|By Business Wire||
|July 17, 2014 01:20 PM EDT||
FireHost, the secure cloud provider, has been included by Gartner, Inc., in its Cloud-Enabled Managed Hosting Magic Quadrant. It is the first Magic Quadrant appearance for the fast-growing company, which has doubled revenue in each of its past three years and blocked more than one billion attacks for its global customer base. Its inclusion reflects FireHost’s growing visibility as a specialized provider that reduces risk for companies by providing a secure cloud infrastructure to help them achieve compliance and strict data security requirements.
The Cloud-Enabled Managed Hosting Magic Quadrant helps businesses navigate a dynamic, diversifying cloud market by assessing various vendors and service providers. Gartner’s annual industry evaluation focuses on infrastructure-as-a-service cloud providers, including those bringing a particular specialty to the industry.
- From Gartner: “While many service providers add security services and capabilities on top of a cloud or hosting solution, FireHost has engineered these capabilities directly into its core platform.”
- From Gartner: “FireHost has invested significantly in developing much of its own intellectual property. As a result, it has one of the more consistent global user interfaces, especially in the area of integrated security features.”
- From Gartner: “For a relatively young company in a field of well-established competitors, FireHost has been able to expand its footprint quickly, due to rapid growth.”
Jim Lewandowski, CEO
“We believe FireHost’s inclusion in Gartner’s Cloud-Enabled Managed Hosting Magic Quadrant is acknowledgement that security is an important offering that not only addresses a major barrier to cloud adoption but also helps ensure that businesses reduce risk and remain compliant. Commodity cloud providers cannot be everything to everyone, which is why specialization is a real trend in today’s industry. The ongoing cadence of highly publicized data breaches continues to reinforce the need for a cloud provider specializing in security and compliance who can reduce risk for businesses and their customers. Simply put, FireHost believes there can be no compromise when it comes to security, and our customers are benefiting from us delivering on that commitment.”
Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.
FireHost offers the most secure, managed cloud IaaS available, protecting sensitive data and brand reputations of some of the largest companies in the world. With private, cloud infrastructure built for security, compliance, performance and managed service, responsible businesses choose FireHost to reduce risk and improve the collection, storage and transmission of their most confidential data. FireHost’s secure, managed cloud IaaS is available in Dallas, Phoenix, London, Amsterdam and Singapore, and offers robust, geographically redundant business continuity options across all sites. Based in Dallas, FireHost is the chosen secure private cloud service provider for brands that won't compromise on the security of their payment card, healthcare, and other regulated data.
Organizations planning enterprise data center consolidation and modernization projects are faced with a challenging, costly reality. Requirements to deploy modern, cloud-native applications simultaneously with traditional client/server applications are almost impossible to achieve with hardware-centric enterprise infrastructure. Compute and network infrastructure are fast moving down a software-defined path, but storage has been a laggard. Until now.
Dec. 10, 2016 04:00 AM EST Reads: 5,512
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
Dec. 10, 2016 04:00 AM EST Reads: 5,311
Dec. 10, 2016 03:15 AM EST Reads: 409
Dec. 10, 2016 02:45 AM EST Reads: 2,266
Dec. 10, 2016 02:15 AM EST Reads: 787
Dec. 10, 2016 02:00 AM EST Reads: 1,986
Dec. 10, 2016 02:00 AM EST Reads: 585
Dec. 10, 2016 01:30 AM EST Reads: 3,998
Dec. 10, 2016 01:30 AM EST Reads: 764
Dec. 10, 2016 01:15 AM EST Reads: 1,220
Dec. 10, 2016 01:00 AM EST Reads: 1,263
Dec. 10, 2016 12:45 AM EST Reads: 480
Dec. 10, 2016 12:30 AM EST Reads: 614
"We're a cybersecurity firm that specializes in engineering security solutions both at the software and hardware level. Security cannot be an after-the-fact afterthought, which is what it's become," stated Richard Blech, Chief Executive Officer at Secure Channels, in this SYS-CON.tv interview at @ThingsExpo, held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Dec. 9, 2016 11:30 PM EST Reads: 1,155
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lead...
Dec. 9, 2016 10:45 PM EST Reads: 553