The IT Summit was selected as one of the top ten “must-attend” events for CIOs and IT Marketers — April 2013 CTOsOnTheMove.com
Overview
The IT Summit’s EXCLUSIVE Executive Board Luncheon is a CIO advocacy program that provides executives with the medium to make better and faster buying decisions through peer collaboration. Our VIP Executive Board members will enjoy a private plated lunch, during our usual quality conference.
Click Here to contact us if you are interested in joining our Executive Board Click Here to contact us if you are interested in sponsorship opportunities
Scroll to the bottom of this page for directions & parking information
Event Updates and Information
Earn Free CPE Credits at The IT Summit’s Executive Luncehon
The IT Summit offers complimentary certificates of attendance for CPE credits. Continuing professional development or continuing professional education is the means by which people maintain their knowledge and skills related to their professional lives. Upon completion and approval of your registration, we will provide you with information on how you can receive free CPE credits at The IT Summit.
Agenda
10:30 AM – 11:00 AM
Coffee & Networking – Exhibit Room – Crystal Salon A & B
Join us for morning coffee.
Complimentary for all guests.
Accelerating The Journey to IT as a Service (ITaaS) by leveraging Cloud Services Brokerage – Executive Board Theater – Crestone Ballroom (VIP Badges Only)
Your data is your most valuable asset. Can you afford to be without it? Are you prepared in the event of a failure? – Tech Theater II – Aspen Room (All Guests Welcome)
Joel Jensen Data Protection Systems Consultant
Dell Software
From Denver International Airport (DEN): Exit airport by taking Pena Blvd. Follow Pena Blvd and then merge onto I-70 West. I-70 West to I-25 South, Exit 210A Colfax Ave, turn left onto Colfax Avenue. Turn left on Kalamath. Kalamath becomes Stout. Proceed underneath the convention center. Hotel will be on right, just past 14th Street.
From Colorado Springs Municipal Airport (COS): Exit airport by taking Drennan Rd/Milton E Proby Pkwy. Turn right onto S Powers Blvd. Turn left at E Fountain Blvd/US 24 (E Fountain Blvd/US 24 turns into Martin Luther King, Jr. Bypass/US-24). Take I-25 North Exit. Follow I-25 North for approximately 71 miles. Take Exit 210B Colfax Avenue, turn right onto Colfax Avenue. Turn left on Kalamath. Kalamath becomes Stout. Proceed underneath the convention center. Hotel will be on right, just past 14th Street.
From Centennial Airport (APA): Exit airport by taking S. Peoria St to E Broncos Pkwy. Turn left at E Broncos Pkwy, which turns back to S Peoria St. Turn left at E Arapahoe Rd to I-25 North. Take Exit 210B Colfax Ave. Turn right on Colfax Ave. Turn left on Kalamath. Kalamath becomes Stout. Proceed underneath the convention center. Hotel will be on right, just past 14th Street.
Parking
Parking at the Embassy Suites is valet only. You can park at the convention center for $12.00 for 8 hours, or take the light rail for $5.20/day pass. See here for fare pricing. You can also park at the following lots:
Jamie Yancy is VP, IT Manager & Security Officer; Jamie’s professional career might best be described as eclectic. Jamie has worked in the IT industry since 1977 as a communicator for the United States Navy. In 1984 he worked for the Argonne National Laboratory and had a key role the redesign of the USDOE Secure Automated Communications Network (SACNET) Jamie also, participated in the government wide Neutral Particle Beam experiment. He has provided communications support for the National Science Foundation experiments at ANL. Jamie in 1990 and began working with Rockwell International and EG&G providing management of communications at the Rocky Flats Facility Mr. Yancy was a key member of the Rocky flats Leadership academy. He has also served as The Chief Technology Officer for United Western Bancorp. In addition, he Co-Founded a Denver based DSL provider Broadband Solutions and designed and operated the network for a International long distance provider VDC, Built call centers for Teletech. Networks for Matrix Bancorp, Inc. and Legent Clearing and the list. And recently, co-founded Novitious LLC an IT consulting company. Jamie holds a number of certifications including a Certified Information Security Manager (CISM) and is a member of ISACA, ASIS, and ISSA.
Mr. Kundtz is an Associate Partner and Nationally Published Speaker with over three decades of experience as a Management Consultant and Business Development Executive with a focus on Enterprise Hybrid IT Solutions. He is currently responsible for developing and closing large complex solutions across the globe. John teams with experienced IBM Consultants, Architects, and Project Managers who engage directly with our field teams to assist our clients with complex IT Transformation and Optimization engagements. In 2010, John was honored by Northeast Ohio Inside Business Magazine as one of the region’s most influential technology people. Mr. Kundtz has spoken and published on a variety of topics relating to Cloud Services Brokerage, Data Center Optimization, Smarter Data Center, Analytics, as well as Systems Management and Networking. He is well versed in the business and technical issues impacting today’s organizations as they seek to leverage their IT assets for competitive advantage. Follow John on Twitter @jmkundtz or connect on LinkedIn http://www.linkedin.com/in/jkundtz
Our world is changing at the fastest speed we’ve ever seen. We are observing shortened time-to-market of products and services, lower cost of computing and new market entrants that are growing at the highest speed. The most important effect is that we all, as consumers, as citizens, as everyday users of technology are expecting products and services to make our lives more convenient. This is putting great pressure on IT organizations to optimize the IT supply chain. We are all seeking our experiences to be:
+ Easy to use – Simple, intuitive, at our fingertips
+ Personalized – Customizable, constantly learning about us, able to recognize who we are as individuals
+ Empowering – Enabling us to get our tasks done with the fastest speed and accuracy
+ Always on – time-dependent, geo-dependent, device-dependent
In this session you will learn how leveraging a Cloud Services Broker within a Hybrid IT environment, which will be the key to balancing the speed and flexibility that the Lines of Business (LOB)s require while maintaining compliance, security and control for Central IT and position CIO as leader to accelerate innovation for their Enterprise.
Scott is the co-founder and CRO for ReadyTalk, a Cloud Communication Provider that helps companies have more effective meetings and deliver high impact webinars. Scott and his brother Dan launched ReadyTalk in December 2001, and since then Scott has focused on product strategy, sales, marketing and business systems. Scott is motivated to find collaboration solutions. He is at the forefront of leadership around the Future of Work, and committed to championing its principles within ReadyTalk and across industries. Scott earned a Bachelor of Science degree in Electrical Engineering from University of Colorado while attending on a cross country and track scholarship. He has more than 30 years of experience in the communications industry and has led teams at both TellSoft Technologies and Hewlett-Packard’s Telecommunications Systems Business.
Scott continues to be an avid runner, enjoys coaching soccer and frequently rides to work from Boulder to Denver with other cycling enthusiasts from ReadyTalk.
First there were slides and screen projectors. Then came dongles to worry about. Now the organization wants video. If you can’t figure out the right configuration for setup, your meeting isn’t going to start on time. In comes your “IT Guy” to the rescue. IT departments have had to learn and adapt to the ever-changing meeting room. They’ve accommodated new technologies, and found ways to implement them in a secure and efficient manner. But for IT, the cost of inefficient meetings is double. Spending time fighting fires is frustrating, bothersome, and frankly feels like a waste of time. And because they’re fighting fires, they’re NOT spending that time adding real value to the business. Learn how meeting rooms have evolved over time, what a dongle-free future will look like, and how to get there sooner.
The top causes of downtime are everyday events, like power failures and IT hardware failure…not natural disasters. These happen daily, and cause enormous headaches and huge costs for companies of all sizes.
There are 4.6M instances of data loss each year, and an average downtime cost of $5,600 each minute. How confident are you in your strategies and technologies?
SkyTech Data Technologies and Dell will cover key steps to take to ensure your data is backed up properly, and how to develop a solid disaster recovery plan.
Marcus Bronson, Chief Technology Officer/Co-Founder with OuterSafe, as the cybersecurity architect sets the technical plans and direction for 4D security strategies and business across hybrid cloud, on premise and mobile devices using high performance, fault-tolerant, multitenant self-service infrastructure custom designs. Integrating Microsoft, Intel, Forcepoint / Raytheon framework and APIs to address complex business problems specifically for cybersecurity and compliancy using enterprise virtualization, big data, and IoT.
Bronson began software development in collage and then enhanced his skills at Bell Labs and Lucent writing SQL code receiving Best Practices awards. Throughout his career, he refined architectures, AD, Exchange, network security, and web services for the Department of Interior, Fitzsimmons Army Base (Anschutz Medical Center campus). Then as Principal Architect with Invesco’s Ltd. trading division, he secured AD, Exchange, SQL and the high-availability / disaster recovery environments. For the last 15 years, Bronson developed secure multitenant clouds for finance, hospital and legal vertical markets as CTO for ITOnCommand.
Marcus is also the recipient of many achievement awards and a proven ability to build and manage creative, highly energized teams with special attention to mentorship, business charters and customer satisfaction. Delivering Cyber Secure Intellectual Property products, building recurring revenue while reducing the total cost of ownership.
Marcus Bronson, CTO of Outersafe, shares the cyber landscape, evolving security threats and changing computing environment.
Hear insights about the new strategy of products that address the entire threat defense lifecycle with integrated, open security systems. Preview a sampling of innovations from Raytheon/Forcepoint, Intel Security and Barracuda. Next Generation Enterprise Security Management, Compliance, Data Leak Protection and Firewalls that unify and capture existing security investment across all vendors, simplifying enterprise security.
With Next Generation security and compliance, ZERO malware solutions for detection and security management can be effective for external and internal threats. Automatically identify compromises, expedite remediation and provide compliance for enterprise, mobile and cloud safe and connected world.
Defend, Assess and Protect – 4D Integrated Core Security for Endpoint, Mobile, Hybrid and Cloud will address these topics:
– Disrupting Targeted Attacks
– Content Security (Web, Email and Network Security)
– Endpoint Security
– Data and Insider Threat Protection (User Behavior, Forensics, DLP)
– Advanced Threat Research and Intelligence Sharing (Threat sandboxing and server security)
– Securing the Internet of Things
– Data Center and Transformation to Hybrid Cloud
– Detect and Remediate Threats Quickly
– Security Management, Indicators of Compromise and Incident Response
– Security Connected Integration and Orchestration (Threat Intelligence, 3rd party feeds)
– Advanced Analytics and Contextual Decision Making
– Unified Management
We will have extended hours for visitors to interact directly with Security Product Engineers for those would like to have in depth discussion about security.
Please stop by our booth after the seminars.
Chris Rothe leads the engineering needed to bring Red Canary’s endpoint threat detection and response solution to organizations all around the world. Before co-founding Red Canary, Chris led software development teams at Kyrus and architected large data processing systems for the defense and intelligence community at Lockheed Martin.
Brenden Smith is the Director of Security at FirstBank. He has over 10 years of hands on experience in the field, in addition to overseeing the strategy and direction of the Security department. His interests include conducting research on carding forums, black market economies, and all areas of hacking activity. He is also a member of Google’s Hall of Fame for finding two different vulnerabilities in their applications.
Despite decades of practice in information security we see high profile breaches every day typically caused by the exploitation of simple mistakes. It is easy to get caught up in the marketing hype surrounding “next-gen” security products but what do our organizations really need in order to improve their security? There are no silver bullets and not all attacks can be stopped. In order to protect our organizations we need to first be realistic about our current posture, understand the threats that are landing, and identify gaps to be addressed. Many times the answer is a simple policy or network architecture change rather than adding complicated products that do little more than increase the need for security staff. By cutting through the noise and taking an iterative approach to assessing and improving our IT architecture we can give ourselves the best chance of staying out of the headlines.
Gavin McMurdo is the VP Cloud Service Delivery for CenturyLink, in Bellevue, WA. Gavin is an experienced leader who has led diverse, multinational teams of professionals to new levels of success in a variety of highly competitive industries, cutting-edge markets, and fast-paced environments. He brings more than 20 years of hands-on experience in product development, business development, program and product management, and systems engineering.
Previously, he led the teams responsible for Xbox infrastructure, server OS down to the DC. Before moving to Xbox he led an organization responsible for the operations and support of the shared tools and line-of-business applications that used to run the majority of the Microsoft’s customer facing global data centers. He was recruited to Microsoft after spending a number of years with startups in various leadership positions leading both technical and business teams.
In his spare time, Gavin enjoys photography, cycling and sports cars.
Throughout his twenty-year career, Dustin Smith has specialized in designing enterprise architectural solutions. As the Chief Technologist, Dustin is responsible for the strategic direction of aligning the company’s growing consulting services with the client challenges he finds in the field, and he works closely with our partners to uncover new technologies to address these issues.
Successful IT projects need more than luck. Join Advanced Systems Group (ASG) to learn how taking a different approach to evaluating and addressing your IT needs can help you increase the success rate of your IT projects, better align your IT strategy with your business initiatives, and create more value for your organization and end users. This approach, carefully developed throughout hundreds of customer engagements, can ultimately give you the edge you need to reduce risk—and increase the cost-effectiveness and profitability of your IT projects and services.
Jesse Hood, Account Executive for Darktrace in Denver and the Rocky Mtn. territory. Previously helped some of the most rapidly growing start up software companies in the Denver area. Namely, OpenLogic Inc. (aquired by RogueWave), SNARE (intersect alliance), and now with Darktrace. Aside from business development for emerging cyber security companies Jesse also volunteers for the Loveland ski patrol during the winters.
From insider attackers to sophisticated external adversaries, the reality is that the threat is already inside, however good you are at defending your perimeter. A fundamentally new approach to cyber defense is needed to detect and investigate threats that are already inside the network – before they turn into a full-blown crisis.
Based on unsupervised machine learning and probabilistic mathematics developed by scientists from the University of Cambridge, the new immune system technologies are capable of learning ‘a pattern of life’ by modeling the behaviors of each user, device and network. Without relying on rules or signatures, these self-learning technologies represent a fundamental step-change in automated cyber defense.
In this session, learn:
How new machine learning and mathematics are automating advanced threat detection
Why 100% network visibility and intelligence allow you to pre-empt emerging situations, in real time
How smart prioritization and visualization of threats allows for better resource allocation, and lower risk
Perry has an extensive networking background extending over 25 years of experience, commencing with early Ethernet to today’s wireless technologies. He is current focused on the development of wireless technologies to leverage inherent mobility capabilities including locationing, Analytics and leveraging social networking resources, to ‘Monetize’ Wi-Fi deployments. Previous roles included RF Specialist, Sr. Technologist and various management roles with the US Air Force, TRW, Cabletron, Xylan and Alcatel.
The mobile enterprise challenges are mounting: enabling users simple and secure access to the network, ensuring applications run smoothly, and building sufficient capacity to handle usage and growth. A superior level of Wi-Fi design is required—something shown to be lacking by a recent report: “By 2015, 80% of newly installed wireless networks will be obsolete because of lack of proper planning.” An indication of the problem is that a wireless user is provisioned with less than 5% of the bandwidth of a wired user. This session will examine critical design components to ensure predictable performance, even under heavy loads.
A look at the FBI’s Cyber Program, current trends, and threats on the horizon
ADTRAN reinvents the network delivering innovative, reliable communications solutions and industry-leading customer service that enables our customers to evolve, change and grow. Visit us to learn how we can help you reinvent your LAN infrastructure with business-class, cloud based Wi-Fi and a complete line of Ethernet switching solutions.
AFCEA International, established in 1946, is a non-profit membership association serving the military, government, industry, and academia as an ethical forum for advancing professional knowledge and relationships in the fields of communications, IT, intelligence, and global security.
Chartered in 1955, The Rocky Mountain Chapter is the 6th largest in the Association, boasting 786 members — approximately 70% of which are affiliated with industry and 30% are affiliated with the DoD.
The Rocky Mountain Chapter has awarded over $100,000 to high school scholarships, high school & middle school science & math grants, regional science fairs, enlisted tuition assistance scholarships, recognition of enlisted award winners at Colorado Springs’ five military installations, and other miliary and community contributions.
Advanced Systems Group (ASG) is committed to providing companies with the resources they need to remain successful and competitive in today’s marketplace. For organizations that require assistance delivering new products and services, we’ve assembled an experienced and resourceful consulting services team from the most knowledgeable, dedicated professionals in the industry.
Axis provides IP-based network video solutions including network cameras (IP cameras) and video encoders for security surveillance and remote monitoring.
Define your ideal network. Think beyond fast, cost-effective, and reliable. Think about proven technology and eye-opening innovation. And an infrastructure that’s designed for agile response and open to the developments of vendors and technical communities worldwide. Now you’re thinking about Brocade.
We’re the undisputed frontrunner in storage networking, and we’re leading the evolution to the New IP. Join us. Think big. Start now.
CenturyLink is the third largest telecommunications company in the United States and is recognized as a leader in the network services market by technology industry analyst firms. The Company is a global leader in cloud infrastructure and hosted IT solutions for enterprise customers. CenturyLink provides data, voice and managed services in local, national and select international markets through its high-quality advanced fiber optic network and multiple data centers for businesses and consumers. The company also offers advanced entertainment services under the CenturyLink® Prism™ TV and DIRECTV brands. Headquartered in Monroe, La., CenturyLink is an S&P 500 company and is included among the Fortune 500 list of America’s largest corporations.
CommScope is one of the world’s premier network infrastructure providers. We enable and empower many of the top-performing networks in existence today.
We serve customers:
In more than 100 countries
With more than 12,000 employees
Across wireless, enterprise and broadband markets
Our size, reach, supply chain, operational precision, and responsive personnel power our advances into new forms of communication. This forward-thinking approach is supported by a long tradition of excellence—CommScope was instrumental in the creation of:
Cable TV infrastructure
The first wireless networks
The first data centers
The first intelligent buildings
Our experts have helped write the standards for nearly every network technology evolution for more than a generation. We’ve remained at the forefront of every wireless technology evolution—leading the advancement of coaxial, twisted-pair and fiber-optic technology.
We apply this history, expertise and insight to help you:
Benefit from the world’s most productive networks
Deploy advanced communications technology
Solve complex infrastructure challenges
Realize greater OpEx and CapEx savings
Expand bandwidth and capacity
Generate more revenue
Founded in 1972, Communications Supply Corporation (CSC), a subsidiary of WESCO International, Inc., distributes a wide range of data communications and security solutions from the industry’s leading manufacturers. Together, CSC and WESCO form the largest data communications, security and electrical network in North America with nine distribution centers, over 475 full-service branches and an international network designed to scale.
Seventeen years ago, CommVault was launched to give companies a better way to protect, manage, and gain business value from their data.
Today, with more than 19,000 customers and counting, CommVault is liberating companies worldwide from chaos, excessive costs and complexity. We appeal to companies that are forward thinking, unafraid, and willing to make a change in order to get where they want to be.
Officially, CommVault is a publicly traded data and information management software company headquartered in Oceanport, New Jersey. We’ve made our mark with the industry’s leading backup product, Simpana software. Our customers choose us because of our unique Solving Forward® philosophy and ability to deliver complete solutions with infinite scalability and unprecedented control over data and costs.
CommVault is positioned as a Leader in the Gartner 2013 Magic Quadrant for Enterprise Backup/Recovery Software. Additionally, leading technology companies worldwide have formed strategic partnerships with us, including Hitachi Data Systems, Microsoft, NetApp, VMware, Novell, HP, Oracle, Bull, Fujitsu, and SAP.
To learn more about CommVault, our Solving Forward philosophy, and Simpana Software, download our CommVault Simpana Brochure, tour the rest of our web site, or simply contact us. We’re confident you’ll like what you discover
Named ‘Technology Pioneer’ by the World Economic Forum, Darktrace is one of the world’s leading cyber threat defense companies. Its Enterprise Immune System technology detects previously unidentified threats in real time, powered by machine learning and mathematics developed at the University of Cambridge, which analyze the behavior of every device, user and network within an organization. Some of the world’s largest corporations rely on Darktrace’s self-learning appliance across many industries. The company was founded in 2013 by leading machine learning specialists and government intelligence experts, and is headquartered in Cambridge, UK and San Francisco, including 18 offices across the globe.
Dell Software makes it easy to securely manage and protect applications, systems, devices and data to help organizations of all sizes fully deliver on the promise of technology. Our simple yet powerful software – combined with Dell hardware and services – provide scalable, integrated solutions to drive value and accelerate results. Whether it’s Windows infrastructure, the cloud and mobile computing, or networks, databases and business intelligence, we dramatically reduce complexity and risk to unlock the power of IT
ESET is a pioneer in the antivirus industry with its award-winning NOD32 technology celebrating its 25th anniversary in 2012. ESET advanced security solutions are trusted by businesses and consumers around the world for protection against today’s most sophisticated cyber attacks. On a daily basis, we protect millions of users across all types of environments – be it computers, laptops, mobile devices or servers. ESET Endpoint Security and ESET Endpoint Antivirus, in addition to ESET NOD32 Antivirus, ESET Smart Security and ESET Cyber Security (solution for Mac), are trusted by millions of users globally and are among the most highly recommended security solutions in the world.
EST Group is an IT solutions company, with a strong focus in providing integration and consulting services tailored around automating, managing, and securing your organization’s IT environment. Our goal is for our clients to achieve maximum efficiency and productivity. We strive to provide the best experience our clients, partners, and employees have ever had with a consulting company.
FireEye protects both large and small organizations committed to stopping advanced cyber threats, data breaches, and zero-day attacks. Organizations across various industries trust FireEye to secure their critical infrastructure and valuable assets, protect intellectual property and avoid bad press, costly fixes, and downtime.
HEAT Software is a truly powerful combination of industry market leaders: FrontRange, the industry’s sole provider of Service Management (SM) and Unified Endpoint Management (UEM); and Lumension, the industry’s leading Endpoint Security provider.
HEAT Software is leading the unification of Service Management and Unified Endpoint Management. We empower IT, HR, Facilities, Customer Service and other enterprise functions to simplify and automate their business processes to improve service quality, while managing and securing endpoints to proactively detect and protect against threats to business continuity.
HEAT Software delivers the world’s most powerful fusion of truly flexible, scalable, secure SM and UEM solutions.
Innovation is in IBM’s DNA, bringing new approaches to customers, the company and the world at large. Behind each innovation are the people who conceive of it and work the long hours to see it become reality. Meet some of those innovators and learn more about them and their work.
For over three decades, the International Legal Technology Association has led the way in sharing knowledge and experience for those faced with challenges in their firms and legal departments. Through delivery of educational content and peer-networking opportunities, we provide members information resources in order to make technology work for the legal profession. Connect and participate today!
Impression Campaigns is a world wide marketing and advertising agencies outlier that creates unique and original campaigns for growing companies. We specialize in brand identity and internet marketing, video production, graphic design and photography, website creation with a responsive template design, and social media implementation.
InfraGard is a Federal Bureau of Investigation (FBI) program that began in the Cleveland Field Office in 1996. It was a local effort to gain support from the information technology industry and academia for the FBI’s investigative efforts in the cyber arena. The program expanded to other FBI Field Offices, and in 1998 the FBI assigned national program responsibility for InfraGard to the former National Infrastructure Protection Center (NIPC) and to the Cyber Division in 2003. InfraGard and the FBI have developed a relationship of trust and credibility in the exchange of information concerning various terrorism, intelligence, criminal, and security matters.
“We believe that everyone – from home computer users and small companies to large corporations and governments – has the right to be free from cyber-security fears. We have therefore made it our mission to provide the world’s most effective, responsive and efficient protection against cyber-threats: those from malware, spam, hackers, DDoS attacks, sophisticated cyber-espionage tools, and cyber-weapons that target countries’ critical infrastructure with potentially catastrophic consequences. We’re here to protect our users from them all.”
Kaspersky Lab is one of the fastest growing IT security vendors in the world. Firmly positioned as one of the top four leading vendors of security solutions for endpoint users*, Kaspersky Lab continues to improve its market position. According to the company’s 2012 unaudited financial results, Kaspersky Lab’s global revenue grew by 3% compared to the previous year and reached $628 million. Today it is the world’s largest privately held vendor of endpoint protection solutions. The company provides a wide range of products and solutions for different types of clients, with a special focus on large enterprises, and small and medium-sized businesses.
The heart of IT is about empowering people—and being able to serve and secure all types of users, on all the devices they use, wherever they are. With an end-to-end Service Management solution, only LANDESK unifies and automates the delivery of all the assets and services users need across mobile, cloud, and personal computing environments. By making users happy, we make IT more strategic and business more productive.
Level 3 Communications builds, operates and maintains a global communications network to deliver managed solutions for enterprises, carriers and governments.
As a Fortune 500 company and a Tier 1 Internet operator, we offer fiber-based infrastructure and data center solutions, IP-based voice and data communications, wide-area Ethernet services, video and content distribution, security solutions, and cloud-based solutions. Level 3 connects more than 500 markets in over 60 countries across owned fiber networks on six continents, connected by extensive undersea facilities. We take ownership of network reliability and security, so our customers can own their success in return. Learn more: www.level3.com
We are a local managed service provider supporting Colorado, Wyoming, New Mexico and beyond since 1972. Our print management solutions and IT services teams deliver extraordinary expertise and offer a single source for your business technology consulting, implementation, service, support and supply needs.
LINX is a technology integrator specializing in design, installation & support of structured cabling, audio visual & security systems for mission critical & other commercial applications.We provide full service ranging from design to 100% self-perform install & support. www.teamlinx.com
Nichols Venture Group wants to help you create a distinguished brand and grow your business. In today’s world where everything can be customized, we know it takes a lot to stand out. We will use our tools and experience to establish your brand’s identity and build it into something bold and recognizable to your customers. We are a full-service company that addresses every aspect of brand building. From your brand’s inception to graphic & web design and internet marketing, we’ll be there every step of the way expanding your reach and pushing customers in your direction
Outersafe provides a comprehensive approach to security for the SMB and Enterprise market. Our Security as a Service offerings allow for true perimeter to endpoint security with solutions for any organization and SIEM compliancy solutions with Intel Security. We partner with many companies such as Intel, Raytheon/Forcepoint, Cisco and Microsoft to allow for an ecosystem of partners to achieve a best of breed ability. We take into consideration the company’s needs, security goals, configuration and take an agnostic approach when recommending solutions.
We are certified on all our systems we consult on and implement. We are first to market with many solutions such as the Next Generation Firewall technologies that offer a layer2 wiretap implementation which allows for a plug and play install and to help stop attacks that other devices cannot.
Our services are most beneficial for companies that:
• have interest in complimenting in house expertise with Security as a Service.
• understand the increase in cyber security threats requires an end to end strategy.
• interest in end to end security for regulatory/reporting concerns such as HIPAA, FDA, DOD, SEC, SOX and other compliancy demands.
• look for a comprehensive solution that can get you closer zero Malware.
Prime Communications has become a premier provider of mobility, security and infrastructure solutions designed to meet the information technologies and project management demands of today’s businesses.
QNAP, Inc., as its brand promise “Quality Network Appliance Provider”, aims to deliver comprehensive offerings of cutting edge network attached storage (NAS) and network video recorder (NVR) solutions featured with ease-of-use, robust operation, large storage capacity, and trustworthy reliability. QNAP integrates technologies and designs to bring forth quality products that effectively improve business efficiency on file sharing, virtualization applications, storage management and surveillance in the business environments, as well as enrich entertainment life for home users with the offering of a fun multimedia center experience. Headquartered in Taipei, QNAP delivers its solutions to the global market with nonstop innovation and passion.
ReadyTalk gives you all the confidence that’s been missing in online meetings and webinars. Our platform delivers serious collaboration technology, supported by expert service you didn’t think was possible. Our passion is perfect meetings and presentations.
We don’t believe only those with the largest security budgets should be able to defend themselves from attackers. Our team combines deep technical and leadership experience in building effective security organizations with big data processing expertise to deliver an unmatched quality of endpoint security at an unbeatable value.
RMIMA is the premier organization on the Front Range that has a clear focus on vital topics for emerging information technology leaders.
Monthly Briefings and Lunch – From September to May, we offer monthly lunchtime events that give you access to experts who give you the tools you need to get promoted and succeed in your role as an IT manager.
Professional Development – Topics focus specifically on IT management issues and you get the chance to discuss ideas with IT managers from other companies.
IT Community – As an IT manager, it pays to be active in your community. Networking with RMIMA members at our outside events gives you the relationships you need to benefit from the experience of your colleagues in other industries.
Education – RMIMA is forward-thinking. We are aware that schools are not graduating students in IT as fast as IT professionals are retiring. WeÂ’re one of the few organizations thatÂ’s doing something about it. Through our Student Ambassador Program, weÂ’re reaching out to top students and weÂ’re partnering with the best colleges and universities in the area.
Rocket Jones builds custom web software to help businesses rescue wasted time from clunky software. Whether it’s a web application or a mobile app, we build products that solve individual problems. Most importantly though, Rocket Jones builds relationships. We consider each client a long-term partner, and we love helping them find solutions that let them spend more time on important things.
Since 1989, The Root Group has been providing IT infrastructure solutions to a wide variety of commercial, educational and government enterprises throughout the Rocky Mountain region. We specialize in architecting, designing, deploying and managing high performing compute infrastructures that optimize our customers’ ability to leverage IT as a competitive business advantage. We compliment best-in-class technology with highly skilled engineering expertise in the disciplines of networks, servers, storage, security and virtualization. Our ability to provide highly functional cross-discipline solutions for on-premise or cloud-based compute environments combined with a commitment for highly responsive support forms the basis for long term mutual success. Do it right the first time with The Root Group.
RSM US LLP is a leading provider of audit, tax and consulting services focused on the middle market. We guide our clients through business challenges by understanding their needs and bringing together the right team to address them. With 8,000 professionals and associates in 80 cities nationwide and access to more than 37,500 people in 110 countries through our membership in RSM International, we can meet your needs wherever in the world you do business.
Shavlik, a global leader in simplifying the complexity of IT management, is dedicated to significantly reducing the time-to-value for IT professionals from months to minutes. Shavlik’s Protect, Patch for Microsoft System Center and Management Intelligence are some of its on-premise and cloud base solutions that enable customers to manage both physical and virtual machines, deploy software, discover assets, simplify configuration, control power usage and ensure endpoint security. By bringing the sophisticated capabilities enjoyed by large companies to organizations of all sizes and types, Shavlik is driving the democratization of IT.
Shavlik Protect brings enterprise-level IT management to companies of all sizes. Get centralized patch management and asset inventory for Windows and third party applications for both virtual and physical machines. And, from the same console, get patch management capabilities, dozens of pre-built ITScripts, power management, and centralized antivirus.
Silver Peak gives enterprises and service providers the flexibility to securely connect users to applications via the most cost-effective source of connectivity available. With Silver Peak’s WAN solutions, customers can augment or replace MPLS networks with secure broadband Internet connectivity, (often referred to as an SD-WAN) while dramatically reducing WAN costs and complexity. Customers benefit from unprecedented levels of visibility, control and security over all traffic traversing the WAN, while improving application and network performance. With Silver Peak, sites can be rapidly and non-disruptively extended, moved, or changed as business demands evolve. Learn more at www.silver-peak.com
Founded in 2015 by Leia Sigler, SkyTech Data Solutions is a value added reseller for IT solutions for businesses. The company is built on providing expertise and excellent customer service, to establish pain points of customers in IT, and ensure that solutions are scoped to solve those issues. The goal of the company is to make life easy for IT departments, by choosing the right products, as well as making the quoting and ordering process simple and easy.
Based in CO, X-IO Technologies provides high-performance storage that does not compromise on performance, availability, simplicity or affordability. X-IO offers the industry’s only purpose-built storage array which flexibly supports all-flash, hybrid, and enterprise HDD solutions.
“Xirrus is the leading provider of high-performance wireless networks. Xirrus solutions perform under the most demanding circumstances, offering consistent “wired-like” performance with superior coverage and security.”