NTT America Demos Cloud Computing Platform at Web 2.0 Expo

NTT America Demos Cloud Computing Platform at Web 2.0 Expo

NTT America will demonstrate its cloud computing platform at the Web 2.0 Expo San Francisco.

Attendees will get a chance to listen to NTT America‘s technical staff who will discuss the company’s hosting, cloud computing, security and colocation offerings. These offerings help businesses to tap the opportunities offered by the rapid growth of new technologies and Web content services.

During this event, CEO of Cloud Approach and cloud security specialist, Eric Greenberg, will give a talk entitled Crack the Code of Cloud Security and Unleash its Power on Tuesday, March 29 from 2:55 – 3:15 PDT in the Solutions Theater in the Expo Hall.

This talk aims to present new techniques for securing the cloud and unleashing its power drawn from extensive in-the-field experience deploying large-scale cloud infrastructure.

NTT America offers the critical infrastructure necessary to meet today’s enterprise hosting requirements. Popular for its ability to rapidly deploy and scale managed hosting servers, the company has built a new foundation of both public and enterprise private cloud computing platforms.

The company is encouraging attendees to stop by the NTT Communications booth #907 on the Expo floor at any point during the conference to learn more about the cloud, security and the Join the Cloud Conversation event NTT America is hosting on March 29th at the Intercontinental Hotel.

The Web 2.0 Expo is an annual multi-track event, which showcases the latest Web 2.0 business models, development paradigms, products, and is explicitly created to address the needs of technical, design, marketing, and business professionals building the next iteration of the Web.

NTT America was in the news recently for announcing that it has become a Diamond Sponsor of NewNOG. This sponsorship will enable the company to increase its presence in and participation with the North American Network Operators Group (NANOG) community.

By Anuradha Shukla

Sorry, comments are closed for this post.

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Moving Your Email To The Cloud? Beware Of Unintentional Data Spoliation!

Cloud Email Migration In today’s litigious society, preserving your company’s data is a must if you (and your legal team) want to avoid hefty fines for data spoliation. But what about when you move to the cloud? Of course, you’ve probably thought of this already. You’ll have a migration strategy in place and you’ll carefully…