Click here to close now.




















Welcome!

Related Topics: Cloud Security, Java IoT, Microservices Expo, @CloudExpo, Government Cloud

Cloud Security: Blog Post

Peerlyst to Disrupt the Traditional Industry Research Model

RSA interview with Limor Elbaz, the founder and CEO of Peerlyst.com

Thanks for taking the time to answer my questions. Please tell us, what is Peerlyst all about and what do you do?

Limor Elbaz: I'm Limor Elbaz the founder and CEO of Peerlyst.com. We've launched a product-centric social network for Enterprise IT professionals and we want to bring the power of social networks to IT decision making.

Because of their experience with consumer applications, Enterprise IT decision-makers are demanding a social buying experience that includes unbiased product reviews by trusted peer users, insights based on firsthand product experience, and new ways to connect to peers in their industry who have already implemented products in their business.

What are you launching at RSA?

Elbaz: We are launching our website Peerlyst.com for Information Security Professionals. Peerlyst is the world's first social site that fosters community around IT products. The website gives enterprise technology decision makers comprehensive product information from a range of sources, including the one they value most: their peers' firsthand experience with IT solutions.

Peerlyst provides a unique, trusted social buying experience for enterprise technology products and services, using the same capabilities that people are familiar with from their personal social networks. Peerlyst combines LinkedIn-like product pages (PeerPagesTM) with user-generated product ratings (PeerRatingsTM) of the key product features that are most important to IT decision makers.

Peerlyst's social features, such as the ability to follow products, will give users an ongoing feed of pertinent information over a product's life span. That includes reviews and comments from other Peerlyst users; technical content from vendors; and product-related articles, discussions, files, and videos from the Web.

Who is your target audience and how do you intend to reach them? What is the biggest challenge you face right now in telling your story and winning over new clients?

Elbaz: Our target audience are IT decision-makers (CISOs, Directors of Information Security, Application and Network Security Managers) who need to an effective way to learn from their peers what works and doesn't with the products they are considering.  What IT pros want is a reality check based on the crowdsourced experience of many other users.

Our biggest challenge is getting new Information Security folks to try out our site. We are building our social media capabilities and as of today we have over 700 Information Security pros who follow us on Twitter.

I'd be curious to hear any general thoughts you have on market trends...

Elbaz: It's hard to keep up with all of the changes, but mobile solutions, BYOD and next generation firewalls are interesting.  The idea of Peerlyst is to help our users share information so that they can help each other to keep abreast of what's new and what works best.

What is the viral aspect of your product?

Elbaz: Peerlyst is completely viral.  Once you join you can invite your peers to join too.  We've also built familiar social networking capabilities into our product pages.  Our users can easily socialize their review of a product or comments that they make.  They can also upload documents and videos to share with the community.

What's the business model? How will you make money?

Elbaz: Peerlyst is free for Information Security professionals to join and use.  We make money by providing InfoSec tech vendors an analytics feed based on product information we have found on the web.  We respect our users' privacy and do not provide vendors with our users information unless a user decides to click the contact vendor button on a product page.

Who are your competitors?

Elbaz: Our biggest competitor is for IT users to continue to rely on services like Gartner that don't use or benchmark the products and really can't capture the firsthand experience users have with a product.  Also Gartner and their peers do not cover smaller vendors who may be best of breed, but do not have significant revenues.

How do you differentiate from your competitors?

Elbaz: We have developed state-of-the-art information extraction algorithms that scour the Web for product information and generate organized product pages called PeerPagesTM.  No one else we know of does this.

How does your technology differentiate from the competition and can you elaborate on the different technology deployed?

Elbaz: We have developed state-of-the-art information extraction algorithms that scour the Web for product information and generate organized product pages called PeerPagesTM.  No one else we know of does this.

What business or technology could yours disrupt?

Elbaz: We disrupt traditional analyst firms that sell syndicated services to IT departments.

Who founded the company, when? What can you tell me about the story of the company's founding?

Elbaz: We're a team of IT and product professionals, developers, and designers. Like most people today, we use social sites to find great restaurants and see how people rate consumer products. But there was a big gap in our work lives. The process of evaluating, selecting, and keeping track of the tech products that drive our businesses was stuck in the 20th century.

Why were we spending hours searching for information on the Internet, poring over dozens of vendor white papers and analyst reviews? Did we really need to build spreadsheet after spreadsheet to compare products? And why wasn't there someplace we could go to see our peers' reviews of technology solutions, or to reach out to them and ask questions?

We created the idea for Peerlyst in 2011 and are launching now.

What is your distribution model? Where to buy your product?

Elbaz: We are truly web-based.  Our web site delivers our product.

What's next on your product roadmap?

Elbaz: Adding more social capabilities for our users, such as the ability to collaborate on a specific Information Security topic.

Are you targeting a first VC round? If yes when and what will you use the funds for?

How much money is being sought?

Elbaz: We are in discussion with top tier VCs now for our A round.

Peerlyst is a social media platform designed to give enterprise technology decision makers the unbiased information they need to buy, and make the best use of, IT solutions. The network enables a new social buying experience based on peer-to-peer interaction regarding technology products, services, and integration. Peerlyst is designed to guarantee that users get honest information about enterprise technology from actual users and experts. The company has offices in Silicon Valley.

Information on Peerlyst can be found at www.peerlyst.com or by following the company on Twitter @Peerlyst.

Thank you for your time!

More Stories By Xenia von Wedel

Xenia von Wedel, Tech blogger and PR Consultant in Mountain View. She mainly writes about B2B solutions, social media and open source software. She is an SVP with a full-service PR agency, serving clients in a variety of industries worldwide. The agency is focused on thought leadership content creation and syndication, media outreach and strategy. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
In their session at 17th Cloud Expo, Hal Schwartz, CEO of Secure Infrastructure & Services (SIAS), and Chuck Paolillo, CTO of Secure Infrastructure & Services (SIAS), provide a study of cloud adoption trends and the power and flexibility of IBM Power and Pureflex cloud solutions. In his role as CEO of Secure Infrastructure & Services (SIAS), Hal Schwartz provides leadership and direction for the company.
In a recent research, analyst firm IDC found that the average cost of a critical application failure is $500,000 to $1 million per hour and the average total cost of unplanned application downtime is $1.25 billion to $2.5 billion per year for Fortune 1000 companies. In addition to the findings on the cost of the downtime, the research also highlighted best practices for development, testing, application support, infrastructure, and operations teams.
Mobile, social, Big Data, and cloud have fundamentally changed the way we live. “Anytime, anywhere” access to data and information is no longer a luxury; it’s a requirement, in both our personal and professional lives. For IT organizations, this means pressure has never been greater to deliver meaningful services to the business and customers.
Puppet Labs has announced the next major update to its flagship product: Puppet Enterprise 2015.2. This release includes new features providing DevOps teams with clarity, simplicity and additional management capabilities, including an all-new user interface, an interactive graph for visualizing infrastructure code, a new unified agent and broader infrastructure support.
For IoT to grow as quickly as analyst firms’ project, a lot is going to fall on developers to quickly bring applications to market. But the lack of a standard development platform threatens to slow growth and make application development more time consuming and costly, much like we’ve seen in the mobile space. In his session at @ThingsExpo, Mike Weiner, Product Manager of the Omega DevCloud with KORE Telematics Inc., discussed the evolving requirements for developers as IoT matures and conducte...
Container technology is sending shock waves through the world of cloud computing. Heralded as the 'next big thing,' containers provide software owners a consistent way to package their software and dependencies while infrastructure operators benefit from a standard way to deploy and run them. Containers present new challenges for tracking usage due to their dynamic nature. They can also be deployed to bare metal, virtual machines and various cloud platforms. How do software owners track the usag...
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at @ThingsExpo, James Kirkland, Red Hat's Chief Arch...
Providing the needed data for application development and testing is a huge headache for most organizations. The problems are often the same across companies - speed, quality, cost, and control. Provisioning data can take days or weeks, every time a refresh is required. Using dummy data leads to quality problems. Creating physical copies of large data sets and sending them to distributed teams of developers eats up expensive storage and bandwidth resources. And, all of these copies proliferating...
Malicious agents are moving faster than the speed of business. Even more worrisome, most companies are relying on legacy approaches to security that are no longer capable of meeting current threats. In the modern cloud, threat diversity is rapidly expanding, necessitating more sophisticated security protocols than those used in the past or in desktop environments. Yet companies are falling for cloud security myths that were truths at one time but have evolved out of existence.
Digital Transformation is the ultimate goal of cloud computing and related initiatives. The phrase is certainly not a precise one, and as subject to hand-waving and distortion as any high-falutin' terminology in the world of information technology. Yet it is an excellent choice of words to describe what enterprise IT—and by extension, organizations in general—should be working to achieve. Digital Transformation means: handling all the data types being found and created in the organizat...
Public Cloud IaaS started its life in the developer and startup communities and has grown rapidly to a $20B+ industry, but it still pales in comparison to how much is spent worldwide on IT: $3.6 trillion. In fact, there are 8.6 million data centers worldwide, the reality is many small and medium sized business have server closets and colocation footprints filled with servers and storage gear. While on-premise environment virtualization may have peaked at 75%, the Public Cloud has lagged in adop...
SYS-CON Events announced today that HPM Networks will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. For 20 years, HPM Networks has been integrating technology solutions that solve complex business challenges. HPM Networks has designed solutions for both SMB and enterprise customers throughout the San Francisco Bay Area.
The time is ripe for high speed resilient software defined storage solutions with unlimited scalability. ISS has been working with the leading open source projects and developed a commercial high performance solution that is able to grow forever without performance limitations. In his session at Cloud Expo, Alex Gorbachev, President of Intelligent Systems Services Inc., shared foundation principles of Ceph architecture, as well as the design to deliver this storage to traditional SAN storage co...
The Software Defined Data Center (SDDC), which enables organizations to seamlessly run in a hybrid cloud model (public + private cloud), is here to stay. IDC estimates that the software-defined networking market will be valued at $3.7 billion by 2016. Security is a key component and benefit of the SDDC, and offers an opportunity to build security 'from the ground up' and weave it into the environment from day one. In his session at 16th Cloud Expo, Reuven Harrison, CTO and Co-Founder of Tufin,...
MuleSoft has announced the findings of its 2015 Connectivity Benchmark Report on the adoption and business impact of APIs. The findings suggest traditional businesses are quickly evolving into "composable enterprises" built out of hundreds of connected software services, applications and devices. Most are embracing the Internet of Things (IoT) and microservices technologies like Docker. A majority are integrating wearables, like smart watches, and more than half plan to generate revenue with ...