How to Get a Prospect to Test Your Security Product

Spark Media Solutions, LLC | February 21, 2018

I’ve never met a harder sale than cybersecurity to the IT team,” admitted a security vendor. The challenges are unique at each firm and they are reluctant to even take a call let alone share real concerns. ”In the security products market, cybersecurity vendors simply want to be considered, and that often requires compelling a prospect to test the darn product. But getting a response from a prospect, let alone a product test, is often a Herculean task. One vendor I spoke to said he would often have to initiate ten contacts with a prospect before he’d even get an acknowledgement. Companies whose primary objective is to test products can’t even keep up with the volume. As of last December, 451 Research was aware of more than 1,600 security vendors. “Those were only the ones we had time to write down,” said Wendy Nather (@WendyNather), formerly of 451 Research and now director, advisory CISOs at Duo Security. “That wasn’t even the total number of products!”

Spotlight

Companies are moving workloads to the cloud in a major way, according to a survey Druva conducted in July and August 2018. 41% of the 170 respondents said they are currently running virtual machines (VMs) in the cloud, which is a 32% increase from last year’s response of 31%. Perhaps even more impressive is that 90% of respondents said they plan to run VMs in the cloud over the coming year.


Other News
VSPHERE

Tintri Continues Exponential Growth with 2H 2021 Earnings

Tintri | February 21, 2022

Tintri, a DDN subsidiary and the leading provider of auto adaptive, workload intelligent platforms, announced 42% global revenue growth from 1H2021 to 2H2021, including a double-digit revenue increase from net new logos. This expansion is fuelled by Tintri's enhanced global executive sales team and continued VMstore innovation, driving the company's mission to deliver hands-off, cutting-edge and highly adaptive technology to help enterprises manage complex infrastructures. Tintri has had exponential growth in the second half of 2021, driven by the upswell in demand from our customers due to the popularity of containerized applications in virtualized environments. The containerization movement is making serious headway into enterprise data processes and platforms, and Tintri is perfectly positioned to service these emerging markets. We've put together an outstanding global sales team to ensure that customers know our technology was architected for these types of workloads from day one." Phil Trickovic, senior vice president of Revenue, Tintri Enhanced Global Executive Sales Team Following the appointment of a new executive team in Q4 2021, Tintri's latest investment to operate under strong management comes with the newly structured global executive sales team. Comprised of Tintri veterans with invaluable experience, this team best understands the unique challenges of data-centric enterprise customers and the ways in which Tintri's technology can help overcome specialized pain points and evolve to continue to meet enterprise's changing needs. The new global executive sales team is comprised of: Zachary Bertamini, vice president of Sales, Americas, whose strategic vision has been a catalyst to fuel Tintri's growth in the Americas over the past year. Josh Marlar, vice president of Global Business Development, who is responsible for building a multimillion-dollar net new pipeline quarter over quarter and brings over a decade of experience in IT business developments. Mark Walsh, vice president of Sales, EMEA, who brings over 30 years of experience in the IT storage sector and re-joins Tintri from IBM. Norimasa Ono, general manager of Sales, Japan, who led start up efforts in the Japanese market and brings strong relationships with local resellers and enterprise customers, as well as the ability to open new markets for Tintri. Continued VMstore Innovation Tintri continues to innovate, constantly enhancing, updating and advancing capabilities for its customers. This dedication is underscored by VMstore's double-digit revenue growth YoY. The latest releases to VMstore, the world's most intelligent virtual data management system, include: vSphere Tag Support – VMstore now recognizes and reports vCenter tags and can be used for filtering objects in the Tintri Global Center (TGC) user interface (UI). vSphere tags can also be used in service groups to ensure protection policies, snapshots, replication. vSphere tags also carry across the Tintri ecosystem and are available for use with Tintri Analytics. Additional Hardware and Software Validation – 2TB, 4TB or 8TB drives are configurable with all VMstore T7000 systems, allowing customers to tailor the configuration to meet specific business needs. The T7000 systems are also now certified for DAC connections, joining MPO-12 configurations. In addition, VMstore is CitrixReady certified with Hypervisor 8.2. Improved Visibility with UI Enhancements – System admins now can configure and filter alerts with notifications and additional parameters, including Engine ID, which can be configured with Single Network Management Protocol (SNMP). A new "Task Manager" in the UI allows customers to track long running activities and monitor status, as well as reporting on advanced battery backup health to provide fortified data protection in the event of a T7000 series system power loss. NFS 4.1 Beta – VMstore T7000 models now support NFS v4.1 for VMware vSphere, which will be made generally available later this year. About Tintri Tintri, a wholly owned subsidiary of DataDirect Networks (DDN) delivers unique outcomes in Enterprise data centers. Tintri's AI-enabled intelligent infrastructure learns your environment to drive automation. Analytical insights help you simplify and accelerate your operations and empower data-driven business insights. Thousands of Tintri customers have saved millions of management hours using Tintri.

Read More

VIRTUAL SERVER INFRASTRUCTURE

iolo Launches World’s Most Private & Affordable VPN Service

iolo | March 11, 2022

iolo, the award-winning privacy and security software company today announced the immediate availability of ioloVPN. The Virtual Private Network (VPN) software subscription service features privacy-first hosting infrastructure, costs as little as $1.16 per device per month for five simultaneous devices. Privacy is delivered via bank-grade 256-bit encryption over a 100% dedicated VPN server infrastructure with a zero-tolerance policy for data logging or tracking. Moreover, ioloVPN is the only VPN service to offer extra 24/7 customer phone support delivered by live human beings. “The VPN market is very competitive. We are confident ioloVPN will stand taller than the rest due to our unwavering commitment to privacy and affordability,” said Avani Patel, VP of Product at iolo. “We are a privacy-first company! ioloVPN is built for maximum customer privacy – encrypting your connections and providing you the most speed. Lastly, we do not and will never track, log, aggregate or sell your information, browsing patterns, giving you the most privacy.” User benefits of ioloVPN subscription service include: Encrypts all data traffic with bank-level 256-bit data security Works anywhere in the world, on any WiFi hotspot, on both PCs and mobile devices Privacy is assured: zero customer data is tracked, logged, aggregated or sold Unlimited data; access your favorite streaming content from anywhere Activates automatically Protects 5 simultaneous devices for one low price starting at $5.80/month when billed annually (which works out to just $1.16 per device) Money-back guarantee 24/7 live phone support available at extra cost Running underneath, ioloVPN operates on a world-wide network of VPN server locations on every major continent on the planet (except Antarctica). Each datacenter location is dedicated to VPN processing only (unlike cloud-based providers such as AWS or Azure) and runs OpenVPN, IPSEC, and IKEv2 with MOBIKE (RFC4555) services. iolo also enables Perfect Forward Secrecy (PFS) throughout its VPN network, which is optimal for securing instant messages because it switches encryption keys after every message. About iolo iolo is a brand of RealDefense LLC, which develops award-winning software that optimizes and secures both mobile phones and PCs. iolo’s product line of software and services includes its flagship System Mechanic®, which is an 8-time winner of PC Magazine’s Editors’ Choice awards.

Read More

VIRTUAL DESKTOP TOOLS

GoodAccess Offers Protection Against Online Threats With its Built-in Threat Blocker Feature

GoodAccess | March 09, 2022

GoodAccess, an anytime-anywhere zero-trust remote access company, has added the Threat Blocker feature to its platform. Threat Blocker enables businesses to provide network security on the public internet and protect remote employees from dangerous domains, phishing attempts, malware and network attacks. Threat Blocker is a native feature of the GoodAccess platform and is automatically enabled for all customers with no additional setup required. It uses several threat intelligence feeds to identify and block connections with malicious domains in real-time (so-called DNS filtering). The feeds are constantly updated with the latest information on malicious domains, so businesses can be confident that their employees are protected from the newest threats. Threat Blocker is an important addition to the security features of our platform. When phishing, ransomware, and other online adversary techniques are still at large, GoodAccess Threat Blocker will help businesses to elevate their security posture against them and reduce the attack surface introduced by remote work." Artur Kane, CMO at GoodAccess For monitoring and compliance reasons, employees' access to harmful websites and content is tracked and logged. Also, GoodAccess users can define their custom domain blacklists (denylists) to strengthen their security controls. The new feature helps businesses to: prevent employees from accessing malicious websites and keep their data safe and secure, block malware before infiltrating business network and launching larger attacks (advanced persistent threats, APT), detect and block connections with C&C botnet networks, prevent ransomware attacks to keep data safe and systems up and running, prevent unauthorized access to the business network as a result of successful phishing and identity theft, reduce the risk of sensitive business data exposure. GoodAcces cloud VPN with zero-trust network access controls streamlines the way organizations handle remote networking and mitigates security risks introduced by distributed workforce, constant mobility and decentralized IT. Since 2020, GoodAccess has earned the trust of more than 1000 business customers from 120 countries worldwide.

Read More

VPN

Exidio Launches First-of-Its-Kind Decentralized VPN App for IOS/Android

Exidio | December 16, 2021

Following their initial launch in 2020, Exidio expands their offerings to include mobile app devices including apps for Exidio and Sentinel, creating custom open source applications on a peer-to-peer bandwidth network for optimal protection. This tech provides people with secured and easily accessible information using dVPN to protect users from shared data and encrypt all personal information. While many in Western countries don’t experience the impact of controlling governments, globally people are actively controlled by local and national governments or external groups. Using services, like those that Exidio and Sentinel offer, can give freedom to the users to effectively communicate or manage sensitive information. Exidio changes the landscape of mistrust and obscurity within the VPN industry by creating custom, white label applications that connect to the Sentinel node network, a decentralized peer-to-peer node network. Ensuring privacy and security, Exidio can prove a users' web traffic and metadata is end-to-end encrypted. Exidio cannot access the traffic, nor can a node host view the web traffic or metadata of a user. Exidio builds open source applications allowing anyone to check its codebase. The Sentinel Ecosystem consists of the Sentinel node network, the dVPN user base, communities of open source code contributors, and companies integrating the Sentinel node network. Since its inception in 2018, the Sentinel Ecosystem has seen significant growth. By sharing an app version for this tech, people will be able to access more easily and integrate into the fast communications and processes of a mobile device. Whether participating at a protest or just texting a friend on a sidewalk, this tech will protect people who are at risk of federal detention or worse, physical abuse and harm, at the hands of controlling groups. About Exidio Exidio is the leader in transparent, end-to-end encrypted VPN technology. Exidio builds beautiful applications empowering consumers and businesses to reclaim their digital privacy and security. Leveraging open-source code and decentralized networks, Exidio is bringing a new paradigm of transparency to the VPN space. Customers can download our application to access websites and stream videos from around the world, reclaim their online security and free themselves from third-party surveillance. About Sentinel Sentinel is the first scalable framework allowing for dVPNs to utilize shared resources, reducing the overall network carbon footprint The goal of the Sentinel ecosystem to decentralize the VPN industry and introduce the ‘dVPN’ to the mainstream consumer.

Read More

Spotlight

Companies are moving workloads to the cloud in a major way, according to a survey Druva conducted in July and August 2018. 41% of the 170 respondents said they are currently running virtual machines (VMs) in the cloud, which is a 32% increase from last year’s response of 31%. Perhaps even more impressive is that 90% of respondents said they plan to run VMs in the cloud over the coming year.

Resources