Cloud Mobile Device Management Company 'Numara' Expands Operations

Company sets up operations in Asia, with an office in Singapore, Atul Sinha to head the Asian Operations, Asia region website launched www.numarasoftware.asia

APAC Head Office, Sydney, Australia December 21, 2011 – Numara® Software, a global leader in service management, endpoint lifecycle management and mobile device management solutions for IT professionals, announced the launch of its operations in the thriving and rapidly evolving Asia market.

As one of the few markets in the world that showed resiliency through the global economic crisis, we see the Asia, and in-fact entire Asia-Pacific region, as a large growth area for Numara,” said Geoff Masters, Vice President for APAC.  “By strategically expanding our global operations, we are setting the foundation for Numara to be a leader in this significant economic market.”

Atul Sinha, with 25 years of experience in the IT industry, has been appointed head of Asian operations. Based in Singapore, Sinha is responsible for managing customer-driven sales, marketing and partner management.

“I am delighted to have Atul on board to manage our Asian business.  Atul brings to Numara a rich experience and impressive track record having worked previously with IBM and Hewlett Packard.  Atul, along with our partners, will be dedicated to addressing the needs of customers here,” said Masters.

As an integral part of the Asia Pacific growth strategy for the region, Numara will build on its existing partner network and customers. Currently customers and partners participate in key regional markets in Singapore, Malaysia, Indonesia, Hong Kong, Taiwan, China and India with expansion planned for Vietnam, Philippines, Thailand and other regional markets.

Ken Sng, founder and managing director, Inoks, Numara Value Added Partner: “We have been a partner of Numara in the region for over six years and their announcement of Atul Sinha’s appointment and solid cloud strategy are indicative of the potential we see in the region. Cloud mobile device management (MDM) will provide customers more choice in how they adopt and expand the use of IT operations management solutions.”

The Asia market and our customers and partners are extremely important to Numara and a regional presence will ensure that we have the best engagement platform in place to support the growing base of customers and partners,” said Sinha.

To learn more about Numara Software Pty Limited please visit www.numarasoftware.asia

About Numara® Software Incorporated

Founded in 1991, Numara® Software is a leading global provider of integrated IT Operations Management solutions. Numara’s family of integrated products solve Endpoint Lifecycle Management, Mobile Device Management, Help Desk and Service Desk challenges for physical, virtual and mobile devices. All products are designed to simplify and optimize IT Operations Management. Numara’s product families include:  Numara® Cloud, a family of cloud based solutions; Numara® Footprints®, a family of on-premise solutions, and Numara® Track-It!®,an IT Help Desk and Inventory solution. Numara Software collectively supports more than 50,000 customer sites, over 280,000 users and nearly 20 million IT assets worldwide.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Basic Cloud Risk Assessment Tips

Basic Cloud Risk Assessment Tips

Basic Cloud Risk Assessment You should worry about the risks of cloud computing. But don’t get too scared. With a few simple steps you can easily get a basic understanding of your risks in the cloud and even have a good start in managing these risks. If you are a large corporation in a regulated…

Working With Hybrid And Multiclouds: Use Cases For Multicloud Computing

Working With Hybrid And Multiclouds: Use Cases For Multicloud Computing

Working with Hybrid and Multiclouds A multicloud strategy can deliver real gains in IT flexibility, cost savings, and can increase an organization’s responsiveness to changes in the market or internal developments in the business itself. But the migration of apps and services to a multicloud system isn’t without its challenges. Most IT managers I talk…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

How Your Business Can Overcome Its Fear of BYOD

How Your Business Can Overcome Its Fear of BYOD

Overcoming BYOD Fear While the popularity of the remote workforce has been on the rise, more and more people are returning to the office to work out of fear that their business data isn’t secure, according to a Neustar report. A whopping 83 percent of respondents are worried about the security of their files, and 27…

Immune Systems: Information Security And Risk In 2016

Immune Systems: Information Security And Risk In 2016

Information Security And Risk C-suite executives have woken up to the threat posed by data theft, denial-of-service attacks and vulnerable systems. In 2015, for example, a series of high-profile cases illustrated the degree to which such attacks can damage a company’s reputation, brand and, ultimately, profits. Where businesses once undervalued cybersecurity, considering it the domain of CIOs and…

3 Considerations To Help Businesses Navigate Cloud Implementation

3 Considerations To Help Businesses Navigate Cloud Implementation

Cloud Implementation Cloud computing technology has improved significantly in the past year, making it an appealing tool for businesses of all sizes. Cloud computing can benefit businesses in many ways, from cutting costs, to increasing business efficiency, to guaranteeing data recovery in case of an accident. In fact, 47 percent of medium and large enterprises…

CloudTweaks is recognized as one of the leading influencers in cloud computing, infosec, big data and the internet of things (IoT) information. Our goal is to continue to build our growing information portal by providing the best in-depth articles, interviews, event listings, whitepapers, infographics and much more.

Advertising