CA Technologies Powers Squiz’s Cloud Computing Platform

CA Technologies Powers Squiz’s Cloud Computing Platform

Australian web solutions provider Squiz will use CA 3Tera AppLogic software as its cloud computing platform.

Squiz delivers on-demand web services via a global network of local offices responding to local client needs. It is leveraging CA’s solution to deliver its product suite to customers in a software-as-a-service (SaaS) offering.  The scalable and highly available CA 3Tera AppLogic-based cloud environments allow customers to perform several tasks such as building, managing, and delivering customized sites.

The CA 3Tera AppLogic platform is widely deployed and currently used by managed service providers (MSPs) and innovative enterprises as the foundation for their cloud computing offerings.
Customers depend on this offering to develop cloud infrastructure in real time. The quick development, deployment and management of complex online applications not only cuts time-to-market for new business services but also increases margin.

For some time Squiz has been seeking a product that can streamline the deployment process without sacrificing redundancy and high availability”, said John Paul Syriatowicz, managing director, Squiz Pty. “Cloud delivery with the CA 3Tera AppLogic platform is scalable and affordable, providing global users with secure and reliable access to our applications while helping our customers contain costs.”

Cloud computing is changing the way IT delivers services to business users and understanding this, CA Technologies is committed to helping organizations keep pace,” said Brenton Smith, vice president & general manager, CA Technologies Australia & New Zealand said this partnership demonstrates the company’s position as a cloud enabler. “The success we’ve had in implementing CA 3Tera AppLogic software for Squiz is a great example of how our cloud platform is helping change the way organizations bring their services to market.”

By Anuradha Shukla

Sorry, comments are closed for this post.

Connecting With Customers In The Cloud

Connecting With Customers In The Cloud

Customers in the Cloud Global enterprises in every industry are increasingly turning to cloud-based innovators like Salesforce, ServiceNow, WorkDay and Aria, to handle critical systems like billing, IT services, HCM and CRM. One need look no further than Salesforce’s and Amazon’s most recent earnings report, to see this indeed is not a passing fad, but…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…