Corent Attains IBM’s Cloud Specialty Designation

Corent Attains IBM’s Cloud Specialty Designation

Corent Technology has become the first cloud specialty technology provider partner to meet the rigorous certification criteria for the IBM Cloud Specialty designation.  A specialist in SaaS enablement software, Corent Technology, provides a proven and disruptive alternative to the expensive virtualization strategies often used for SaaS deployment.

Corent notes that Qualified Cloud Specialty Partners provide IBM Business Partners and enterprise clients with enabling technologies to help them use the cloud more effectively.

Corent Technology, one of our best IBM cloud partners, has a solution to quickly transform single-tenant software applications into multi-tenant SaaS solutions without rewriting the existing application. If you are dealing with the decision of how to get to a multi-tenant model be sure you talk to them,” according to Mike Riegel, vice president at IBM.

Corent offers a unique Multi-Tenant Server (MTS) that easily plugs into conventional single-tenant software applications to transform them into cloud-ready Multi-tenant SaaS solutions.

This MTS solution can enable the efficient sharing of an application and its database among many customers (tenants). MTS also ensures that customers only have access to their own data and processes. The multi-tenant application resulting from this effort promises to provide significant economies of scale and also enables the vendor to deliver their SaaS solution at a significantly lower cost.

Corent is committed to helping ISVs deliver highly scalable and cost-effective multi-tenant SaaS solutions on IBM infrastructure. We are excited to be the first IBM partner to qualify for this prestigious IBM Cloud Specialty designation,” said Feyzi Fatehi, the CEO of Corent.

The first multi-tenant SaaS application for Home Healthcare running on the IBM SmartCloud will be showcased at the Information On Demand 2011 Conference on October 23-27 in Las Vegas.

Running on Corent’s Multi-Tenant Server platform, this advanced SaaS solution will leverage IBM WebSphere Application Server and DB2 in the IBM SmartCloud.

By Anuradha Shukla

Sorry, comments are closed for this post.

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Maintaining Network Performance And Security In Hybrid Cloud Environments

Maintaining Network Performance And Security In Hybrid Cloud Environments

Hybrid Cloud Environments After several years of steady cloud adoption in the enterprise, an interesting trend has emerged: More companies are retaining their existing, on-premise IT infrastructures while also embracing the latest cloud technologies. In fact, IDC predicts markets for such hybrid cloud environments will grow from the over $25 billion global market we saw…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

Disaster Recovery – A Thing Of The Past!

Disaster Recovery – A Thing Of The Past!

Disaster Recovery  Ok, ok – I understand most of you are saying disaster recovery (DR) is still a critical aspect of running any type of operations. After all – we need to secure our future operations in case of disaster. Sure – that is still the case but things are changing – fast. There are…

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks: The Top 8 According To ENISA

Cloud Security Risks Does cloud security risks ever bother you? It would be weird if it didn’t. Cloud computing has a lot of benefits, but also a lot of risks if done in the wrong way. So what are the most important risks? The European Network Information Security Agency did extensive research on that, and…

3 Keys To Keeping Your Online Data Accessible

3 Keys To Keeping Your Online Data Accessible

Online Data Data storage is often a real headache for businesses. Additionally, the shift to the cloud in response to storage challenges has caused security teams to struggle to reorient, leaving 49 percent of organizations doubting their experts’ ability to adapt. Even so, decision makers should not put off moving from old legacy systems to…