Welcome!

Microservices Expo Authors: Elizabeth White, APM Blog, Liz McMillan, Pat Romanski, XebiaLabs Blog

Related Topics: Cloud Security, Java IoT, Microservices Expo, @CloudExpo, Government Cloud

Cloud Security: Blog Post

Peerlyst to Disrupt the Traditional Industry Research Model

RSA interview with Limor Elbaz, the founder and CEO of Peerlyst.com

Thanks for taking the time to answer my questions. Please tell us, what is Peerlyst all about and what do you do?

Limor Elbaz: I'm Limor Elbaz the founder and CEO of Peerlyst.com. We've launched a product-centric social network for Enterprise IT professionals and we want to bring the power of social networks to IT decision making.

Because of their experience with consumer applications, Enterprise IT decision-makers are demanding a social buying experience that includes unbiased product reviews by trusted peer users, insights based on firsthand product experience, and new ways to connect to peers in their industry who have already implemented products in their business.

What are you launching at RSA?

Elbaz: We are launching our website Peerlyst.com for Information Security Professionals. Peerlyst is the world's first social site that fosters community around IT products. The website gives enterprise technology decision makers comprehensive product information from a range of sources, including the one they value most: their peers' firsthand experience with IT solutions.

Peerlyst provides a unique, trusted social buying experience for enterprise technology products and services, using the same capabilities that people are familiar with from their personal social networks. Peerlyst combines LinkedIn-like product pages (PeerPagesTM) with user-generated product ratings (PeerRatingsTM) of the key product features that are most important to IT decision makers.

Peerlyst's social features, such as the ability to follow products, will give users an ongoing feed of pertinent information over a product's life span. That includes reviews and comments from other Peerlyst users; technical content from vendors; and product-related articles, discussions, files, and videos from the Web.

Who is your target audience and how do you intend to reach them? What is the biggest challenge you face right now in telling your story and winning over new clients?

Elbaz: Our target audience are IT decision-makers (CISOs, Directors of Information Security, Application and Network Security Managers) who need to an effective way to learn from their peers what works and doesn't with the products they are considering.  What IT pros want is a reality check based on the crowdsourced experience of many other users.

Our biggest challenge is getting new Information Security folks to try out our site. We are building our social media capabilities and as of today we have over 700 Information Security pros who follow us on Twitter.

I'd be curious to hear any general thoughts you have on market trends...

Elbaz: It's hard to keep up with all of the changes, but mobile solutions, BYOD and next generation firewalls are interesting.  The idea of Peerlyst is to help our users share information so that they can help each other to keep abreast of what's new and what works best.

What is the viral aspect of your product?

Elbaz: Peerlyst is completely viral.  Once you join you can invite your peers to join too.  We've also built familiar social networking capabilities into our product pages.  Our users can easily socialize their review of a product or comments that they make.  They can also upload documents and videos to share with the community.

What's the business model? How will you make money?

Elbaz: Peerlyst is free for Information Security professionals to join and use.  We make money by providing InfoSec tech vendors an analytics feed based on product information we have found on the web.  We respect our users' privacy and do not provide vendors with our users information unless a user decides to click the contact vendor button on a product page.

Who are your competitors?

Elbaz: Our biggest competitor is for IT users to continue to rely on services like Gartner that don't use or benchmark the products and really can't capture the firsthand experience users have with a product.  Also Gartner and their peers do not cover smaller vendors who may be best of breed, but do not have significant revenues.

How do you differentiate from your competitors?

Elbaz: We have developed state-of-the-art information extraction algorithms that scour the Web for product information and generate organized product pages called PeerPagesTM.  No one else we know of does this.

How does your technology differentiate from the competition and can you elaborate on the different technology deployed?

Elbaz: We have developed state-of-the-art information extraction algorithms that scour the Web for product information and generate organized product pages called PeerPagesTM.  No one else we know of does this.

What business or technology could yours disrupt?

Elbaz: We disrupt traditional analyst firms that sell syndicated services to IT departments.

Who founded the company, when? What can you tell me about the story of the company's founding?

Elbaz: We're a team of IT and product professionals, developers, and designers. Like most people today, we use social sites to find great restaurants and see how people rate consumer products. But there was a big gap in our work lives. The process of evaluating, selecting, and keeping track of the tech products that drive our businesses was stuck in the 20th century.

Why were we spending hours searching for information on the Internet, poring over dozens of vendor white papers and analyst reviews? Did we really need to build spreadsheet after spreadsheet to compare products? And why wasn't there someplace we could go to see our peers' reviews of technology solutions, or to reach out to them and ask questions?

We created the idea for Peerlyst in 2011 and are launching now.

What is your distribution model? Where to buy your product?

Elbaz: We are truly web-based.  Our web site delivers our product.

What's next on your product roadmap?

Elbaz: Adding more social capabilities for our users, such as the ability to collaborate on a specific Information Security topic.

Are you targeting a first VC round? If yes when and what will you use the funds for?

How much money is being sought?

Elbaz: We are in discussion with top tier VCs now for our A round.

Peerlyst is a social media platform designed to give enterprise technology decision makers the unbiased information they need to buy, and make the best use of, IT solutions. The network enables a new social buying experience based on peer-to-peer interaction regarding technology products, services, and integration. Peerlyst is designed to guarantee that users get honest information about enterprise technology from actual users and experts. The company has offices in Silicon Valley.

Information on Peerlyst can be found at www.peerlyst.com or by following the company on Twitter @Peerlyst.

Thank you for your time!

More Stories By Xenia von Wedel

Xenia von Wedel is a Tech blogger and Enterprise Media Consultant in Mountain View, serving clients in a variety of industries worldwide. She is focused on thought leadership content creation and syndication, media outreach and strategy. She mainly writes about Enterprise, B2B solutions, social media and open source software, but throws the occasional oddball into the mix. Buy her a coffee if you like her article: http://xeniar.tip.me

@MicroservicesExpo Stories
As applications are promoted from the development environment to the CI or the QA environment and then into the production environment, it is very common for the configuration settings to be changed as the code is promoted. For example, the settings for the database connection pools are typically lower in development environment than the QA/Load Testing environment. The primary reason for the existence of the configuration setting differences is to enhance application performance. However, occas...
More and more companies are looking to microservices as an architectural pattern for breaking apart applications into more manageable pieces so that agile teams can deliver new features quicker and more effectively. What this pattern has done more than anything to date is spark organizational transformations, setting the foundation for future application development. In practice, however, there are a number of considerations to make that go beyond simply “build, ship, and run,” which changes ho...
SYS-CON Events announced today the Kubernetes and Google Container Engine Workshop, being held November 3, 2016, in conjunction with @DevOpsSummit at 19th Cloud Expo at the Santa Clara Convention Center in Santa Clara, CA. This workshop led by Sebastian Scheele introduces participants to Kubernetes and Google Container Engine (GKE). Through a combination of instructor-led presentations, demonstrations, and hands-on labs, students learn the key concepts and practices for deploying and maintainin...
In his general session at 18th Cloud Expo, Lee Atchison, Principal Cloud Architect and Advocate at New Relic, discussed cloud as a ‘better data center’ and how it adds new capacity (faster) and improves application availability (redundancy). The cloud is a ‘Dynamic Tool for Dynamic Apps’ and resource allocation is an integral part of your application architecture, so use only the resources you need and allocate /de-allocate resources on the fly.
While DevOps promises a better and tighter integration among an organization’s development and operation teams and transforms an application life cycle into a continual deployment, Chef and Azure together provides a speedy, cost-effective and highly scalable vehicle for realizing the business values of this transformation. In his session at @DevOpsSummit at 19th Cloud Expo, Yung Chou, a Technology Evangelist at Microsoft, will present a unique opportunity to witness how Chef and Azure work tog...
When scaling agile / Scrum, we invariable run into the alignment vs autonomy problem. In short: you cannot have autonomous self directing teams if they have no clue in what direction they should go, or even shorter: Alignment breeds autonomy. But how do we create alignment? and what tools can we use to quickly evaluate if what we want to do is part of the mission or better left out? Niel Nickolaisen created the Purpose Alignment model and I use it with innovation labs in large enterprises to de...
SYS-CON Events announced today that Numerex Corp, a leading provider of managed enterprise solutions enabling the Internet of Things (IoT), will exhibit at the 19th International Cloud Expo | @ThingsExpo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Numerex Corp. (NASDAQ:NMRX) is a leading provider of managed enterprise solutions enabling the Internet of Things (IoT). The Company's solutions produce new revenue streams or create operating...
If you’re responsible for an application that depends on the data or functionality of various IoT endpoints – either sensors or devices – your brand reputation depends on the security, reliability, and compliance of its many integrated parts. If your application fails to deliver the expected business results, your customers and partners won't care if that failure stems from the code you developed or from a component that you integrated. What can you do to ensure that the endpoints work as expect...
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Tintri VM-aware storage is the simplest for virtualized applications and cloud. Organizations including GE, Toyota, United Healthcare, NASA and 6 of the Fortune 15 have said “No to LUNs.” With Tintri they mana...
Analysis of 25,000 applications reveals 6.8% of packages/components used included known defects. Organizations standardizing on components between 2 - 3 years of age can decrease defect rates substantially. Open source and third-party packages/components live at the heart of high velocity software development organizations. Today, an average of 106 packages/components comprise 80 - 90% of a modern application, yet few organizations have visibility into what components are used where.
Throughout history, various leaders have risen up and tried to unify the world by conquest. Fortunately, none of their plans have succeeded. The world goes on just fine with each country ruling itself; no single ruler is necessary. That’s how it is with the container platform ecosystem, as well. There’s no need for one all-powerful, all-encompassing container platform. Think about any other technology sector out there – there are always multiple solutions in every space. The same goes for conta...
Let's recap what we learned from the previous chapters in the series: episode 1 and episode 2. We learned that a good rollback mechanism cannot be designed without having an intimate knowledge of the application architecture, the nature of your components and their dependencies. Now that we know what we have to restore and in which order, the question is how?
Digitization is driving a fundamental change in society that is transforming the way businesses work with their customers, their supply chains and their people. Digital transformation leverages DevOps best practices, such as Agile Parallel Development, Continuous Delivery and Agile Operations to capitalize on opportunities and create competitive differentiation in the application economy. However, information security has been notably absent from the DevOps movement. Speed doesn’t have to negat...
Your business relies on your applications and your employees to stay in business. Whether you develop apps or manage business critical apps that help fuel your business, what happens when users experience sluggish performance? You and all technical teams across the organization – application, network, operations, among others, as well as, those outside the organization, like ISPs and third-party providers – are called in to solve the problem.
Enterprise IT has been in the era of Hybrid Cloud for some time now. But it seems most conversations about Hybrid are focused on integrating AWS, Microsoft Azure, or Google ECM into existing on-premises systems. Where is all the Private Cloud? What do technology providers need to do to make their offerings more compelling? How should enterprise IT executives and buyers define their focus, needs, and roadmap, and communicate that clearly to the providers?
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management solutions, helping companies worldwide activate their data to drive more value and business insight and to transform moder...
Much of the value of DevOps comes from a (renewed) focus on measurement, sharing, and continuous feedback loops. In increasingly complex DevOps workflows and environments, and especially in larger, regulated, or more crystallized organizations, these core concepts become even more critical. In his session at @DevOpsSummit at 18th Cloud Expo, Andi Mann, Chief Technology Advocate at Splunk, showed how, by focusing on 'metrics that matter,' you can provide objective, transparent, and meaningful f...
There is little doubt that Big Data solutions will have an increasing role in the Enterprise IT mainstream over time. Big Data at Cloud Expo - to be held November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA - has announced its Call for Papers is open. Cloud computing is being adopted in one form or another by 94% of enterprises today. Tens of billions of new devices are being connected to The Internet of Things. And Big Data is driving this bus. An exponential increase is...
The many IoT deployments around the world are busy integrating smart devices and sensors into their enterprise IT infrastructures. Yet all of this technology – and there are an amazing number of choices – is of no use without the software to gather, communicate, and analyze the new data flows. Without software, there is no IT. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, panelists will look at the protocols that communicate data and the emerging data analy...
DevOps at Cloud Expo, taking place Nov 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 19th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait for long dev...