Welcome!

Related Topics: Cloud Security, Java IoT, Microservices Expo, @CloudExpo, Government Cloud

Cloud Security: Blog Post

Peerlyst to Disrupt the Traditional Industry Research Model

RSA interview with Limor Elbaz, the founder and CEO of Peerlyst.com

Thanks for taking the time to answer my questions. Please tell us, what is Peerlyst all about and what do you do?

Limor Elbaz: I'm Limor Elbaz the founder and CEO of Peerlyst.com. We've launched a product-centric social network for Enterprise IT professionals and we want to bring the power of social networks to IT decision making.

Because of their experience with consumer applications, Enterprise IT decision-makers are demanding a social buying experience that includes unbiased product reviews by trusted peer users, insights based on firsthand product experience, and new ways to connect to peers in their industry who have already implemented products in their business.

What are you launching at RSA?

Elbaz: We are launching our website Peerlyst.com for Information Security Professionals. Peerlyst is the world's first social site that fosters community around IT products. The website gives enterprise technology decision makers comprehensive product information from a range of sources, including the one they value most: their peers' firsthand experience with IT solutions.

Peerlyst provides a unique, trusted social buying experience for enterprise technology products and services, using the same capabilities that people are familiar with from their personal social networks. Peerlyst combines LinkedIn-like product pages (PeerPagesTM) with user-generated product ratings (PeerRatingsTM) of the key product features that are most important to IT decision makers.

Peerlyst's social features, such as the ability to follow products, will give users an ongoing feed of pertinent information over a product's life span. That includes reviews and comments from other Peerlyst users; technical content from vendors; and product-related articles, discussions, files, and videos from the Web.

Who is your target audience and how do you intend to reach them? What is the biggest challenge you face right now in telling your story and winning over new clients?

Elbaz: Our target audience are IT decision-makers (CISOs, Directors of Information Security, Application and Network Security Managers) who need to an effective way to learn from their peers what works and doesn't with the products they are considering.  What IT pros want is a reality check based on the crowdsourced experience of many other users.

Our biggest challenge is getting new Information Security folks to try out our site. We are building our social media capabilities and as of today we have over 700 Information Security pros who follow us on Twitter.

I'd be curious to hear any general thoughts you have on market trends...

Elbaz: It's hard to keep up with all of the changes, but mobile solutions, BYOD and next generation firewalls are interesting.  The idea of Peerlyst is to help our users share information so that they can help each other to keep abreast of what's new and what works best.

What is the viral aspect of your product?

Elbaz: Peerlyst is completely viral.  Once you join you can invite your peers to join too.  We've also built familiar social networking capabilities into our product pages.  Our users can easily socialize their review of a product or comments that they make.  They can also upload documents and videos to share with the community.

What's the business model? How will you make money?

Elbaz: Peerlyst is free for Information Security professionals to join and use.  We make money by providing InfoSec tech vendors an analytics feed based on product information we have found on the web.  We respect our users' privacy and do not provide vendors with our users information unless a user decides to click the contact vendor button on a product page.

Who are your competitors?

Elbaz: Our biggest competitor is for IT users to continue to rely on services like Gartner that don't use or benchmark the products and really can't capture the firsthand experience users have with a product.  Also Gartner and their peers do not cover smaller vendors who may be best of breed, but do not have significant revenues.

How do you differentiate from your competitors?

Elbaz: We have developed state-of-the-art information extraction algorithms that scour the Web for product information and generate organized product pages called PeerPagesTM.  No one else we know of does this.

How does your technology differentiate from the competition and can you elaborate on the different technology deployed?

Elbaz: We have developed state-of-the-art information extraction algorithms that scour the Web for product information and generate organized product pages called PeerPagesTM.  No one else we know of does this.

What business or technology could yours disrupt?

Elbaz: We disrupt traditional analyst firms that sell syndicated services to IT departments.

Who founded the company, when? What can you tell me about the story of the company's founding?

Elbaz: We're a team of IT and product professionals, developers, and designers. Like most people today, we use social sites to find great restaurants and see how people rate consumer products. But there was a big gap in our work lives. The process of evaluating, selecting, and keeping track of the tech products that drive our businesses was stuck in the 20th century.

Why were we spending hours searching for information on the Internet, poring over dozens of vendor white papers and analyst reviews? Did we really need to build spreadsheet after spreadsheet to compare products? And why wasn't there someplace we could go to see our peers' reviews of technology solutions, or to reach out to them and ask questions?

We created the idea for Peerlyst in 2011 and are launching now.

What is your distribution model? Where to buy your product?

Elbaz: We are truly web-based.  Our web site delivers our product.

What's next on your product roadmap?

Elbaz: Adding more social capabilities for our users, such as the ability to collaborate on a specific Information Security topic.

Are you targeting a first VC round? If yes when and what will you use the funds for?

How much money is being sought?

Elbaz: We are in discussion with top tier VCs now for our A round.

Peerlyst is a social media platform designed to give enterprise technology decision makers the unbiased information they need to buy, and make the best use of, IT solutions. The network enables a new social buying experience based on peer-to-peer interaction regarding technology products, services, and integration. Peerlyst is designed to guarantee that users get honest information about enterprise technology from actual users and experts. The company has offices in Silicon Valley.

Information on Peerlyst can be found at www.peerlyst.com or by following the company on Twitter @Peerlyst.

Thank you for your time!

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
"A lot of times people will come to us and have a very diverse set of requirements or very customized need and we'll help them to implement it in a fashion that you can't just buy off of the shelf," explained Nick Rose, CTO of Enzu, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
As software becomes more and more complex, we, as software developers, have been splitting up our code into smaller and smaller components. This is also true for the environment in which we run our code: going from bare metal, to VMs to the modern-day Cloud Native world of containers, schedulers and micro services. While we have figured out how to run containerized applications in the cloud using schedulers, we've yet to come up with a good solution to bridge the gap between getting your contain...
Web Real-Time Communication APIs have quickly revolutionized what browsers are capable of. In addition to video and audio streams, we can now bi-directionally send arbitrary data over WebRTC's PeerConnection Data Channels. With the advent of Progressive Web Apps and new hardware APIs such as WebBluetooh and WebUSB, we can finally enable users to stitch together the Internet of Things directly from their browsers while communicating privately and securely in a decentralized way.
"We host and fully manage cloud data services, whether we store, the data, move the data, or run analytics on the data," stated Kamal Shannak, Senior Development Manager, Cloud Data Services, IBM, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Who are you? How do you introduce yourself? Do you use a name, or do you greet a friend by the last four digits of his social security number? Assuming you don’t, why are we content to associate our identity with 10 random digits assigned by our phone company? Identity is an issue that affects everyone, but as individuals we don’t spend a lot of time thinking about it. In his session at @ThingsExpo, Ben Klang, Founder & President of Mojo Lingo, discussed the impact of technology on identity. Sho...
Information technology (IT) advances are transforming the way we innovate in business, thereby disrupting the old guard and their predictable status-quo. It’s creating global market turbulence. Industries are converging, and new opportunities and threats are emerging, like never before. So, how are savvy chief information officers (CIOs) leading this transition? Back in 2015, the IBM Institute for Business Value conducted a market study that included the findings from over 1,800 CIO interviews ...
"Operations is sort of the maturation of cloud utilization and the move to the cloud," explained Steve Anderson, Product Manager for BMC’s Cloud Lifecycle Management, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Due of the rise of Hadoop, many enterprises are now deploying their first small clusters of 10 to 20 servers. At this small scale, the complexity of operating the cluster looks and feels like general data center servers. It is not until the clusters scale, as they inevitably do, when the pain caused by the exponential complexity becomes apparent. We've seen this problem occur time and time again. In his session at Big Data Expo, Greg Bruno, Vice President of Engineering and co-founder of StackIQ...
"I think that everyone recognizes that for IoT to really realize its full potential and value that it is about creating ecosystems and marketplaces and that no single vendor is able to support what is required," explained Esmeralda Swartz, VP, Marketing Enterprise and Cloud at Ericsson, in this SYS-CON.tv interview at @ThingsExpo, held June 7-9, 2016, at the Javits Center in New York City, NY.
The buzz continues for cloud, data analytics and the Internet of Things (IoT) and their collective impact across all industries. But a new conversation is emerging - how do companies use industry disruption and technology enablers to lead in markets undergoing change, uncertainty and ambiguity? Organizations of all sizes need to evolve and transform, often under massive pressure, as industry lines blur and merge and traditional business models are assaulted and turned upside down. In this new da...
"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Bert Loomis was a visionary. This general session will highlight how Bert Loomis and people like him inspire us to build great things with small inventions. In their general session at 19th Cloud Expo, Harold Hannon, Architect at IBM Bluemix, and Michael O'Neill, Strategic Business Development at Nvidia, discussed the accelerating pace of AI development and how IBM Cloud and NVIDIA are partnering to bring AI capabilities to "every day," on-demand. They also reviewed two "free infrastructure" pr...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo 2016 in New York. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place June 6-8, 2017, at the Javits Center in New York City, New York, is co-located with 20th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry p...
It is one thing to build single industrial IoT applications, but what will it take to build the Smart Cities and truly society changing applications of the future? The technology won’t be the problem, it will be the number of parties that need to work together and be aligned in their motivation to succeed. In his Day 2 Keynote at @ThingsExpo, Henrik Kenani Dahlgren, Portfolio Marketing Manager at Ericsson, discussed how to plan to cooperate, partner, and form lasting all-star teams to change the...