Top 25 European Cloud Computing Rising Stars: Cloudmore

Top 25 European Cloud Computing Rising Stars: Cloudmore

Headed by Michael Wicander, who co-founded Cloudmore in 2004, the Swedish company managed to establish itself as one of the leading providers of cloud services in Europe in less than a decade. Headquartered in Stockholm, the company has particularly strong positions in the Nordic markets as well as in the United Kingdom and Ireland. It benefited from the booming Software as a Service (SaaS) market, starting its operations on time to be able to ride the first wave of cloud-based services in a relatively underdeveloped market niche (at that time). At present, it is among the fastest growing cloud service providers in Europe and we can expect overseas expansion soon as a natural move to set foot in new markets.

Cloudmore offers a white labeled service and boasts no minimum commitments or restrictive contracts. A major characteristic of its business model, however, is that the company’s services are available only through an extended network of resellers, which is constantly growing. At present, more than 700 resellers offer Cloudmore’s services while over 60,000 users worldwide are using their system.

The company provides various services including hosted dynamics CRM, Sharepoint services WSS, Virtual Private Cloud (VPC), F-Secure PSB, Connected PC backup, LiveVault server backup, MXSweep email security, hosted DNS services, hosted FTP site, Cryptzone and recently added Soonr Workplace.

Their Virtual Private Cloud Service (VPC Service) is designed to offer new scenarios to utilize virtual servers in a real production environment, the company explains, adding that the service is a significant advancement over standard virtual servers (VPS) accessed over the internet. Its VPC solution enables companies to connect locally installed and remote applications utilizing centralized management, reducing hardware and management costs.

On the security front, the company offers F-Secure Protection Service for Business aimed at small and medium-sized enterprises, which provides workstation and server security backed by F-Secure. E-mail and server security is also integrated in Cloudmore’s cloud-based solutions. The entire security solution is part of the company’s Cloud Services Subscription (CSUB) offerings – CSUB Personal and .CSUB Group.

Communication and collaboration solutions feature hosted exchange, hosted SharePoint, FTP file share as well security and backup functionality. Additional services include Iron Mountain digital server backup and Iron Mountain connected desktop backup complemented by F-Secure – server  security and F-Secure desktop security. E-mail protection is secured by MX Sweep while Cryptzone provides email, USB and laptop protection.

Cloudmore’s application package comprises hosted CRM, Soonr backup and collaboration, IT service, virtual private cloud, virtual servers, hosted DNS Services and Cloud Services Subscription (CSUB).

Such a wide spectrum of cloud services boosted company’s growth during with Cloudmore reporting average service growth of 15 percent in the twelve months ending in April 2009. The company managed to build large reseller networks in Sweden, Norway, Finland, Denmark, Ireland and Great Britain.

In January 2011, the company announced partnership with U.S.-based Soonr to offer its Soonr Workplace solution, providing team collaboration and sharing capabilities in the cloud through its data centers within the EU.
Cloudmore’s solution is not unique in the SaaS market, really, but entrepreneurs can learn from  Michael Wicander’s business and marketing model that relies on an extended network of resellers. The company did not reach its full potential in the field of cloud services but can be a leading market player despite the fierce competition from peers in Europe and the United States.

By Kiril Kirilov

Sorry, comments are closed for this post.

Comics
Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

The Cancer Moonshot: Collaboration Is Key

The Cancer Moonshot: Collaboration Is Key

Cancer Moonshot In his final State of the Union address in January 2016, President Obama announced a new American “moonshot” effort: finding a cure for cancer. The term “moonshot” comes from one of America’s greatest achievements, the moon landing. If the scientific community can achieve that kind of feat, then surely it can rally around…

Digital Twin And The End Of The Dreaded Product Recall

Digital Twin And The End Of The Dreaded Product Recall

The Digital Twin  How smart factories and connected assets in the emerging Industrial IoT era along with the automation of machine learning and advancement of artificial intelligence can dramatically change the manufacturing process and put an end to the dreaded product recalls in the future. In recent news, Samsung Electronics Co. has initiated a global…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Three Factors For Choosing Your Long-term Cloud Strategy

Three Factors For Choosing Your Long-term Cloud Strategy

Choosing Your Long-term Cloud Strategy A few weeks ago I visited the global headquarters of a large multi-national company to discuss cloud strategy with the CIO. I arrived 30 minutes early and took a tour of the area where the marketing team showcased their award winning brands. I was impressed by the digital marketing strategy…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…