|By Business Wire||
|July 21, 2014 02:35 PM EDT||
Lastline, a global advanced malware protection provider, announced today it has been recognized as one of 2014’s hottest emerging technology vendors by CRN, the top news source for solution providers and the IT channel. The annual Emerging Vendors list identifies up-and-coming technology vendors that have introduced innovative new products, creating opportunities for channel partners in North America to create high-margin, cutting-edge solutions for their customers.
Lastline's scalable, interoperable, highly effective and precise threat intelligence, next-generation sandboxing and cloud-based analysis protect private and public organizations from advanced, evasive malware with industry-leading low false positive and false negative rates.
Partners in the Lastline Defense Program can offer next-generation advanced malware protection capabilities:
- Security resellers can sell Lastline Enterprise software to help businesses detect advanced threats targeting their customers across email, files, web and mobile in any location and provide 10x the value of conventional APT appliance-based solutions.
- MSSPs can utilize the Lastline software platform to offer premium advanced malware protection services to help organizations defend themselves against unknown threats. Lastline’s software-centric approach is ideal for MSSPs since it maximizes service margins, runs on commodity servers as well as virtualized environments and can interoperate with internal systems via the rich Lastline API framework.
- Security providers, inclusive of Next-Generation Firewall (NGFW), Unified Threat Management (UTM), Secure Web Gateway, Secure Email Gateway, Intrusion Prevention System (IPS), endpoint protection, server protection, Secure Information and Event Management (SIEM) and Software-as-a-Service (SaaS) providers, can offer next-generation sandboxing capabilities via Lastline rich API framework. Lastline protection is made available through its own hosted cloud or the security provider’s private cloud.
“Solution providers are always on the hunt for the next big technology trend so that they can bring new solutions to their customers before they even know they need them. These vendors are on the forefront of IT innovation and are offering products and services that channel partners can use to stay ahead of the competition,” said Robert Faletra, CEO of The Channel Company, publisher of CRN. “We congratulate 2014’s Emerging Vendors for creating the next wave of technology that will drive the IT industry forward and for opening the door to new, unique solutions from the IT channel.”
"We've seen tremendous interest from security partners in integrating with Lastline to bring enterprise-grade advanced malware protection to their customers," said Brian Laing, Vice President, Product and Business Development at Lastline. "Our channel partners have harnessed considerable revenue growth, security system implementation efficiency and effectiveness as well as c-level customer satisfaction in short order as a result of bringing Lastline into the fold."
Companies included in CRN’s 2014 Emerging Vendors list were founded in 2008 or later and are actively working with channel partners in North America. The list, along with information about each vendor, will be published in CRN’s August 2014 issue and will also be available online at www.crn.com.
About Lastline, Inc.
Lastline, Inc. provides the best-in-class malware protection platform to detect and stop advanced persistent threats, zero-day exploits and evasive malware. Lastline’s next-generation sandboxing technology inspects common network protocols and files to identify and stop advanced threats that bypass traditional signature-based systems, while remaining invisible to the malware itself by using full-system emulation. The Lastline software platform makes it highly efficient and cost-effective to protect large, distributed organizations on existing hardware and in the cloud. Headquartered in Redwood City, Calif. with offices throughout North America, Europe and Asia, Lastline was founded in 2011 by world-renowned security researchers and the creators of Anubis and Wepawet – malware analysis tools used by thousands of security providers, Global 2000 companies and government agencies worldwide. To learn more, visit www.lastline.com.
About The Channel Company
The Channel Company is the channel community's trusted authority for growth and innovation, with established brands including CRN, XChange Events, IPED, and SharedVue. For more than three decades, we have leveraged our proven and leading-edge platforms to deliver prescriptive sales and marketing solutions for the technology channel. The Channel Company provides Communication, Recruitment, Engagement, Enablement, Demand Generation and Intelligence services to drive technology partnerships. Learn more at www.thechannelcompany.com.
Many private cloud projects were built to deliver self-service access to development and test resources. While those clouds delivered faster access to resources, they lacked visibility, control and security needed for production deployments. In their session at 18th Cloud Expo, Steve Anderson, Product Manager at BMC Software, and Rick Lefort, Principal Technical Marketing Consultant at BMC Software, will discuss how a cloud designed for production operations not only helps accelerate developer...
May. 4, 2016 06:00 AM EDT Reads: 1,240
trust and privacy in their ecosystem. Assurance and protection of device identity, secure data encryption and authentication are the key security challenges organizations are trying to address when integrating IoT devices. This holds true for IoT applications in a wide range of industries, for example, healthcare, consumer devices, and manufacturing. In his session at @ThingsExpo, Lancen LaChance, vice president of product management, IoT solutions at GlobalSign, will teach IoT developers how t...
May. 4, 2016 05:30 AM EDT Reads: 359
The IETF draft standard for M2M certificates is a security solution specifically designed for the demanding needs of IoT/M2M applications. In his session at @ThingsExpo, Brian Romansky, VP of Strategic Technology at TrustPoint Innovation, will explain how M2M certificates can efficiently enable confidentiality, integrity, and authenticity on highly constrained devices.
May. 4, 2016 05:00 AM EDT Reads: 1,222
Manufacturers are embracing the Industrial Internet the same way consumers are leveraging Fitbits – to improve overall health and wellness. Both can provide consistent measurement, visibility, and suggest performance improvements customized to help reach goals. Fitbit users can view real-time data and make adjustments to increase their activity. In his session at @ThingsExpo, Mark Bernardo Professional Services Leader, Americas, at GE Digital, will discuss how leveraging the Industrial Interne...
May. 4, 2016 04:45 AM EDT Reads: 1,322
There is an ever-growing explosion of new devices that are connected to the Internet using “cloud” solutions. This rapid growth is creating a massive new demand for efficient access to data. And it’s not just about connecting to that data anymore. This new demand is bringing new issues and challenges and it is important for companies to scale for the coming growth. And with that scaling comes the need for greater security, gathering and data analysis, storage, connectivity and, of course, the...
May. 4, 2016 03:30 AM EDT Reads: 1,157
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 4, 2016 03:00 AM EDT Reads: 795
Redis is not only the fastest database, but it has become the most popular among the new wave of applications running in containers. Redis speeds up just about every data interaction between your users or operational systems. In his session at 18th Cloud Expo, Dave Nielsen, Developer Relations at Redis Labs, will shares the functions and data structures used to solve everyday use cases that are driving Redis' popularity.
May. 4, 2016 12:45 AM EDT Reads: 1,183
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, will show how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningfu...
May. 3, 2016 11:45 PM EDT Reads: 1,020
Artificial Intelligence has the potential to massively disrupt IoT. In his session at 18th Cloud Expo, AJ Abdallat, CEO of Beyond AI, will discuss what the five main drivers are in Artificial Intelligence that could shape the future of the Internet of Things. AJ Abdallat is CEO of Beyond AI. He has over 20 years of management experience in the fields of artificial intelligence, sensors, instruments, devices and software for telecommunications, life sciences, environmental monitoring, process...
May. 3, 2016 11:00 PM EDT Reads: 1,260
Increasing IoT connectivity is forcing enterprises to find elegant solutions to organize and visualize all incoming data from these connected devices with re-configurable dashboard widgets to effectively allow rapid decision-making for everything from immediate actions in tactical situations to strategic analysis and reporting. In his session at 18th Cloud Expo, Shikhir Singh, Senior Developer Relations Manager at Sencha, will discuss how to create HTML5 dashboards that interact with IoT devic...
May. 3, 2016 10:00 PM EDT Reads: 1,346
We're entering the post-smartphone era, where wearable gadgets from watches and fitness bands to glasses and health aids will power the next technological revolution. With mass adoption of wearable devices comes a new data ecosystem that must be protected. Wearables open new pathways that facilitate the tracking, sharing and storing of consumers’ personal health, location and daily activity data. Consumers have some idea of the data these devices capture, but most don’t realize how revealing and...
May. 3, 2016 09:45 PM EDT Reads: 370
SYS-CON Events announced today that Ericsson has been named “Gold Sponsor” of SYS-CON's @ThingsExpo, which will take place on June 7-9, 2016, at the Javits Center in New York, New York. Ericsson is a world leader in the rapidly changing environment of communications technology – providing equipment, software and services to enable transformation through mobility. Some 40 percent of global mobile traffic runs through networks we have supplied. More than 1 billion subscribers around the world re...
May. 3, 2016 08:45 PM EDT Reads: 1,289
In the world of DevOps there are ‘known good practices’ – aka ‘patterns’ – and ‘known bad practices’ – aka ‘anti-patterns.' Many of these patterns and anti-patterns have been developed from real world experience, especially by the early adopters of DevOps theory; but many are more feasible in theory than in practice, especially for more recent entrants to the DevOps scene. In this power panel at @DevOpsSummit at 18th Cloud Expo, moderated by DevOps Conference Chair Andi Mann, panelists will dis...
May. 3, 2016 08:45 PM EDT Reads: 990
We’ve worked with dozens of early adopters across numerous industries and will debunk common misperceptions, which starts with understanding that many of the connected products we’ll use over the next 5 years are already products, they’re just not yet connected. With an IoT product, time-in-market provides much more essential feedback than ever before. Innovation comes from what you do with the data that the connected product provides in order to enhance the customer experience and optimize busi...
May. 3, 2016 08:30 PM EDT Reads: 1,225