the existence of a trusted third party. GuardTime’s mission is to change the world to one where Keyless Signatures are ubiquitous and a natural part of the everyday data lifecycle, whether on disk, in transit, or in the Cloud. The company was recently selected as co-winner of the Innotribe $100K Start-Up Challenge, honoring the company as one of the world’s most promising financial technology start-ups. Visit http://www.guardtime.com for more information about using Keyless Signatures for signing your data.

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net Inc
Tokyo, Japan
+1 978-594-4134
vcruz@mediapr.net
http://www.guardtime.com

Build Your Enterprise IT 100% on the Web: It’s Pure Cloud

It’s time to think Pure Cloud Solutions with your whole IT built 100% on the web.

San Jose, CA (USA), Friday – December 09, 2011 — Your Business Applications can either be built exclusively on the web using cloud platforms such as Google Apps, or they can be integrated into legacy systems, bridging the gap between old and new information systems. Netkiller, a leading global cloud IT integration firm, specializes in building applications on the Google Apps platform as well as Salesforce.com. Pure Cloud Solutions augments your systems by building on your existing IT structures.

Here are a few cases of Pure Cloud Solutions:

Workflow Management:
http://youtu.be/KzsLpnTTbhM (English Caption)
This shows pure Google Apps workflow management systems developed for companies such as MS-Autotech and PHC Valeo. These systems run 100% on the web utilizing a Google Apps document based workflow, which guarantees security and function through Google’s Service Level Agreement (SLA), which sports a 99.9% uptime guarantee (the best in the industry), and extends to any application or system developed purely on the Google cloud. Its content and function are both secure whenever, and where ever there is access to the web. TaeKyu Lee, CEO of MS-Autotech Co., said “Google Apps give innovative communication with great security; pure Google Apps solutions keep our security strong under Google’s SLA.”

NICER Emergency Response System:
Forest Hills Volunteer Ambulance Corps (FHVAC) utilizes a Pure Google Apps solution called NICER (Netkiller Internet Cloud Emergency Responder) designed and developed for storing and dispatching ambulance response in a timely and efficient manner. NICER is built entirely on the Google Apps Cloud platform, providing for secure connections (again, 99.9% up time guaranteed). Because NICER is built purely on this platform, it runs within Google Apps for Education accounts without the need for third party applications. Alan Wolfe, the President of Forest Hills Volunteer Ambulance Corps, remarked, “Netkiller was able to design exactly what we needed to track our ambulance response. NICER is an easy, convenient and efficient tool that we can afford.” Because NICER is a cloud solution it can be accessed by multiple users from any Internet-enabled computer.

Custom Databases, Help Desks, and Inventory systems:
Specialized applications have been developed for organizations like NTI, which required secure SSO access to web applications for specified separate groups, a custom database that interfaces the mobile UI for data import to a mapping program for website displays, a flexible report generator for personnel, customers, and public safety, a custom online help desk, and applications integrating mail, messaging, and online access to files and collaborative materials as well as integration between customer and management applications. These web applications built by Netkiller, such as help desks and inventory systems, benefit from the security and reliability of cloud platforms like Google Apps. Localist, an organization dedicated to connecting students with events in an academic setting, is another organization that utilizes a help desk constructed on the web by Netkiller. The benefits of these systems moving onto the cloud is that they maintain top-of-the-line security, while also staying at the cutting edge of technology in terms of functionality and development.

These are only a few examples of pure cloud solutions that Netkiller has developed. The possibilities for application functionality are limitless. Beyond developing applications purely on cloud platforms, Netkiller can also work with existing ERP structures to integrate the newest technology into legacy systems. Organizations in any industry can benefit from the expertise of Netkiller’s specialists, whether an entirely new system is required, or a specific application must be integrated into existing systems.

Sungwook Jung, CEO of Netkiller said “Enterprise businesses need great security and stability as much as Google does. We help Enterprise customers to gain that security by going 100% Cloud with Netkiller’s Pure Google Apps based solutions. It’s the best way to protect a customer’s data against security risks.”

Netkiller is a Google Enterprise Solution Provider, Salesforce.com Partner, and Google Apps Authorized Reseller. Netkiller currently services over 20,000 company accounts worldwide and has provided enterprise cloud solutions for such diverse industries as health care, automotive technology, and education, as well as many others.

Press & Media Contact:
Harry Jung
Netkiller
2033 Gateway Place, Suite 500
San Jose, CA 95110 – USA
+1-408-573-6891
admin@netkiller.com
http://www.netkiller.com

Axceleon Unveils Microsoft Azure Render Farms

Axceleon is actively demonstrating the Microsoft Azure integrated workflow rendering process and render farm to customers and prospects.

Axceleon has released CloudFuzion for Azure and is showing existing Media & Entertainment customers and prospects how easy it is to integrate existing studio workflows into a cloud based render farm on Microsoft Azure with no impact on the artist.

CloudFuzion is integrated with applications such as Autodesk Maya, 3dsMax, Softimage, Adobe After Effects and allows launching of image renders from the application directly to an Azure render farm anywhere in the world. CloudFuzion will move the scene, including any attributes or references, from the studio data repository to the Azure render farm and in turn will move the resulting rendered images back to the studio data repository as part of an automated workflow. The animator or artist is oblivious as to where the images are being processed or rendered.

Also released was a CloudFuzion implementation of a high performance cluster running on Microsoft Azure for use by power utility & energy companies worldwide.CloudFuzion is integrated with applications such as PSLF and SSTOOLS from General Electric Energy, and PSS®E from Siemens and these applications can be run on a CloudFuzion managed Azure cluster.

CloudFuzion is a workflow automation solution, no render wrangler required for media& entertainment industry, with color coded job status, a simple self-service user interface and also supports split frame/tiling and stitching of large 3dsMax and Maya images for further render acceleration along with processor affinity settings to maximize 3D application core usage by machine.

CloudFuzion also enables single threaded applications to use many cores in a multi-core machine or computer. This enhances the speed of processing and further improves the time to results, a major productivity tool for engineering studies and financial analysis.

For nearly 12 years, EnFuzion has been widely deployed in the energy, financial, bioinformatics, telecommunications, scientific research and engineering market segments, as well as for 3D rendering, where it helped users to get more results faster.

ABOUT ENFUZION & CLOUDFUZION
EnFuzion® and CloudFuzion®, high performance cluster computing software, is developed here in the United States by Axceleon. The CloudFuzion® platform is available as a service (PaaS) and used on larger public clouds, such as Microsoft Azure and Amazon EC2, compute grids and high performance internal cloud computing environments and runs natively on all major OS platforms Windows®, Linux®, Mac OS® and Unix®.

EnFuzion® cluster computing software is currently deployed in power/energy utilities, 3D applications, financial services, bioinformatics, scientific research, telecommunications and engineering, where it helps users to get more results faster.

EnFuzion® was one of the first size able deployments of grid computing technology on Wall Street in 2000.

To learn about CloudFuzion®, please visit CloudFuzion Website www.CloudFuzion.com and EnFuzion3D Website at www.EnFuzion3D.com.

Contact Details: Axceleon Inc
101 Main St. Suite 275
Huntington Beach, Ca 92648.
(714)960-5200

###

 

Businesses Save on Google Apps™ with Netkiller

Netkiller, a leading global cloud IT integration firm and Google partner, announces a 10% discount on Google Apps for new Netkiller clients.

San Jose, CA (USA), Thursday – October 27th, 2011 — Netkiller, a leading global cloud IT integration firm and Google partner, announces a 10% discount on Google Apps for new Netkiller clients. Normally, Google Apps for Business costs $50/user/year. Now, through Netkiller, customers save $5 per user for the first year. That’s a 10% discount for each licence of Google Apps purchased.

New to Google Apps?
Google Apps for Business provides streamlined business solutions with unprecedented ease, security, and convenience. These services provide access to products powered by Google, but administered by your organization on a unique domain. Because Google Apps function on the Google cloud they benefit from the power of Google’s 99.9% uptime guarantee, and the information is available anywhere that the Internet is accessible, including on your smartphone as you travel. This mobile access, coupled with the collaborative tools of Google Apps, allows for efficient, instant communication on shared projects, and allows users to collaborate no matter where they are.

What does Netkiller have to offer?
In addition to this 10% discount, Netkiller provides additional services, such as free setup, expert service within 24 hours, and more! Netkiller’s staff are experienced and Google-trained. This technical support is free for Netkiller clients for as long as they stay with Netkiller.

If your organization already uses Google Apps for Business, switching to Netkiller ( http://www.netkiller.com ) is simple. Netkiller is a Google partner and authorized distributor of Google Apps for Business, so you can seamlessly renew your licence through Netkiller, and be refunded for any remaining period of service in your former subscription. As a new Netkiller client you will receive this 10% discount in the first year, along with all the additional services that Netkiller provides. So whether your business is already integrated with Google Apps for Business or not, switching to Netkiller is easy.

How to get started?
Getting started is simple, just fill out an order form ( http://www.netkiller.com/krhome_old/googleapps ), or email Netkiller directly at info@netkiller.com. A Netkiller specialist will contact you to help guide your transition.

Buy Google Apps through Netkiller Now!

About Us:
Netkiller is an Information Technology integration firm based in San Jose, Seoul, and Tokyo. The name originated from the ‘Network Trouble Killers’ community (over 25,000 members), which has been active since 1997 and was incorporated in 2004. Netkiller has almost a 10 year history of innovation in IT and Cloud Computing.

Netkiller has core competencies in several key industry sectors: Google Enterprise Solutions (Google Apps, Google Earth&Maps, Google Postini, Google Search Appliance Sales Cloud Solution), Salesforce.com CRM Service Cloud Solution, IT Asset Management and IT Service Management Service. Netkiller is a Google Enterprise Business Partner, Salesforce.com Partner (Consulting / ISV / Force.com) and Google Apps Authorized Reseller. Netkiller currently services over 20,000 company accounts worldwide including banks, research institutions, government agencies, universities and multinational corporations.

Press & Media Contact:
Harry Jung
Netkiller
2033 Gateway Place, Suite 500
San Jose, CA 95110 – USA
+1-408-573-6891
admin@netkiller.com
http://www.netkiller.com

First Pure Google Apps Cloud Solution for Ambulance Unit Released

Netkiller worked with the Forest Hills Volunteer Ambulance Corps (FHVAC) to design and develop a cloud solution for storing and dispatching ambulance response in a timely and efficient manner.

San Jose, CA, Friday – September 30, 2011 — What has Netkiller been up to these past few weeks? Developing the first ever pure Google Apps cloud solution for an Ambulance Unit. Netkiller worked with the Forest Hills Volunteer Ambulance Corps (FHVAC) to design and develop a cloud solution for storing and dispatching ambulance response in a timely and efficient manner. NICER was presented last week at Pulse Check, an annual volunteer ambulance conference.

NICER is built entirely on the Google Cloud platform, providing for secure connections and 99.9% up time guaranteed. Because NICER is built purely on this platform, it runs within your Google Apps for Education accounts without 3rd party applications. Google Apps for Education is a free suite of hosted email and collaboration applications for non-profit organizations.

So what exactly is NICER and how does it work? NICER is a case management system designed specifically for ambulance units. NICER uses 4 categories of information to effectively and efficiently store data: Hotline Call, Dispatch Information, Notification, and Crew. Throughout the emergency response all of these activities are logged and instantly entered into and accessible from the program database.

For example, If an emergency call is received, the dispatcher enters the data into the NICER Hotline Call section. Next, the dispatcher notifies an available ambulance/crew and enters the assignment into the Dispatch Information and Crew sections. Finally, as the ambulance notifies the dispatcher of response status, the dispatcher enters these updates into the Notification section.

Alan Wolfe, the President of Forest Hills Volunteer Ambulance Corps, remarked, “Netkiller was able to design exactly what we needed to track our ambulance response. NICER is an easy, convenient and efficient tool that we can afford.”

Key Features of NICER:
– Simple, fast, and effective cloud solution
– Store information regarding emergency calls, dispatch, and updates
– Accessible from any computer with Internet by multiple users
– Search database at any time
– Customizable and expandable based on the needs

How to Get Started:
Our staff will help you to set up Google Apps for Education and NICER for your organization. Contact us nicer@netkiller.com for more information.

About Netkiller:
NETKILLER ( http://www.netkiller.com ) is an Information Technology integration firm based in San Jose, Seoul and Tokyo. The name is originated from the ‘NETKILLER (Network Trouble Killers)’ community since 1997 (25,000+ members), incorporated in 2004. NETKILLER has about 10 years history of innovation in IT and Cloud Computing.

Core competencies in several key industry sectors: Google Enterprise Solutions; Google Apps, Google Earth&Maps, Google Postini, Google Search Appliance Sales Cloud Solution; Salesforce.com CRM Service Cloud Solution; IT Asset Management and IT Service Management Service NETKILLER is a Google Enterprise Business Partner, Salesforce.com Partner (Consulting / ISV / Force.com) and Google Apps Authorized Reseller. NETKILLER currently has over 20,000 company accounts including banks, research institutions, government agencies, universities and multinational corporations worldwide.

For more details visit: http://www.netkiller.com

Press & Media Contact:
Harry Jung
Netkiller
2033 Gateway Place, Suite 500
San Jose, CA 95110 – USA
+1-408-573-6891
admin@netkiller.com
http://www.netkiller.com

eGestalt Named a 2011 CRN Emerging Technology Vendor

Channel stands to reap big rewards by using SecureGRC to attract federal meaningful use dollars.

Santa Clara, CA, Wednesday – September 28, 2011 — eGestalt Technologies ( http://www.eGestalt.com ), a leading provider of cloud-based, SaaS-delivered, security and information technology governance, risk management and compliance solutions for SMBs to enterprises,today announced it has been selected by Everything Channel as a 2011 CRN Emerging Technology Vendor. The annual list features the most innovative vendors who not only deliver technology that is easy to use, but can generate the high margins solution providers require.

Channel partners need no more incentive than the $40,000 in ‘meaningful use’ government funds being granted to individual doctor’s offices that install electronic medical records (EMR) that are fully in compliance with HIPAA/HITECH privacy and security rules.

“Large hospitals are eligible for up to $2 million in federal grants,” said eGestalt President Anupam Sahai. “Not only must every physician practice abide by HIPAA rules, but all their business associatestoo must fall in compliance. There are a few million BAs who need to be serviced. So from one hub comes many spokes of potential business for partners jumping on board with SecureGRC.”

Built from the ground up for channel partners, SecureGRC is a cloud-based, SaaS-delivered, $750 per year security and risk assessment, auditing and remediation application. The tool offers peace of mind to channel partners servicing SMBs to large enterprises, including medical providers and their business associates, retailers and merchants that must meet PCI and HIPAA/HITECH requirements.

With version 11 recently released, SecureGRC consolidates all security and compliance-related evidence into a single and centralized repository.It comes stacked with pre-packaged content such as policies that are continuously updated, a trove of best practices, and plenty of assessment questions that make it an easy step-by-step process to run the assessment and prove compliance.

Thanks to the fine print in HIPAA/HITECH legislation, MSPs have a tremendous gold mine of an opportunity to reap big rewards, revenues, and bundling opportunities. The cost of doing a security assessment and PCI compliance can run $100,000 and above.

“Using SecureGRC’saward-winning,patent pending technology, delivered through channel partners, our customers are able to become compliant at 1/10 the cost with very little maintenance.This promises to be a huge boon for the channel,” addedSahai. “And you don’t need to be conversant with the fine print of these PCI and HIPAA/HITECH regulations.”

SecureGRC also offers an automated PCI-DSS compliance management solution that helps meet PCI-DSS requirements in terms ofbuilding and maintaining a secure network; protecting card holder data; maintaining a vulnerability management program; implementing strong access control measures; regularly monitoring and testing networks, and maintaining robust IT security policies. For more information visit: http://www.egestalt.com/automated-pci-compliance-management.html

Channel partners authorized by eGestalt can become Managed Compliance Providers (MCPs), a channel program based around a proprietary “cookbook” that explains in step-by-step fashion on how to get started with delivering managed compliance services through creation of collateral, training, implementation, delivery and on-going playbooks as the business is up and running.

The Federal government has set aside $20 billion for upgrading the healthcare IT infrastructure by the year 2014 – spelling a huge upside for the channel. Service providers can pursue federal ‘meaningful use’ dollars to the tune of $40,000 per qualified physician practice. SecureGRC generates the necessary reports for proving compliance.

“By law, all business associates and sub-contractors affiliated with the given medical practice must follow HIPAA/HITECH compliance rules or face stiff penalties. It could not be more convincing a sale. Like spokes from a wheel, from one customer hub derives multiple new clients to service,” said Jim Hare, eGestaltVice President of Sales.

eGestalt is looking for qualified channel partners who want to help their clients solve and automate the complexities and high costs associated with maintaining and enforcing security and compliance around PCI, SOX, HIPAA/HITECH, ISO, GLBA and other mandatory government and industry regulations that affect most business operations.

For further details please call (408) 689-2586 or email sales@egestalt.com. For further details about the product, please visit http://www.egestalt.com/msp-mssp-partners.html.

The vendors that make up the CRN Emerging Technology Vendor list were founded in 2005 or later, have revenue under $1 billion and have an active U.S. channel strategy. Final selection to the Emerging Technology Vendor list was made by the CRN editorial team after a review of submitted information. To view a sample of the list and read the editorial accompaniment visit http://www.ubmchannel.com.

About UBM Channel (http://www.ubmchannel.com):
UBM Channel is the premier provider of IT channel-focused events, media, research, consulting, and sales and marketing services. With over 30 years of experience and engagement, UBM Channel has the unmatched channel expertise to execute integrated solutions for technology executives managing partner recruitment, enablement and go-to-market strategy in order to accelerate technology sales. UBM Channel is a UBM company. To learn more about UBM Channel, visit us at www.ubmchannel.com.

UBM plc (http://www.ubm.com):
UBM plc is a leading global business media company. We inform markets and bring the world’s buyers and sellers together at events, online, in print and provide them with the information they need to do business successfully. We focus on serving professional commercial communities, from doctors to game developers, from journalists to jewelry traders, from farmers to pharmacists around the world. Our 6,000 staff in more than 30 countries is organized into specialist teams that serve these communities, helping them to do business and their markets to work effectively and efficiently. For more information, go to http://www.ubm.com

About eGestalt Technologies Inc:
eGestalt (www.egestalt.com) is a world-class, innovation driven, leading provider of cloud-computing based enterprise solutions for information security and IT-GRC management. eGestalt is headquartered in Santa Clara, CA, and has offices in the US, Asia-Pacific and Middle East. eGestalt was nominated Breakthrough Technology Vendor at XChange Americas, Aug. 2010, and selected by SiliconIndia among the “Top 10 Security Companies to Watch.” Its SecureGRC application was voted runner-up in the Managed Services Category at XChange Tech Innovators, Nov. 2010. And in Feb. 2011 eGestalt VP of Worldwide Sales Jim Hare was been named a Channel Chief by Everything Channel’s CRN.

Press Contact:
Victor Cruz
Principal, MediaPR.net
For eGestalt Technologies
vcruz@mediapr.net

Scott Regan
Everything Channel
scott.regan@ec.ubm.com
508.416.1186

Press & Media Contact:
Victor Cruz, Principal
MediaPR.net, Inc
For eGestalt Technologies
Santa Clara, CA
(978) 594-4134
vcruz@mediapr.net
http://www.egestalt.com