Top 25 European Cloud Computing Rising Stars: Zimory

Top 25 European Cloud Computing Rising Stars: Zimory

Berlin-based Zimory GmbH is a cloud start-up, describing its core product as a Carrier Grade Cloud Computing solution suite that delivers end-to-end service for private, public and database cloud. Actually, the company is involved in Cloud Infrastructure as a Service (IaaS) business allowing enterprises to transform corporate virtualized data centers into Cloud Services infrastructure while offering application and data portability.

Their solution offers on-demand scalability, which is not unique in the world of Cloud Computing, but the company utilizes an open and independent technology that is able to connect different  virtualization technologies into one cloud, allowing flexible movement between private and public clouds.

Zimory offers three architecture types for its cloud solution. The first one is called zimory®connect and is designed to be used in cases where a single instance is required in each of the data centers as a local management hub. It provides the most important technological features, allowing customers to self-connect to local resources. The second architecture type is named zimory®host and is deployed in situations where there is a need to connect hosts with open source virtualization technologies to the cloud environment. This solution provides advanced features usually implemented in commercial hypervisors.

The most advanced solution is zimory®manage, which delivers a manual management point for cloud users and provides API interfaces. An advanced feature allows Multiple Cloud Managers to connect to one or more Cloud Connectors, thus a particular users can adjust their user structure, portal and API to meet their specific needs and requirements. Zimory Manage offers extended capability to connect to a single Zimory Connect, which enhances flexibility.

Zimory boasts some unique features of its cloud solution including availability of over 10,000 virtual machines and full personalization. Personalized solutions feature possibility to select a data center that meets the SLA needs of clients.

Zimory Enterprise Cloud allows customers allocate and invoice temporarily available resources allocated to other processes while increasing infrastructure utilization taking advantage of connecting geographically separated data centers into a homogeneous cloud. The company’s technology enables customers to utilize the unused hardware resources and allocate them to other users, hence to charge for their use.

Venture capital investors riding the wave of Cloud Computing spotted Zimory in October 2010, and the company secured EUR 4 million Euro in a funding round led by Creathor Venture, High-Tech Gruenderfonds and VC Fonds Technologie Berlin, managed by IBB Beteiligungsgesellschaft, T-Venture and KFW. Following the funding, Ruediger Baumann was appointed as the new CEO of Zimory with the goal to further expand the company’s market positions.

“Baumann is the perfect complement to the technical expertise we have at Zimory and joins the company at the right moment to help Zimory expand its sales and marketing efforts,” Maximilian Ahrens, CPO & Founder of Zimory, commented in a press release.

Investors were encouraged by the growing market for Cloud Computing services and saw some unique competitive advantages in Zimory’s cloud solution, according to Christian Stein, Investment Manager with Creathor Venture.

We are very excited to invest in Zimory as the European player in the promising cloud computing software market. Zimory shows tremendous potential, especially with respect to its database virtualization technology which will put it well ahead of its competitors,” he said.

In January 2001, the company signed a 5-year strategic agreement with T-Systems to provide Cloud Infrastructure as a Service (IaaS), confirming its market expansion plans encouraged by its first round of funding. The company faces strong competition from well-established market players and will inevitably apply even more innovative approaches to attract customers in a fast developing market. In fact, Zimory is a spin-off of Deutsche Telekom Laboratories which, in short, means the start-up should possess technological ability to offer innovative solutions. In a fast paced Cloud Computing market, however, corporate business model is also important, and Zimory looks like a company which realizes the importance of business models very well.

By Kiril Kirilov

Sorry, comments are closed for this post.

Comic
Cukes and the Cloud

Cukes and the Cloud

The Cloud, through bringing vast processing power to bear inexpensively, is enabling artificial intelligence. But, don’t think Skynet and the Terminator. Think cucumbers! Artificial Intelligence (A.I.) conjures up the images of vast cool intellects bent on our destruction or at best ignoring us the way we ignore ants. Reality is a lot different and much…

Ransomware’s Great Lessons

Ransomware’s Great Lessons

Ransomware The vision is chilling. It’s another busy day. An employee arrives and logs on to the network only to be confronted by a locked screen displaying a simple message: “Your files have been captured and encrypted. To release them, you must pay.” Ransomware has grown recently to become one of the primary threats to…

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Taking the Technology Industry by Storm

InformationWeek Reveals Top 125 Vendors Five-part series details companies to watch across five essential technology sectors SAN FRANCISCO, Sept. 27, 2016 /PRNewswire/ — InformationWeek released its list of “125 Vendors to Watch” in 2017. Selected by InformationWeek’s expert editorial team, the companies listed fall into one of five key themes: infrastructure, security, cloud, data management and…

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Part 1 – Connected Vehicles: Paving The Way For IoT On Wheels

Connected Vehicles From cars to combines, the IoT market potential of connected vehicles is so expansive that it will even eclipse that of the mobile phone. Connected personal vehicles will be the final link in a fully connected IoT ecosystem. This is an incredibly important moment to capitalize on given how much time people spend…

Embedded Sensors and the Wearable Personal Cloud

Embedded Sensors and the Wearable Personal Cloud

The Wearable Personal Cloud Wearable tech is one avenue of technology that’s encouraging cloud connections and getting us all onto interconnected networks, and with the continued miniaturization and advancement of computing the types of wearable tech are always expanding and providing us with new opportunities. A few years ago, smartwatches were rather clunky devices with…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…

Are Cloud Solutions Secure Enough Out-of-the-box?

Are Cloud Solutions Secure Enough Out-of-the-box?

Out-of-the-box Cloud Solutions Although people may argue that data is not safe in the Cloud because using cloud infrastructure requires trusting another party to look after mission critical data, cloud services actually are more secure than legacy systems. In fact, a recent study on the state of cloud security in the enterprise market revealed that…

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

LAVABIT, EDWARD SNOWDEN, AND THE LEGAL BATTLE FOR PRIVACY

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Are CEO’s Missing Out On Big Data’s Big Picture?

Are CEO’s Missing Out On Big Data’s Big Picture?

Big Data’s Big Picture Big data allows marketing and production strategists to see where their efforts are succeeding and where they need some work. With big data analytics, every move you make for your company can be backed by data and analytics. While every business venture involves some level of risk, with big data, that risk…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications In A Hybrid Cloud Environment

Protecting Your Web Applications It’s no secret that organizations are embracing the cloud and all the benefits that it entails. Whether its cost savings, increased flexibility or enhanced productivity – businesses around the world are leveraging the cloud to scale their business and better serve their customers. They are using a variety of cloud solutions…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

The Questions of Privacy In The Internet of Things Revolution

The Questions of Privacy In The Internet of Things Revolution

Privacy in the Internet of Things Revolution The Internet of Things (IoT) has been promising a lot to consumers for a few years and now we’re really starting to see some of the big ideas come to fruition, which means an ever-growing conversation around data security and privacy. Big data comes with big responsibilities and…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…