Seguridad Mania.com - España y América Latina
Portal sobre tecnologías para la seguridad física
- Destacamos »
- software Anti Blanqueo
SAN FRANCISCO, CA -- (Marketwired) -- 07/21/14 -- Bluebox Security, the leading mobile data security company, announced today it has been recognized as one of 2014's hottest emerging technology vendors by CRN, the top news source for solution providers and the IT channel. The annual Emerging Vendors list identifies up-and-coming technology vendors that have introduced innovative new products, creating opportunities for channel partners in North America to create high-margin, cutting-edge solutions for their customers.
Bluebox Security provides visibility and protection of corporate data -- at rest or in transit -- across mobile applications on iOS or Android. Built on its patented 'data-wrapping' technology, the Bluebox SaaS mobile data security solution provides comprehensive security across the device, application and network. This next-generation mobile data security solution enables enterprises to securely allow employees to use personal devices and applications for work purposes while maintaining employee privacy.
"Solution providers are always on the hunt for the next big technology trend so that they can bring new solutions to their customers before they even know they need them. These vendors are on the forefront of IT innovation and are offering products and services that channel partners can use to stay ahead of the competition," said Robert Faletra, CEO of The Channel Company, publisher of CRN. "We congratulate 2014's Emerging Vendors for creating the next wave of technology that will drive the IT industry forward and for opening the door to new, unique solutions from the IT channel."
"Today, BYOD is no longer a trend. It's firmly implanted in the enterprise and as a result, organizations need to rethink the way they approach mobile security," Caleb Sima, co-founder and CEO of Bluebox Security, says. "Now, it's not only crucial for organizations to have complete visibility of corporate data, it's also essential that the solution provides a frictionless experience for the end users. We must focus on where, when and how corporate data is moving throughout the workflow, while giving employees the freedom to use any application, maximizing productivity without compromising security. We have achieved this with our data-centric mobile security solution."
Companies included in CRN's 2014 Emerging Vendors list were founded in 2008 or later and are actively working with channel partners in North America. The list, along with information about each vendor, will be published in CRN's August 2014 issue and will also be available online at www.crn.com.
Additional Resources
About Bluebox Security
Founded in 2012 by a team of security experts, Bluebox Security offers the first mobile data security solution to safeguard corporate data across the device, application, and network. The cloud-based solution provides complete visibility and security of corporate data, while providing employees the freedom, ease of use, and privacy that ensures widespread adoption. Bluebox Security has received a total of $27.5 million in funding from Andreessen Horowitz, Tenaya Capital, Sun Microsystems co-founder, Andreas Bechtolsheim, SV Angel, and Google Board member Ram Shriram. The company is headquartered in San Francisco. For more information visit www.bluebox.com or follow us on Twitter @blueboxsec.
About The Channel Company
The Channel Company is the channel community's trusted authority for growth and innovation, with established brands including CRN, XChange Events, IPED, and SharedVue. For more than three decades, we have leveraged our proven and leading-edge platforms to deliver prescriptive sales and marketing solutions for the technology channel. The Channel Company provides Communication, Recruitment, Engagement, Enablement, Demand Generation and Intelligence services to drive technology partnerships. Learn more at www.thechannelcompany.com.
Media Contact:
Michelle Dailey
LEWIS PR
415.432.2458
Email Contact
Publicamos interesante Informe de más de 48 págs y varios videos demostrativos sobre los posibles ataques a los robots de montaje de las fábricas. ... Leer más ►
Publicado el 22-Jun-2017 • 10.48hs
Publicado el 20-Jun-2017 • 20.22hs
Dirigido tanto a los principiantes, como a los expertos en seguridad informática y sistemas de control industrial (ICS), este libro ayudará a los lectores a comprender mejor la protección de normas de control interno de las amenazas electrónicas. ... Leer más ►
Publicado el 3-Ene-2012 • 20.16hs
Publicado el 25-Set-2009 • 01.26hs
Publicado el 17-Dic-2008 • 08.32hs
Publicado el 11-Oct-2016 • 12.48hs
Publicado el 15-Mar-2016 • 11.59hs
Publicado el 2-Feb-2017 • 11.38hs
Publicado el 20-Jun-2014 • 17.17hs
Publicado el 31-May-2011 • 05.13hs
Publicado el 25-Set-2008 • 17.54hs
Publicado el 1-Set-2016 • 16.11hs
Publicado el 31-Ago-2016 • 18.53hs
Publicado el 19-Ene-2017 • 15.47hs
Publicado el 4-Jul-2016 • 18.51hs