Meru Networks Announces Meru Xpress Cloud, Cloud-Managed Wi-Fi For SMBs

Meru Networks today announces the Meru Xpress Cloud, a Wi-FI solution that delivers enterprise-grade Wi-Fi to small to medium-size businesses that grapple with the challenges posed by the proliferation of mobile devices in the workplace. Architected using the Meru XP8i access point, the Meru Xpress Cloud boasts enhanced data security by ensuring that all corporate data remains behind the firewall. The Meru Xpress Cloud boasts a degree of operational simplicity that allows office staff with little to no specific IT expertise to deploy the Meru wireless solution alongside high performance, scalability, redundancy and security. Monetized by way of a subscription or a resale pricing model, the Meru Xpress Cloud competes with the likes of Cisco and Aruba by targeting SMB customers that have less upfront capital to invest in cloud-managed Wi-Fi and more operational capital to support deployment, operation and support of a long-term solution. Today’s announcement highlights yet another use case for cloud-based infrastructures in the form of cloud-managed Wi-Fi for SMBs that require enterprise-grade scalability and high performance in a technology environment characterized by the radical prolixity and explosive growth of end user devices that need to connect to Wi-Fi networks.

Kaseya Releases Version 9 of Its Enterprise Mobility Management Platform At A Disruptive Pricepoint

IT management provider Kaseya today announced the launch of Release 9 of its Enterprise Mobility Management (EMM) platform for mobile devices and their attendant applications. EMM delivers a suite of products and services that help small to midsize business tackle the challenge of managing the proliferation of devices used within their IT infrastructures. More specifically, EMM integrates bring you own device (BYOD) management, mobile device management and mobile application management capabilities in a way that empowers IT administrators to manage devices, applications and their associated policies and procedures by means of one application. Kaseya’s EMM platform boasts rapid onboarding of devices in conjunction with the rapid deployment of policies and procedures for authorizing authentication and access protocols for different devices. The integration of mobile device management with BYOD allows customers to centralize and automate the control of devices such as laptops, PCs, servers and smartphones within the purview of their network infrastructure. Importantly, Release 9 introduces Kaseya’s private cloud as the foundational infrastructure for EMM, thereby giving customers the elasticity, scalability, redundancy, failover and unified security specific to well architected cloud infrastructures. Launched at a disruptive price point based on a monthly fee per user as opposed to per device, Release 9 of Kaseya’s Enterprise Mobility Management platform promises to consolidate Kaseya’s market positioning within the IT management landscape for SMBs by delivering enhanced operational simplicity for device and application management in addition to attractive pricing that leverages Kaseya’s newly introduced private cloud. Founded in 2000, Kaseya serves over 10,000 customers in 20 countries.

Amazon Promises To Detail “Other” Category In Earnings Reports And Reveal AWS Earnings Later In 2015

Today, in its fourth quarter earnings call, Amazon announced that Amazon Web Services claims more than one million active customers featuring year over year usage growth of the AWS platform by 90%. Moreover, in 2014, AWS rolled out 515 feature and service releases, or 80% more than the previous year. The most recent quarter also featured the release of AWS Lambda, a service that runs code in response to events driven by Amazon S3, Amazon Kinesis, and Amazon DynamoDB. During the same period, AWS also announced the Amazon EC2 Container Service and Amazon Aurora, a MySQL-compatible relational database for Amazon RDS that boasts performance improvements over MySQL by a factor as much as five at a price point of one tenth of the cost of commercial relational database products. Importantly, Amazon announced that it will finally reveal details of AWS earnings later in 2015, which are currently bucketed into the “Other” category in Amazon’s earnings reports and subsequently leave the exact figure open to endless amounts of analyst speculation and inference. Revenue in Amazon’s “Other” category for the most recent quarter was $1.67B, although that figure includes advertising and credit-card related revenues.

Tips For Protecting Data Privacy And Security From Mitch Coopet, CTO & Co-founder Of Code42

In celebration of Data Privacy Day, Cloud Computing Today spoke to Mitch Coopet, CTO and cofounder of Code42 regarding data privacy and security tips for IT managers. To empower employees to work productively in different locations, Coopet remarked on the importance of ensuring that data protection protocols apply to multiple devices and operating systems. Coopet also suggested understanding the volume of unsanctioned apps in an IT environment and revisiting corporate backup policies to ensure data is backed up over a variety of devices such as smartphones, tablets and laptops. Code42 is the company behind the popular endpoint backup service, CrashPlan, whose customers include Expedia, Yelp and P&G as well as Yale and Stanford Universities.

3 Tips For Protecting Data Privacy For IT Managers And Organizations by Mitch Coopet

1, Balance User Productivity with Enterprise IT Needs:

While typically cast in the role of the “enforcer” — or put more bluntly, saying “no” to employee requests for sharing across personal devices and apps — IT actually has an opportunity to help employees increase work productivity now more than ever.  To empower user productivity while maintaining rigorous security standards, data protection policies must support multiple devices and operating systems regardless of physical location. Looking ahead, IT can directly improve productivity and innovation for the enterprise by anticipating how employees will interact with data, particularly on laptops and mobile devices that exist at the edge of the corporate network, as opposed to operating within a traditional data center. Provide secure, easy ways for employees to work on their devices regardless of where they are, and educate them on the productivity tools available to them through IT.

2. Survey Unsanctioned App Usage: With more employees turning to the growing selection of cloud-based apps to get work done faster and on-the-go, it has become increasingly difficult for IT managers to monitor the huge volume of “unsanctioned apps” that live in a given network via their presence on employee-owned devices. According to a report from cloud app security company Netskope, nearly 90 percent of the apps being used at a given company are not formally sanctioned by IT. This underscores a broader trend, and the need for IT to move beyond simply condoning the use of officially sanctioned apps. Put plainly, it’s just not realistic to do anymore. Understanding which apps employees are using to create and access work data is half the battle in developing data management policies that address unsanctioned cloud app usage.

3. Re-think your backup hygiene: According to Forrester’s Forrsights Devices and Security Workforce Survey, over half of employees assume that their companies back up their most important files, whether or not this is the case. The reality is that today with more important work files living on laptops, smartphones and tablets, rather than centralized servers, IT often expects employees to take responsibility for backing up data that is not created or accessed on the network. It comes down to empowering employees to work on-the-go without compromising sensitive company data. One such avenue to ensure this approach is to provide a backup solution that continuously and automatically backs up employees’ endpoint devices and mitigates the risk of a data loss event.

Quantum Announces Three New Solutions To Help Enterprises Leverage Public Cloud For Data Storage, Archival And Protection Use Cases

Quantum today announces three new solutions for its Q-Cloud platform, namely, Q-Cloud Archive, Q-Cloud Vault and Q-Cloud Protect for AWS. Q-Cloud Archive and Q-Cloud Vault are cloud-based storage solutions that allow enterprises to complement on-premise storage infrastructures with the infinite elasticity and scalability of the public cloud. Both the Q-Cloud Archive and Q-Cloud Vault solutions leverage Quantum’s StorNext 5 workflow and data management platform to manage the transfer of data from on-premise storage facilities to public cloud infrastructures by delivering workflows and policies for tiering data to the public cloud. Use cases for Q-Cloud Archive and Q-Cloud Vault involve the storage of massive amounts of digital media, streaming telemetry data or internet of things datasets in addition to disaster recovery and business continuity scenarios. Q-Cloud Archive and Q-Cloud Vault customers enjoy the benefits that automated StorNext-managed workflows deliver regarding which types of data are tiered to the cloud in addition to its ability to tag data for future recovery and retrieval purposes with no additional hardware required. All told, Q-Cloud Archive and Q-Cloud Vault represent yet another example of the recent proliferation of cloud and big data as recently exemplified by Datapipe’s acquisition of GoGrid, a leader in Big Data solutions for the cloud. The innovation of Q-Cloud’s solution consists in its ability to impose a level of intelligent management and tiering of the flow of data to the cloud that grants customers greater control over the archival of massive datasets and positions them to effectively take advantage of the public cloud as an extension of their on-premise infrastructures for backup , storage and data protection use cases. Meanwhile, Quantum’s Q-Cloud Protect for AWS enables customers to replicate data to the AWS cloud for disaster recovery purposes in ways that similarly enhance the ability of customers to leverage the public cloud to tackle the challenge of managing the contemporary proliferation of transactional, operational, financial, strategic and third party data.

Q&A With Frederik Pfisterer, COO of Mambu, Cloud-Based Provider of Banking Technologies and Alexander Chagoubatov, Managing Director of

Mambu is a cloud-based banking platform that empowers banking organizations to deliver banking services such as deposits and loans to their customers. Cloud Computing Today recently had the privilege of speaking with Frederik Pfisterer, COO of Mambu and an executive from one of Mambu’s customers,, about the efficacy of the Mambu platform. Topics discussed included Mambu’s technology platform, data security, business continuity and Mambu’s customer base.

1) Cloud Computing Today: How would you describe the technology stack and platform underpinning your cloud banking platform?

Frederik Pfisterer (Mambu): Mambu is a Software-as-a-Service (SaaS) cloud banking platform that was developed in Java Enterprise and runs on any SQL database through the Amazon public cloud. The platform’s simple, agile architecture requires only a web browser or smartphone and Internet connection to deploy a powerful loan provisioning and management solution.

Alexander Chagoubatov ( also uses Java technology stack in addition to other cutting edge frameworks like Spring. Since the Mambu platform is built on the Java stack as well, this makes the communications around and integration of the project very smooth and enables us to get better overall support from the Mambu team.

2) Cloud Computing Today: How does your platform ensure security and confidentiality of customer data?

Frederik Pfisterer (Mambu): As a multitenant SaaS solution, Mambu takes special efforts to ensure complete data security and confidentiality of customer information. Annual penetration tests from different and independent third parties ensure both compliance with industry best practice and due levels of protection from hacking attempts. All data is stored in Amazon Web Services (AWS) data centers which have strong physical security and industry standards compliance for data protection.

Alexander Chagoubatov ( At, we store all of our customer information in Mambu, which is PCI compliant. For this, our integration hub is on AWS and to Secure Shell (SSH) into it one needs to have a private key in order to ensure security and confidentiality. As an additional measure, all ports except those needed are blocked from public access.

3) Cloud Computing Today: What mechanisms and processes ensure business continuity of the cloud banking platform in the wake of a technical disruption or natural disaster?

Alexander Chagoubatov ( When it comes to the website, we are on an AWS cloud system with an elastic IP (EIP) address. If we experience trouble in one region, this allows us to clone our virtual machine (VM), remap it to another region and point the EIP address to it. In the disaster scenario, a technical disruption might require switching from AWS and spinning up a new VM with a different provider, but there would be little impact on clients.

Frederik Pfisterer (Mambu): Mambu provides multiple levels of protection from a business continuity perspective. Firstly, technology failure risks are mitigated by redundancy within a datacenter and across multiple datacenters. Secondly, business failure risks can be mitigated by escrow agreements and a regulatory compliant contractual framework.

4) Cloud Computing Today: Describe your customer base, its evolution to date and how you envision it progressing over the next year.

Frederik Pfisterer (Mambu): At Mambu’s genesis, our main focus was on providing cloud banking services to microfinance organizations in order support their operations, but over the years we’ve grown our primary global customer base to include online lenders, SME lenders and banks. We’ve begun doing more work in new areas, including the credit union, crowdfunding and P2P lending in which we’ve had great success, so we’re looking at eventually expanding our portfolio size by doing more business with those types of institutions.