Welcome!

News Feed Item

Ecrypt Technologies and Cyber Risk Pro Services Form Cyber Protection Partnership

Ecrypt implements its promised rapid time-to-market new product development strategy

BOULDER, COLORADO -- (Marketwired) -- 06/20/14 -- Ecrypt Technologies (OTCQB:ECRY) announced today that Cyber Risk Pro Services of Seattle, Washington and Ecrypt formalized their strategic marketing alliance through a formal, worldwide exclusive arrangement whereby Ecrypt will promote, sell and distribute all of Cyber Risk Pro Services and executive programs targeted to state, county and local Governments.

Dr. Tom Cellucci, Ecrypt's CEO commented: "Cyber Risk Pro Services is engaged in the business of developing the market for cyber breach protection products, services, and solutions that enable public and private sector organizations and business networks to better protect critical infrastructure, respond resiliently to cyber attack, and mitigate the disruption, damage, and other risks of cyber breach. Both public and private sector stakeholders can easily understand and implement their elegant, cost-effective solutions. They represent 'the best of the best' because of the unparalleled experience and expertise of their strong team. We are proud to be offering this important service to our customers."

Robert Kruse, CEO of Cyber Risk Pro Services stated: "We are excited to be combining forces with the Ecrypt team. This partnership enables state, county, and local governments the ability to accelerate the adoption of cyber breach protection solutions in an efficient, scalable manner thorough the guidance of Ecrypt's thought-leaders in public-private partnerships. We couldn't have a better partner for bringing critical infrastructure solutions to the public sector in a cost-efficient, profitable way."

For more information about Cyber Risk Pro Services, visit http://cyberriskproservices.com.

About Cyber Risk Pro Services

Cyber Risk Pro Services is engaged in the business of developing the market for cyber breach protection products, services, and solutions that enable public and private sector organizations and business networks to better protect critical infrastructure, respond resiliently to cyber attack, and mitigate the disruption, damage, and other risks of cyber breach.

About Ecrypt Technologies

Ecrypt Technologies Inc. is at the forefront of data security, specializing in military-strength information security solutions for enterprise, government and military. Ecrypt empowers organizations with the freedom to communicate and collaborate without risk of liability, reputation damage, competitive threat and other negative outcomes. Ecrypt is the trusted first choice for those looking to keep their communications confidential.

For more information, visit http://ecryptinc.com.

Safe Harbor Statement

This press release contains certain "forward-looking statements," as defined in the United States Private Securities Litigation Reform Act of 1995, that involve a number of risks and uncertainties. There can be no assurance that such statements will prove to be accurate and the actual results and future events could differ materially from management's current expectations. The economic, competitive, governmental, technological and other factors identified in the Company's previous filings with the Securities and Exchange Commission may cause actual results or events to differ materially from those described in the forward looking statements in this press release. The Company undertakes no obligation to publicly update or revise any forward-looking statements, whether as a result of new information, future events or otherwise.

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Ovum, a leading technology analyst firm, has published an in-depth report, Ovum Decision Matrix: Selecting a DevOps Release Management Solution, 2016–17. The report focuses on the automation aspects of DevOps, Release Management and compares solutions from the leading vendors.
Continuous testing helps bridge the gap between developing quickly and maintaining high quality products. But to implement continuous testing, CTOs must take a strategic approach to building a testing infrastructure and toolset that empowers their team to move fast. Download our guide to laying the groundwork for a scalable continuous testing strategy.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
SYS-CON Events announced today that LeaseWeb USA, a cloud Infrastructure-as-a-Service (IaaS) provider, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. LeaseWeb is one of the world's largest hosting brands. The company helps customers define, develop and deploy IT infrastructure tailored to their exact business needs, by combining various kinds cloud solutions.
StackIQ has announced the release of Stacki 3.2. Stacki is an easy-to-use Linux server provisioning tool. Stacki 3.2 delivers new capabilities that simplify the automation and integration of site-specific requirements. StackIQ is the commercial entity behind this open source bare metal provisioning tool. Since the release of Stacki in June of 2015, the Stacki core team has been focused on making the Community Edition meet the needs of members of the community, adding features and value, while ...
Qosmos has announced new milestones in the detection of encrypted traffic and in protocol signature coverage. Qosmos latest software can accurately classify traffic encrypted with SSL/TLS (e.g., Google, Facebook, WhatsApp), P2P traffic (e.g., BitTorrent, MuTorrent, Vuze), and Skype, while preserving the privacy of communication content. These new classification techniques mean that traffic optimization, policy enforcement, and user experience are largely unaffected by encryption. In respect wit...
For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording.
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
SYS-CON Events announced today that Venafi, the Immune System for the Internet™ and the leading provider of Next Generation Trust Protection, will exhibit at @DevOpsSummit at 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Venafi is the Immune System for the Internet™ that protects the foundation of all cybersecurity – cryptographic keys and digital certificates – so they can’t be misused by bad guys in attacks...
ReadyTalk has expanded the capabilities of the FoxDen collaboration platform announced late last year to include FoxDen Connect, an in-room video collaboration experience that launches with a single touch. With FoxDen Connect, users can now not only engage in HD video conferencing between iOS and Android mobile devices or Chrome browsers, but also set up in-person meeting rooms for video interactions. A host’s mobile device automatically recognizes the presence of a meeting room via beacon tech...
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Deploying applications in hybrid cloud environments is hard work. Your team spends most of the time maintaining your infrastructure, configuring dev/test and production environments, and deploying applications across environments – which can be both time consuming and error prone. But what if you could automate provisioning and deployment to deliver error free environments faster? What could you do with your free time?
Ixia (Nasdaq: XXIA) has announced that NoviFlow Inc.has deployed IxNetwork® to validate the company’s designs and accelerate the delivery of its proven, reliable products. Based in Montréal, NoviFlow Inc. supports network carriers, hyperscale data center operators, and enterprises seeking greater network control and flexibility, network scalability, and the capacity to handle extremely large numbers of flows, while maintaining maximum network performance. To meet these requirements, NoviFlow in...
Choosing the right cloud for your workloads is a balancing act that can cost your organization time, money and aggravation - unless you get it right the first time. Economics, speed, performance, accessibility, administrative needs and security all play a vital role in dictating your approach to the cloud. Without knowing the right questions to ask, you could wind up paying for capacity you'll never need or underestimating the resources required to run your applications.
It’s 2016: buildings are smart, connected and the IoT is fundamentally altering how control and operating systems work and speak to each other. Platforms across the enterprise are networked via inexpensive sensors to collect massive amounts of data for analytics, information management, and insights that can be used to continuously improve operations. In his session at @ThingsExpo, Brian Chemel, Co-Founder and CTO of Digital Lumens, will explore: The benefits sensor-networked systems bring to ...