Welcome!

API Journal Authors: Liz McMillan, Elizabeth White, Rishi Bhargava, Pat Romanski, Kevin Benedict

News Feed Item

HOB Presents Intelligent Remote Access Solutions at the IDC IT Security Roadshow in Prague

On March 13, 2014 the IDC IT Security Roadshow in Prague opens its doors once again. The IDC Event offers an excellent information and exchange platform for new trends and technologies in IT security. It is important to strengthen the awareness for IT security, especially in this day and age. This is because cybercrime is becoming more and more intelligent and economic espionage prevails worldwide. As a leading IT security expert, HOB is in on the action as a Silver Sponsor for the IDC IT Security Roadshow. HOB presents thereby the latest IT security trends as well as its Common Criteria EAL 4+ certified solutions.

IDC Symposium: IT Security from A to Z

According to the theme "Securing Your Business in a World of Risk" , the IDC IT Security Roadshow 2014 will visit many major cities in Central and Eastern Europe, the Middle East and Africa from February until September 2014. The roadshow will visit the National Museum in Prague on March 13, 2014. The event will give visitors fresh impetus in the areas of cyber security, IT security management, management of BYOD risks, privacy/data security and much more. Many opportunities for networking, discussions and exchange of experiences will also be offered.

Highly secure remote access solutions from HOB

HOB will be presenting smart IT security solutions for secure remote access with all types of devices on a variety of target systems at the IDC IT Security Roadshow. From the IT security perspective, HOB solutions provide maximum protection for data communications. They provide the right security concept for all business situations whether at the home office or while on the go. With the core product HOB RD VPN, users can easily and securely access centralized corporate resources at any time and from anywhere in the world. What is even better is that no data is ever stored on the mobile device. Even if the device is lost, no sensitive company information can be compromised. This is a great advantage especially in the mobile era. HOB secure remote access solutions use the most advanced encryption and authentication methods for user identification. In addition, HOB RD VPN recently received a Common Criteria certification with the security level EAL 4 +.

The presentation from Mr. Frank Wittmann, HOB Account Manager, on "Secure Remote Access to Central Company Resources" will offer even more insight in IT security. The presentation will take place on March 13 at 2:50 PM, in the breakout session area of the IDC IT Security Roadshow Prague. There, Mr. Wittmann will present a comprehensive overview of the new mobility trends and discuss solutions, such as remote access solutions ensuring the security of corporate data. The HOB expert team is pleased to present its solutions to visitors and functionalities in live demos. As an IT security expert, HOB strives to guarantee its customers that their corporate resources are always highly protected. Therefore, HOB stays true to the motto: Your Knowledge, Your People, Your Future!

Always Up-to-Date in Terms of Remote Access and IT Security

With additional information and news online, HOB offers many opportunities to stay up-to-date. Find information on secure remote access, mobile working, cloud computing and IT security on the HOB Trendtalk Blog, on Google+ and Facebook. For videos, check out our YouTube channel. And if time is short, there is always the latest news on Twitter. And have a look at our Slideshare channel, with interesting information all about remote access and IT security.

About HOB

HOB GmbH & Co. KG is a German medium-sized company, developing innovative and multiply rewarded software solutions that are marketed worldwide. The core competencies of the successful company HOB, founded in 1964, comprise server-based computing, secure remote access, VoIP and virtualization. HOB products are deployed in small, mid-sized and large enterprises. Further, some HOB products are certified according to Common Criteria. HOB remote access solutions received the quality mark from TeleTrust “IT Security Made in Germany.”

More Stories By Business Wire

Copyright © 2009 Business Wire. All rights reserved. Republication or redistribution of Business Wire content is expressly prohibited without the prior written consent of Business Wire. Business Wire shall not be liable for any errors or delays in the content, or for any actions taken in reliance thereon.

@ThingsExpo Stories
Fifty billion connected devices and still no winning protocols standards. HTTP, WebSockets, MQTT, and CoAP seem to be leading in the IoT protocol race at the moment but many more protocols are getting introduced on a regular basis. Each protocol has its pros and cons depending on the nature of the communications. Does there really need to be only one protocol to rule them all? Of course not. In his session at @ThingsExpo, Chris Matthieu, co-founder and CTO of Octoblu, walk you through how Oct...
As ridesharing competitors and enhanced services increase, notable changes are occurring in the transportation model. Despite the cost-effective means and flexibility of ridesharing, both drivers and users will need to be aware of the connected environment and how it will impact the ridesharing experience. In his session at @ThingsExpo, Timothy Evavold, Executive Director Automotive at Covisint, will discuss key challenges and solutions to powering a ride sharing and/or multimodal model in the a...
"My role is working with customers, helping them go through this digital transformation. I spend a lot of time talking to banks, big industries, manufacturers working through how they are integrating and transforming their IT platforms and moving them forward," explained William Morrish, General Manager Product Sales at Interoute, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
According to Forrester Research, every business will become either a digital predator or digital prey by 2020. To avoid demise, organizations must rapidly create new sources of value in their end-to-end customer experiences. True digital predators also must break down information and process silos and extend digital transformation initiatives to empower employees with the digital resources needed to win, serve, and retain customers.
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea...
IoT is fundamentally transforming the auto industry, turning the vehicle into a hub for connected services, including safety, infotainment and usage-based insurance. Auto manufacturers – and businesses across all verticals – have built an entire ecosystem around the Connected Car, creating new customer touch points and revenue streams. In his session at @ThingsExpo, Macario Namie, Head of IoT Strategy at Cisco Jasper, will share real-world examples of how IoT transforms the car from a static p...
Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is expected in the amount of information being processed, managed, analyzed, and acted upon by enterprise IT. This amazing is not part of some distant future - it is happening today. One report shows a 650% increase in enterprise data by 2020. Other estimates are even higher....
From wearable activity trackers to fantasy e-sports, data and technology are transforming the way athletes train for the game and fans engage with their teams. In his session at @ThingsExpo, will present key data findings from leading sports organizations San Francisco 49ers, Orlando Magic NBA team. By utilizing data analytics these sports orgs have recognized new revenue streams, doubled its fan base and streamlined costs at its stadiums. John Paul is the CEO and Founder of VenueNext. Prior ...
One of biggest questions about Big Data is “How do we harness all that information for business use quickly and effectively?” Geographic Information Systems (GIS) or spatial technology is about more than making maps, but adding critical context and meaning to data of all types, coming from all different channels – even sensors. In his session at @ThingsExpo, William (Bill) Meehan, director of utility solutions for Esri, will take a closer look at the current state of spatial technology and ar...
The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d...
What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ...
Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
What are the new priorities for the connected business? First: businesses need to think differently about the types of connections they will need to make – these span well beyond the traditional app to app into more modern forms of integration including SaaS integrations, mobile integrations, APIs, device integration and Big Data integration. It’s important these are unified together vs. doing them all piecemeal. Second, these types of connections need to be simple to design, adapt and configure...
Digital innovation is the next big wave of business transformation based on digital technologies of which IoT and Big Data are key components, For example: Business boundary innovation is a challenge to excavate third-party business value using IoT and BigData, like Nest Business structure innovation may propose re-building business structure from scratch, as Uber does in the taxicab industry The social model innovation is also a big challenge to the new social architecture with the design fr...
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
Data is an unusual currency; it is not restricted by the same transactional limitations as money or people. In fact, the more that you leverage your data across multiple business use cases, the more valuable it becomes to the organization. And the same can be said about the organization’s analytics. In his session at 19th Cloud Expo, Bill Schmarzo, CTO for the Big Data Practice at EMC, will introduce a methodology for capturing, enriching and sharing data (and analytics) across the organizati...
SYS-CON Events announced today that Bsquare has been named “Silver Sponsor” of SYS-CON's @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. For more than two decades, Bsquare has helped its customers extract business value from a broad array of physical assets by making them intelligent, connecting them, and using the data they generate to optimize business processes.