Cloud Mobile Device Management Company 'Numara' Expands Operations

Company sets up operations in Asia, with an office in Singapore, Atul Sinha to head the Asian Operations, Asia region website launched www.numarasoftware.asia

APAC Head Office, Sydney, Australia December 21, 2011 – Numara® Software, a global leader in service management, endpoint lifecycle management and mobile device management solutions for IT professionals, announced the launch of its operations in the thriving and rapidly evolving Asia market.

As one of the few markets in the world that showed resiliency through the global economic crisis, we see the Asia, and in-fact entire Asia-Pacific region, as a large growth area for Numara,” said Geoff Masters, Vice President for APAC.  “By strategically expanding our global operations, we are setting the foundation for Numara to be a leader in this significant economic market.”

Atul Sinha, with 25 years of experience in the IT industry, has been appointed head of Asian operations. Based in Singapore, Sinha is responsible for managing customer-driven sales, marketing and partner management.

“I am delighted to have Atul on board to manage our Asian business.  Atul brings to Numara a rich experience and impressive track record having worked previously with IBM and Hewlett Packard.  Atul, along with our partners, will be dedicated to addressing the needs of customers here,” said Masters.

As an integral part of the Asia Pacific growth strategy for the region, Numara will build on its existing partner network and customers. Currently customers and partners participate in key regional markets in Singapore, Malaysia, Indonesia, Hong Kong, Taiwan, China and India with expansion planned for Vietnam, Philippines, Thailand and other regional markets.

Ken Sng, founder and managing director, Inoks, Numara Value Added Partner: “We have been a partner of Numara in the region for over six years and their announcement of Atul Sinha’s appointment and solid cloud strategy are indicative of the potential we see in the region. Cloud mobile device management (MDM) will provide customers more choice in how they adopt and expand the use of IT operations management solutions.”

The Asia market and our customers and partners are extremely important to Numara and a regional presence will ensure that we have the best engagement platform in place to support the growing base of customers and partners,” said Sinha.

To learn more about Numara Software Pty Limited please visit www.numarasoftware.asia

About Numara® Software Incorporated

Founded in 1991, Numara® Software is a leading global provider of integrated IT Operations Management solutions. Numara’s family of integrated products solve Endpoint Lifecycle Management, Mobile Device Management, Help Desk and Service Desk challenges for physical, virtual and mobile devices. All products are designed to simplify and optimize IT Operations Management. Numara’s product families include:  Numara® Cloud, a family of cloud based solutions; Numara® Footprints®, a family of on-premise solutions, and Numara® Track-It!®,an IT Help Desk and Inventory solution. Numara Software collectively supports more than 50,000 customer sites, over 280,000 users and nearly 20 million IT assets worldwide.

About CloudTweaks

Established in 2009, CloudTweaks is recognized as one of the leading authorities in connected technology information and services.

We embrace and instill thought leadership insights, relevant and timely news related stories, unbiased benchmark reporting as well as offer green/cleantech learning and consultive services around the world.

Our vision is to create awareness and to help find innovative ways to connect our planet in a positive eco-friendly manner.

In the meantime, you may connect with CloudTweaks by following and sharing our resources.

View All Articles

Sorry, comments are closed for this post.

Comics
Cyber Security: McAfee on IoT Threats and Autonomous Cars

Cyber Security: McAfee on IoT Threats and Autonomous Cars

IoT Threats and Autonomous Cars Autonomous cars are just around the corner, there have been controversies surrounding their safety, and a few doubts still hang in the minds of people who don’t like the idea of a computer driving their car. However, the biggest news stories surrounding this topic have been to do with how…

Your Biggest Data Security Threat Could Be….

Your Biggest Data Security Threat Could Be….

Paying Attention To Data Security Your biggest data security threat could be sitting next to you… Data security is a big concern for businesses. The repercussions of a data security breach ranges from embarrassment, to costly lawsuits and clean-up jobs – particularly when confidential client information is involved. But although more and more businesses are…

Data Breaches: Incident Response Planning – Part 1

Data Breaches: Incident Response Planning – Part 1

Incident Response Planning – Part 1 The topic of cybersecurity has become part of the boardroom agendas in the last couple of years, and not surprisingly — these days, it’s almost impossible to read news headlines without noticing yet another story about a data breach. As cybersecurity shifts from being a strictly IT issue to…

Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Password Challenges  Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why it’s time the industry embraced more advanced identity-centric solutions that improve the customer experience while also providing stronger security. Since the beginning of logins, consumers have used a simple username and password to…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…

Cloud Services Providers – Learning To Keep The Lights On

Cloud Services Providers – Learning To Keep The Lights On

The True Meaning of Availability What is real availability? In our line of work, cloud service providers approach availability from the inside out. And in many cases, some never make it past their own front door given how challenging it is to keep the lights on at home let alone factors that are out of…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Beacons Flopped, But They’re About to Flourish in the Future

Beacons Flopped, But They’re About to Flourish in the Future

Cloud Beacons Flying High When Apple debuted cloud beacons in 2013, analysts predicted 250 million devices capable of serving as iBeacons would be found in the wild within weeks. A few months later, estimates put the figure at just 64,000, with 15 percent confined to Apple stores. Beacons didn’t proliferate as expected, but a few…

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Technology Influencer in Chief: 5 Steps to Success for Today’s CMOs

Success for Today’s CMOs Being a CMO is an exhilarating experience – it’s a lot like running a triathlon and then following it with a base jump. Not only do you play an active role in building a company and brand, but the decisions you make have direct impact on the company’s business outcomes for…