Welcome!

News Feed Item

Ecrypt Technologies and Nuwa(TM) Executive Academy for Security, Defense and Intelligence Professionals enter into a Marketing Alliance

Ecrypt continues to implement its strategy of rapid time-to-market new product development with unique offerings for growing markets

BOULDER, COLORADO -- (Marketwired) -- 06/24/14 -- Ecrypt Technologies (OTCQB:ECRY) announced today that Nuwa Executive Academy for Security, Defense and Intelligence Professionals, Stockholm, Sweden and Ecrypt formalized their strategic marketing alliance through a formal, worldwide exclusive arrangement whereby Ecrypt will promote, sell and distribute all of Nuwa Executive Academy for Security, Defense and Intelligence Professionals global academies.

Dr. Thomas A. Cellucci, Ecrypt's CEO commented: "We are pleased to formalize in this special business relationship with Nuwa Executive Academy for Security, Defense and Intelligence Professionals, who has earned a well-deserved reputation through its Nuwa programs (see link at http://www.maya-global.com/) used throughout the globe to build critical business expertise among woman entrepreneurs".

Dr. Ann-Christine Langselius, Owner of Nuwa and CEO of MG Enterprise Invest, from where Nuwa is being operated stated: "We are pleased that we're joining the Ecrypt team. Their marketing prowess, unparalleled market intelligence, accomplished Board, management team, and in-depth knowledge of both the US government and commercial markets will assist us in driving our profitable growth. Together, we make an unbeatable team!"

For more information about Nuwa's product offerings, you can view various whitepapers and technical materials at the following link: http://www.maya-global.com.

About Maya Global Enterprise

MG Enterprise offers customer focused-oriented RESULTS, with core competence including rigorous strategic analysis, identification of high-value technologies, gap analysis, recruitment, business partner identification and allocation. MG has created the Nuwa business concept for innovation and personal growth.

About Ecrypt Technologies

Ecrypt Technologies, Inc. is at the forefront of data security, specializing in military-strength information security solutions for enterprise, government and military. Ecrypt empowers organizations with the freedom to communicate and collaborate without risk of liability, reputation damage, competitive threat and other negative outcomes. Ecrypt is the trusted first choice for those looking to keep their communications confidential.

For more information, visit http://ecryptinc.com

Safe Harbor Statement

This press release contains certain "forward-looking statements," as defined in the United States Private Securities Litigation Reform Act of 1995, that involve a number of risks and uncertainties. There can be no assurance that such statements will prove to be accurate and the actual results and future events could differ materially from management's current expectations. The economic, competitive, governmental, technological and other factors identified in the Company's previous filings with the Securities and Exchange Commission may cause actual results or events to differ materially from those described in the forward looking statements in this press release. The Company undertakes no obligation to publicly update or revise any forward-looking statements, whether as a result of new information, future events or otherwise.

Contacts:
Media Contact
Ecrypt Technologies, Inc.
1.866.204.6703
[email protected]
www.ecryptinc.com

More Stories By Marketwired .

Copyright © 2009 Marketwired. All rights reserved. All the news releases provided by Marketwired are copyrighted. Any forms of copying other than an individual user's personal reference without express written permission is prohibited. Further distribution of these materials is strictly forbidden, including but not limited to, posting, emailing, faxing, archiving in a public database, redistributing via a computer network or in a printed form.

Latest Stories
Cell networks have the advantage of long-range communications, reaching an estimated 90% of the world. But cell networks such as 2G, 3G and LTE consume lots of power and were designed for connecting people. They are not optimized for low- or battery-powered devices or for IoT applications with infrequently transmitted data. Cell IoT modules that support narrow-band IoT and 4G cell networks will enable cell connectivity, device management, and app enablement for low-power wide-area network IoT. B...
"DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited to help the great team at @DevOpsSUMMIT and CloudEXPO tell the world how they can leverage this emerging disruptive trend."
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Adding public cloud resources to an existing application can be a daunting process. The tools that you currently use to manage the software and hardware outside the cloud aren’t always the best tools to efficiently grow into the cloud. All of the major configuration management tools have cloud orchestration plugins that can be leveraged, but there are also cloud-native tools that can dramatically improve the efficiency of managing your application lifecycle. In his session at 18th Cloud Expo, ...
Transformation Abstract Encryption and privacy in the cloud is a daunting yet essential task for both security practitioners and application developers, especially as applications continue moving to the cloud at an exponential rate. What are some best practices and processes for enterprises to follow that balance both security and ease of use requirements? What technologies are available to empower enterprises with code, data and key protection from cloud providers, system administrators, inside...
With the proliferation of both SQL and NoSQL databases, organizations can now target specific fit-for-purpose database tools for their different application needs regarding scalability, ease of use, ACID support, etc. Platform as a Service offerings make this even easier now, enabling developers to roll out their own database infrastructure in minutes with minimal management overhead. However, this same amount of flexibility also comes with the challenges of picking the right tool, on the right ...
In his session at 21st Cloud Expo, Raju Shreewastava, founder of Big Data Trunk, provided a fun and simple way to introduce Machine Leaning to anyone and everyone. He solved a machine learning problem and demonstrated an easy way to be able to do machine learning without even coding. Raju Shreewastava is the founder of Big Data Trunk (www.BigDataTrunk.com), a Big Data Training and consulting firm with offices in the United States. He previously led the data warehouse/business intelligence and Bi...
Nicolas Fierro is CEO of MIMIR Blockchain Solutions. He is a programmer, technologist, and operations dev who has worked with Ethereum and blockchain since 2014. His knowledge in blockchain dates to when he performed dev ops services to the Ethereum Foundation as one the privileged few developers to work with the original core team in Switzerland.
Contextual Analytics of various threat data provides a deeper understanding of a given threat and enables identification of unknown threat vectors. In his session at @ThingsExpo, David Dufour, Head of Security Architecture, IoT, Webroot, Inc., discussed how through the use of Big Data analytics and deep data correlation across different threat types, it is possible to gain a better understanding of where, how and to what level of danger a malicious actor poses to an organization, and to determin...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Digital Transformation and Disruption, Amazon Style - What You Can Learn. Chris Kocher is a co-founder of Grey Heron, a management and strategic marketing consulting firm. He has 25+ years in both strategic and hands-on operating experience helping executives and investors build revenues and shareholder value. He has consulted with over 130 companies on innovating with new business models, product strategies and monetization. Chris has held management positions at HP and Symantec in addition to ...
Traditional IT, great for stable systems of record, is struggling to cope with newer, agile systems of engagement requirements coming straight from the business. In his session at 18th Cloud Expo, William Morrish, General Manager of Product Sales at Interoute, will outline ways of exploiting new architectures to enable both systems and building them to support your existing platforms, with an eye for the future. Technologies such as Docker and the hyper-convergence of computing, networking and...
Today, we have more data to manage than ever. We also have better algorithms that help us access our data faster. Cloud is the driving force behind many of the data warehouse advancements we have enjoyed in recent years. But what are the best practices for storing data in the cloud for machine learning and data science applications?
"MobiDev is a Ukraine-based software development company. We do mobile development, and we're specialists in that. But we do full stack software development for entrepreneurs, for emerging companies, and for enterprise ventures," explained Alan Winters, U.S. Head of Business Development at MobiDev, in this SYS-CON.tv interview at 20th Cloud Expo, held June 6-8, 2017, at the Javits Center in New York City, NY.
As Cybric's Chief Technology Officer, Mike D. Kail is responsible for the strategic vision and technical direction of the platform. Prior to founding Cybric, Mike was Yahoo's CIO and SVP of Infrastructure, where he led the IT and Data Center functions for the company. He has more than 24 years of IT Operations experience with a focus on highly-scalable architectures.