Welcome!

Related Topics: Cloud Security

Cloud Security: Blog Post

Hob to Showcase HTML5 Clients

RSA talk with Siegfried Plommer, VP International Sales for HOB GmbH

Thanks for taking the time to answer my questions. Please tell us, what is HOB all about and what do you do?

Siegfried Plommer: HOB is all about secure business connectivity. We strive to provide our customers with software solutions that enable simple and secure remote access to centrally stored company data. The focus of our products lies on a maximum level of security for your data. Another goal of HOB is to develop solutions that don't require installation or administration rights on the client side. With HOB products employees can access corporate data from anywhere, at anytime and from almost any device.

Regarding myself, I have been with HOB since 2011, and am the VP of International Sales. I am responsible for representing HOB internationally. Therefore, I regularly attend tradeshows all around the world, present our newest software solutions as well as talk to partners and potential customers.

What are you launching at RSA?

Plommer: At RSA, we are showcasing the latest innovations and features of our most popular software solutions. Also, we will be talking about our first HTML5 clients, which will be a huge leap forward in the field of remote access solutions. With an HTML5 client, users will be able to access corporate resources using their web browser only. Java Plugins may become obsolete for basic access scenarios. Many of our Java based solutions offer advanced features though, which will not work in a pure HTML5 environment, due to missing HTML5 functionality. For companies and users this means that basic connections to a remote server will become even easier and more comfortable than it already is.

The biggest challenge in winning over new clients is to prove that our solutions are superior to the ones from our competitors. We still consider ourselves a hidden champion, although large customers like Citi, Barclays, Deutsche Bank and many more global corporations are already working with us! Juniper is our OEM partner for one of our client products, and in 2013 we entered into a Technology Alliance Partnership with F5. Fighting against the marketing machinery of those global companies can be tough, but we are winning over customers by forming strong personal relationships and consulting them individually to find a solution that suits them best.

Who is your target audience and how do you intend to reach them?

Plommer: Our target audiences are businesses of any size that are looking for a way to provide secure remote access to centrally stored company data. Since all of our products are software-based solutions, they can be implemented within any existing IT infrastructure. Due to our flexible licensing models, we can make sure that small companies are also able to afford our software.

In order to reach potential customers, we use a mix of different communication channels. On the one hand, we are using traditional channels such as print advertisements and trade shows. On the other hand, we embrace marketing possibilities of the internet and social media. With our inbound marketing approach, we reach people who are actually searching for a solution to one of their IT problems. To help people find the right solution for them, we offer several free e-books and whitepapers. Moreover, we are regularly blogging and engaging with potential customers on Twitter and Facebook.

I'd be curious to hear any general thoughts you have on market trends...

Plommer: In general, the awareness and demand for security solutions has been increasing during the last couple of months - probably because of the NSA affair. At HOB, we believe that this trend is going to continue. In a survey that we conducted at the end of last year, we were able to see that CIOs and CTOs in the USA are expecting their IT budgets to increase significantly and that they are planning to invest into remote access solutions.

Another more specific market trend is the increasing demand for secure mobility solutions. Employees are increasingly requesting to work from home or while on the go. Moreover, the consumerization of IT makes people want to use their own personal devices for working remotely - also known as BYOD. At HOB, we already have solutions that help businesses to fulfill the wishes of their employees and increase their productivity at the same time.

Who are your competitors?

Plommer: Our biggest competitors are the big players of the IT security industry such as Cisco and Citrix. But we are also aware of the fact that there are a lot of start-ups entering the security market. Regardless of the size of the company, we keep a close eye on our competitors and try to develop unique features that differentiate us from the competition.

How do you differentiate from your competitors?

Plommer: We focus on secure remote access solutions that seamlessly blend into existing IT infrastructures. Delivering software-only means, that we are less "intrusive" which definitely helps to protect existing investments. We provide our clients with excellent service. The longevity of the customer relationships we've forged over the years (in some cases over 20 years!) is a testament to our ability to provide a good combination of innovative products and excellent customer care.

What business or technology could yours disrupt?

Plommer: Having been in this industry a long time, since 1964, we are not looking to disrupt a business or technology. Instead, we are constantly working to keep our competitive advantages, knowing full well that there is a lot of competition, including start ups that are looking to disrupt our business. We are confident that our experience in the IT industry and hiring new academic talent will help us preserve our competitive advantage in the future.

Who founded the company, when? What can you tell me about the story of the company's founding?

Plommer: HOB Electronic GmbH & Co. KG was founded in 1964, as an electronics enterprise, by Horst Brandstätter. The name HOB is an acronym formed from his name.

In 1981, HOB began developing software and terminals for IBM mainframe computers. Ever since we have been constantly improving our solutions and enhancing our product portfolio.

What is your distribution model? Where to buy your product?

Plommer: We are mainly distributing our products via our distributor and partner network. As a customer, you can purchase our products from several System Integrators/computer retailers all around the world. We also have branches and distribution partners in the United States, Mexico and Malta.

What's next on your product roadmap?

Plommer: We are continuously updating and improving our existing product portfolio. A next big step will be the development of HTML5 clients. As I mentioned before, HTML5 clients will allow users to connect to corporate resources by using only their web browser. Java Plugins, which are currently being used in our solutions, will become more obsolete. For companies and users this means that connecting to a remote server will become even easier and more comfortable than it already is.

Other information if applicable:

Plommer: We would be happy to welcome anyone who is interested in our products or the IT Security industry at our booth at the RSA: #3231 (North Hall). If you are not able to visit RSA, you can visit us on www.hobsoft.com or email ys at [email protected].

Partnerships, collaborations or affiliations:

Plommer: We are currently working in a Technology Alliance Partnership with F5 and with Juniper as our OEM customer.

Federal or state grants, contracts or awards received:

Plommer: HOB has received several awards over the last few years. In 2013 we were Gold recipient of the Golden Bridge awards in the categories "Access Innovation", "Remote Access Solution Innovation" and "VPN/IPSec/SSL Innovations". We also received the Hot Companies and Best Products Gold Award in the category "Cloud Security" and the Info Security Global Excellence Gold Award for "Access" in 2013.

HOB, Inc. is a fully owned subsidiary of HOB GmbH & Co. KG. It was founded in New Jersey in April 2000 and is currently headquartered in Hawthorne, NY. HOB GmbH & Co. KG is a German medium-sized company, developing innovative and multiply rewarded software solutions that are marketed worldwide. The core competencies of the successful company HOB, founded in 1964, comprise server-based computing, secure remote access, VoIP and virtualization. HOB products are deployed in small, mid-sized and large enterprises. Further, some HOB products are certified according to Common Criteria. HOB remote access solutions received the quality mark from TeleTrust "IT Security Made in Germany."

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

Latest Stories
"We are an all-flash array storage provider but our focus has been on VM-aware storage specifically for virtualized applications," stated Dhiraj Sehgal of Tintri in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2017 New York The 7th Internet of @ThingsExpo will take place on June 6-8, 2017, at the Javits Center in New York City, New York. Chris Matthieu is the co-founder and CTO of Octoblu, a revolutionary real-time IoT platform recently acquired by Citrix. Octoblu connects things, systems, people and clouds to a global mesh network allowing users to automate and control design flo...
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Between 2005 and 2020, data volumes will grow by a factor of 300 – enough data to stack CDs from the earth to the moon 162 times. This has come to be known as the ‘big data’ phenomenon. Unfortunately, traditional approaches to handling, storing and analyzing data aren’t adequate at this scale: they’re too costly, slow and physically cumbersome to keep up. Fortunately, in response a new breed of technology has emerged that is cheaper, faster and more scalable. Yet, in meeting these new needs they...
Data is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at 20th Cloud Expo, Ed Featherston, director/senior enterprise architect at Collaborative Consulting, will discuss the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
When it comes to cloud computing, the ability to turn massive amounts of compute cores on and off on demand sounds attractive to IT staff, who need to manage peaks and valleys in user activity. With cloud bursting, the majority of the data can stay on premises while tapping into compute from public cloud providers, reducing risk and minimizing need to move large files. In his session at 18th Cloud Expo, Scott Jeschonek, Director of Product Management at Avere Systems, discussed the IT and busin...
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
The WebRTC Summit New York, to be held June 6-8, 2017, at the Javits Center in New York City, NY, announces that its Call for Papers is now open. Topics include all aspects of improving IT delivery by eliminating waste through automated business models leveraging cloud technologies. WebRTC Summit is co-located with 20th International Cloud Expo and @ThingsExpo. WebRTC is the future of browser-to-browser communications, and continues to make inroads into the traditional, difficult, plug-in web co...
In his general session at 19th Cloud Expo, Manish Dixit, VP of Product and Engineering at Dice, discussed how Dice leverages data insights and tools to help both tech professionals and recruiters better understand how skills relate to each other and which skills are in high demand using interactive visualizations and salary indicator tools to maximize earning potential. Manish Dixit is VP of Product and Engineering at Dice. As the leader of the Product, Engineering and Data Sciences team at D...
Get deep visibility into the performance of your databases and expert advice for performance optimization and tuning. You can't get application performance without database performance. Give everyone on the team a comprehensive view of how every aspect of the system affects performance across SQL database operations, host server and OS, virtualization resources and storage I/O. Quickly find bottlenecks and troubleshoot complex problems.
The Internet of Things (IoT) promises to simplify and streamline our lives by automating routine tasks that distract us from our goals. This promise is based on the ubiquitous deployment of smart, connected devices that link everything from industrial control systems to automobiles to refrigerators. Unfortunately, comparatively few of the devices currently deployed have been developed with an eye toward security, and as the DDoS attacks of late October 2016 have demonstrated, this oversight can ...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
"Once customers get a year into their IoT deployments, they start to realize that they may have been shortsighted in the ways they built out their deployment and the key thing I see a lot of people looking at is - how can I take equipment data, pull it back in an IoT solution and show it in a dashboard," stated Dave McCarthy, Director of Products at Bsquare Corporation, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Unsecured IoT devices were used to launch crippling DDOS attacks in October 2016, targeting services such as Twitter, Spotify, and GitHub. Subsequent testimony to Congress about potential attacks on office buildings, schools, and hospitals raised the possibility for the IoT to harm and even kill people. What should be done? Does the government need to intervene? This panel at @ThingExpo New York brings together leading IoT and security experts to discuss this very serious topic.
"We are the public cloud providers. We are currently providing 50% of the resources they need for doing e-commerce business in China and we are hosting about 60% of mobile gaming in China," explained Yi Zheng, CPO and VP of Engineering at CDS Global Cloud, in this SYS-CON.tv interview at 19th Cloud Expo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.