Welcome!

News Feed Item

Quarri Joins F5’s Technology Alliance Program to Deliver Efficient End-to-End Security of Web Browser Sessions

Quarri™ Technologies, a security software company that empowers organizations to keep their most sensitive data secure, today announced that it has joined F5 Networks’ Technology Alliance Program (TAP). By partnering with F5, the global leader in Application Delivery Networking, Quarri enables clients to maximize the value of deploying the companies’ products together. The companies’ combined solution of Quarri Protect On Q (POQ) with F5’s BIG-IP Local Traffic Manager (LTM) will enable efficient, end-to-end security of web sessions for their mutual customers.

“Quarri is committed to providing organizations across industries with the strongest and most efficient protection for their critical data,” said Bill Morrow, executive chairman and CEO of Quarri Technologies. “Formalizing our alliance with F5 provides us the opportunity to jointly deliver a comprehensive web application security suite that includes BIG-IP LTM, BIG-IP Application Security Manager, BIG-IP Access Policy Manager and zero-hour malware and browser data leakage controls for mutual customers. By aligning our technology with F5 solutions, we are delivering an enhanced user experience, enabling them to optimize their POQ deployments for simplified enforcement and reduced overhead.”

Through the TAP partnership, F5 will promote assured interoperability and continued innovation with Quarri, and provide a framework for ongoing collaboration. Quarri is now enabling its enterprise customers to leverage their existing BIG-IP LTM appliances for enforcement of their POQ deployments. Organizations that deploy BIG-IP LTM as a front-end device for multiple independent web applications can require the use of a protected browser without modifications to any of their protected web applications.

“F5 welcomes Quarri to our Technology Alliance Program,” said Calvin Rowland, VP of Technology and ISV Alliances at F5 Networks. “Through partnerships with technology leaders in adjacent markets, F5 customers extend the value of their application delivery environments. Quarri Protect On Q and F5 customers are assured of interoperability and optimized performance when using these solutions in tandem.”

F5’s BIG-IP solution also allows for efficient caching of POQ session information, minimizing the amount of traffic between the BIG-IP device and the POQ Server. As a result, customers can substantially reduce the load on their POQ Server, and minimize their overhead on end-user traffic for POQ enforcement.

With Quarri’s POQ on demand web information security solution, organizations can address a variety of challenging security issues, including external and internal attacks, and unauthorized use and replication of confidential data. Leveraging Quarri’s patented technology, the POQ hardened browser provides zero-hour malware protection against key logging, frame grabbing, cache mining and inbound attacks. POQ also enables enterprises to enforce security policies that prevent end users from copying, saving, printing or screen-capturing browser-delivered data, preventing costly data breaches.

“Organizations using web and cloud-based applications are looking for solutions that enable them to enforce consistent enterprise security policies whenever and wherever these services are accessed and from managed and unmanaged devices,” said Neil MacDonald, vice president and Gartner Fellow. “Cloud access security broker platforms are emerging to provide a comprehensive set of security policy enforcement by interjecting security policy between users of cloud-based resources and the cloud-based services they are consuming.”

About Quarri Technologies

Quarri Technologies, Inc. is a security software company that empowers organizations to keep their sensitive data secure. The company’s products defend against both external and internal attacks and prevent unauthorized use and replication of confidential data by controlling both malicious and careless end user behavior. Quarri’s products allow users to remain productive and have a seamless online experience, while also enabling organizational compliance with industry standards and government mandates. Quarri is a privately held, investor-backed corporation based in Austin, Texas, with clients throughout North America and Europe. For further information, visit www.quarri.com.

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

Latest Stories
As organizations shift towards IT-as-a-service models, the need for managing and protecting data residing across physical, virtual, and now cloud environments grows with it. Commvault can ensure protection, access and E-Discovery of your data – whether in a private cloud, a Service Provider delivered public cloud, or a hybrid cloud environment – across the heterogeneous enterprise. In his general session at 18th Cloud Expo, Randy De Meno, Chief Technologist - Windows Products and Microsoft Part...
Andi Mann, Chief Technology Advocate at Splunk, is an accomplished digital business executive with extensive global expertise as a strategist, technologist, innovator, marketer, and communicator. For over 30 years across five continents, he has built success with Fortune 500 corporations, vendors, governments, and as a leading research analyst and consultant.
"Cloud computing is certainly changing how people consume storage, how they use it, and what they use it for. It's also making people rethink how they architect their environment," stated Brad Winett, Senior Technologist for DDN Storage, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
In his session at 20th Cloud Expo, Brad Winett, Senior Technologist for DDN Storage, will present several current, end-user environments that are using object storage at scale for cloud deployments including private cloud and cloud providers. Details on the top considerations of features and functions for selecting object storage will be included. Brad will also touch on recent developments in tiering technologies that deliver single solution and an end-user view of data across files and objects...
No hype cycles or predictions of zillions of things here. IoT is big. You get it. You know your business and have great ideas for a business transformation strategy. What comes next? Time to make it happen. In his session at @ThingsExpo, Jay Mason, Associate Partner at M&S Consulting, presented a step-by-step plan to develop your technology implementation strategy. He discussed the evaluation of communication standards and IoT messaging protocols, data analytics considerations, edge-to-cloud tec...
In his keynote at 18th Cloud Expo, Andrew Keys, Co-Founder of ConsenSys Enterprise, provided an overview of the evolution of the Internet and the Database and the future of their combination – the Blockchain. Andrew Keys is Co-Founder of ConsenSys Enterprise. He comes to ConsenSys Enterprise with capital markets, technology and entrepreneurial experience. Previously, he worked for UBS investment bank in equities analysis. Later, he was responsible for the creation and distribution of life settl...
In his session at @ThingsExpo, Dr. Robert Cohen, an economist and senior fellow at the Economic Strategy Institute, presented the findings of a series of six detailed case studies of how large corporations are implementing IoT. The session explored how IoT has improved their economic performance, had major impacts on business models and resulted in impressive ROIs. The companies covered span manufacturing and services firms. He also explored servicification, how manufacturing firms shift from se...
For far too long technology teams have lived in siloes. Not only physical siloes, but cultural siloes pushed by competing objectives. This includes informational siloes where business users require one set of data and tech teams require different data. DevOps intends to bridge these gaps to make tech driven operations more aligned and efficient.
IoT is at the core or many Digital Transformation initiatives with the goal of re-inventing a company's business model. We all agree that collecting relevant IoT data will result in massive amounts of data needing to be stored. However, with the rapid development of IoT devices and ongoing business model transformation, we are not able to predict the volume and growth of IoT data. And with the lack of IoT history, traditional methods of IT and infrastructure planning based on the past do not app...
For organizations that have amassed large sums of software complexity, taking a microservices approach is the first step toward DevOps and continuous improvement / development. Integrating system-level analysis with microservices makes it easier to change and add functionality to applications at any time without the increase of risk. Before you start big transformation projects or a cloud migration, make sure these changes won’t take down your entire organization.
It is ironic, but perhaps not unexpected, that many organizations who want the benefits of using an Agile approach to deliver software use a waterfall approach to adopting Agile practices: they form plans, they set milestones, and they measure progress by how many teams they have engaged. Old habits die hard, but like most waterfall software projects, most waterfall-style Agile adoption efforts fail to produce the results desired. The problem is that to get the results they want, they have to ch...
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Without a clear strategy for cost control and an architecture designed with cloud services in mind, costs and operational performance can quickly get out of control. To avoid multiple architectural redesigns requires extensive thought and planning. Boundary (now part of BMC) launched a new public-facing multi-tenant high resolution monitoring service on Amazon AWS two years ago, facing challenges and learning best practices in the early days of the new service.
Digital Transformation is much more than a buzzword. The radical shift to digital mechanisms for almost every process is evident across all industries and verticals. This is often especially true in financial services, where the legacy environment is many times unable to keep up with the rapidly shifting demands of the consumer. The constant pressure to provide complete, omnichannel delivery of customer-facing solutions to meet both regulatory and customer demands is putting enormous pressure on...
The best way to leverage your CloudEXPO | DXWorldEXPO presence as a sponsor and exhibitor is to plan your news announcements around our events. The press covering CloudEXPO | DXWorldEXPO will have access to these releases and will amplify your news announcements. More than two dozen Cloud companies either set deals at our shows or have announced their mergers and acquisitions at CloudEXPO. Product announcements during our show provide your company with the most reach through our targeted audienc...