Welcome!

Related Topics: Cloud Security, Java IoT, Microservices Expo, @CloudExpo, Government Cloud

Cloud Security: Blog Post

Peerlyst to Disrupt the Traditional Industry Research Model

RSA interview with Limor Elbaz, the founder and CEO of Peerlyst.com

Thanks for taking the time to answer my questions. Please tell us, what is Peerlyst all about and what do you do?

Limor Elbaz: I'm Limor Elbaz the founder and CEO of Peerlyst.com. We've launched a product-centric social network for Enterprise IT professionals and we want to bring the power of social networks to IT decision making.

Because of their experience with consumer applications, Enterprise IT decision-makers are demanding a social buying experience that includes unbiased product reviews by trusted peer users, insights based on firsthand product experience, and new ways to connect to peers in their industry who have already implemented products in their business.

What are you launching at RSA?

Elbaz: We are launching our website Peerlyst.com for Information Security Professionals. Peerlyst is the world's first social site that fosters community around IT products. The website gives enterprise technology decision makers comprehensive product information from a range of sources, including the one they value most: their peers' firsthand experience with IT solutions.

Peerlyst provides a unique, trusted social buying experience for enterprise technology products and services, using the same capabilities that people are familiar with from their personal social networks. Peerlyst combines LinkedIn-like product pages (PeerPagesTM) with user-generated product ratings (PeerRatingsTM) of the key product features that are most important to IT decision makers.

Peerlyst's social features, such as the ability to follow products, will give users an ongoing feed of pertinent information over a product's life span. That includes reviews and comments from other Peerlyst users; technical content from vendors; and product-related articles, discussions, files, and videos from the Web.

Who is your target audience and how do you intend to reach them? What is the biggest challenge you face right now in telling your story and winning over new clients?

Elbaz: Our target audience are IT decision-makers (CISOs, Directors of Information Security, Application and Network Security Managers) who need to an effective way to learn from their peers what works and doesn't with the products they are considering.  What IT pros want is a reality check based on the crowdsourced experience of many other users.

Our biggest challenge is getting new Information Security folks to try out our site. We are building our social media capabilities and as of today we have over 700 Information Security pros who follow us on Twitter.

I'd be curious to hear any general thoughts you have on market trends...

Elbaz: It's hard to keep up with all of the changes, but mobile solutions, BYOD and next generation firewalls are interesting.  The idea of Peerlyst is to help our users share information so that they can help each other to keep abreast of what's new and what works best.

What is the viral aspect of your product?

Elbaz: Peerlyst is completely viral.  Once you join you can invite your peers to join too.  We've also built familiar social networking capabilities into our product pages.  Our users can easily socialize their review of a product or comments that they make.  They can also upload documents and videos to share with the community.

What's the business model? How will you make money?

Elbaz: Peerlyst is free for Information Security professionals to join and use.  We make money by providing InfoSec tech vendors an analytics feed based on product information we have found on the web.  We respect our users' privacy and do not provide vendors with our users information unless a user decides to click the contact vendor button on a product page.

Who are your competitors?

Elbaz: Our biggest competitor is for IT users to continue to rely on services like Gartner that don't use or benchmark the products and really can't capture the firsthand experience users have with a product.  Also Gartner and their peers do not cover smaller vendors who may be best of breed, but do not have significant revenues.

How do you differentiate from your competitors?

Elbaz: We have developed state-of-the-art information extraction algorithms that scour the Web for product information and generate organized product pages called PeerPagesTM.  No one else we know of does this.

How does your technology differentiate from the competition and can you elaborate on the different technology deployed?

Elbaz: We have developed state-of-the-art information extraction algorithms that scour the Web for product information and generate organized product pages called PeerPagesTM.  No one else we know of does this.

What business or technology could yours disrupt?

Elbaz: We disrupt traditional analyst firms that sell syndicated services to IT departments.

Who founded the company, when? What can you tell me about the story of the company's founding?

Elbaz: We're a team of IT and product professionals, developers, and designers. Like most people today, we use social sites to find great restaurants and see how people rate consumer products. But there was a big gap in our work lives. The process of evaluating, selecting, and keeping track of the tech products that drive our businesses was stuck in the 20th century.

Why were we spending hours searching for information on the Internet, poring over dozens of vendor white papers and analyst reviews? Did we really need to build spreadsheet after spreadsheet to compare products? And why wasn't there someplace we could go to see our peers' reviews of technology solutions, or to reach out to them and ask questions?

We created the idea for Peerlyst in 2011 and are launching now.

What is your distribution model? Where to buy your product?

Elbaz: We are truly web-based.  Our web site delivers our product.

What's next on your product roadmap?

Elbaz: Adding more social capabilities for our users, such as the ability to collaborate on a specific Information Security topic.

Are you targeting a first VC round? If yes when and what will you use the funds for?

How much money is being sought?

Elbaz: We are in discussion with top tier VCs now for our A round.

Peerlyst is a social media platform designed to give enterprise technology decision makers the unbiased information they need to buy, and make the best use of, IT solutions. The network enables a new social buying experience based on peer-to-peer interaction regarding technology products, services, and integration. Peerlyst is designed to guarantee that users get honest information about enterprise technology from actual users and experts. The company has offices in Silicon Valley.

Information on Peerlyst can be found at www.peerlyst.com or by following the company on Twitter @Peerlyst.

Thank you for your time!

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
SYS-CON Events announced today that Isomorphic Software will exhibit at DevOps Summit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Isomorphic Software provides the SmartClient HTML5/AJAX platform, the most advanced technology for building rich, cutting-edge enterprise web applications for desktop and mobile. SmartClient combines the productivity and performance of traditional desktop software with the simp...
Why do your mobile transformations need to happen today? Mobile is the strategy that enterprise transformation centers on to drive customer engagement. In his general session at @ThingsExpo, Roger Woods, Director, Mobile Product & Strategy – Adobe Marketing Cloud, covered key IoT and mobile trends that are forcing mobile transformation, key components of a solid mobile strategy and explored how brands are effectively driving mobile change throughout the enterprise.
With so much going on in this space you could be forgiven for thinking you were always working with yesterday’s technologies. So much change, so quickly. What do you do if you have to build a solution from the ground up that is expected to live in the field for at least 5-10 years? This is the challenge we faced when we looked to refresh our existing 10-year-old custom hardware stack to measure the fullness of trash cans and compactors.
The emerging Internet of Everything creates tremendous new opportunities for customer engagement and business model innovation. However, enterprises must overcome a number of critical challenges to bring these new solutions to market. In his session at @ThingsExpo, Michael Martin, CTO/CIO at nfrastructure, outlined these key challenges and recommended approaches for overcoming them to achieve speed and agility in the design, development and implementation of Internet of Everything solutions wi...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
With over 720 million Internet users and 40–50% CAGR, the Chinese Cloud Computing market has been booming. When talking about cloud computing, what are the Chinese users of cloud thinking about? What is the most powerful force that can push them to make the buying decision? How to tap into them? In his session at 18th Cloud Expo, Yu Hao, CEO and co-founder of SpeedyCloud, answered these questions and discussed the results of SpeedyCloud’s survey.
Today we can collect lots and lots of performance data. We build beautiful dashboards and even have fancy query languages to access and transform the data. Still performance data is a secret language only a couple of people understand. The more business becomes digital the more stakeholders are interested in this data including how it relates to business. Some of these people have never used a monitoring tool before. They have a question on their mind like “How is my application doing” but no id...
Smart Cities are here to stay, but for their promise to be delivered, the data they produce must not be put in new siloes. In his session at @ThingsExpo, Mathias Herberts, Co-founder and CTO of Cityzen Data, will deep dive into best practices that will ensure a successful smart city journey.
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...
Identity is in everything and customers are looking to their providers to ensure the security of their identities, transactions and data. With the increased reliance on cloud-based services, service providers must build security and trust into their offerings, adding value to customers and improving the user experience. Making identity, security and privacy easy for customers provides a unique advantage over the competition.
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
SYS-CON Events announced today that StarNet Communications will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. StarNet Communications’ FastX is the industry first cloud-based remote X Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.) users from around the world gain highly secure access to applications and data hosted on Linux-based servers in a central data center. ...
SYS-CON Events announced today that 910Telecom will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Housed in the classic Denver Gas & Electric Building, 910 15th St., 910Telecom is a carrier-neutral telecom hotel located in the heart of Denver. Adjacent to CenturyLink, AT&T, and Denver Main, 910Telecom offers connectivity to all major carriers, Internet service providers, Internet backbones and ...
Traditional on-premises data centers have long been the domain of modern data platforms like Apache Hadoop, meaning companies who build their business on public cloud were challenged to run Big Data processing and analytics at scale. But recent advancements in Hadoop performance, security, and most importantly cloud-native integrations, are giving organizations the ability to truly gain value from all their data. In his session at 19th Cloud Expo, David Tishgart, Director of Product Marketing ...
StarNet Communications Corp has announced the addition of three Secure Remote Desktop modules to its flagship X-Win32 PC X server. The new modules enable X-Win32 to safely tunnel the remote desktops from Linux and Unix servers to the user’s PC over encrypted SSH. Traditionally, users of PC X servers deploy the XDMCP protocol to display remote desktop environments such as the Gnome and KDE desktops on Linux servers and the CDE environment on Solaris Unix machines. XDMCP is used primarily on comp...