Calyptix Adds to Sales & DevelopmentCalyptix Adds to Sales & Development
Calyptix builds staff to meet market demand
December 5, 2007
CHARLOTTE, N.C. -- Internet security firm, Calyptix Security Corporation, has extended its sales staff as well as its development staff in accommodating the growing demands for its UTM (Unified Threat Management) device, AccessEnforcer™.
Calyptix’ sales efforts will be significantly stepped up with these additional team members, enabling the company to build on the strong installation base already making Internet security simpler and more cost effective for small to medium-sized businesses across a wide range of business sectors.
Ben Sanders and Scott McConnell, joining the Calyptix team as Channel Sales Representatives, are broadening the exposure of AccessEnforcer across the Southeast. Their exuberance for the product and the company supports the sales progress that is already being made in a variety of business sectors across the Southeast. The Calyptix development team is also growing with the addition of two programmers. Josh Pilkington, a Microsoft Specialist, is working on integration with Microsoft environments and software that impacts AccessEnforcer’s internal systems and new development. Zach Wadler, a Unix Specialist, is contributing to quality assurance, process automation and development. “This is an exciting time for Calyptix. Our staff expansion is a direct result of our growing success with customers and partners. The UTM is being rapidly adopted by businesses across all sectors, including healthcare, retail, legal, accounting, non-profits and financial services organizations,” comments Calyptix CEO Ben Yarbrough. “Most IT professionals recognize that the traditional firewall is simply not enough anymore in today’s threat environment. We will continue to build our team to address the demands we are experiencing in both sales support and development.” Calyptix Security Corp.
Read more about:2007
About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication MethodsOct 26, 2023
Modern Supply Chain Security: Integrated, Interconnected, and Context-DrivenNov 06, 2023
How to Combat the Latest Cloud Security ThreatsNov 06, 2023
Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and PhishingNov 01, 2023
SecOps & DevSecOps in the CloudNov 06, 2023
How to Deploy Zero Trust for Remote Workforce Security
What Ransomware Groups Look for in Enterprise Victims
How to Use Threat Intelligence to Mitigate Third-Party Risk
Concerns Mount Over Ransomware, Zero-Day Bugs, and AI-Enabled Malware
Securing the Remote Worker: How to Mitigate Off-Site Cyberattacks
9 Traits You Need to Succeed as a Cybersecurity Leader
The Ultimate Guide to the CISSP
The Burnout Breach: How employee burnout is emerging as the next frontier in cybersecurity
Maximize the Human Potential of Your SOC
Gone Phishing: How to Defend Against Persistent Phishing Attempts Targeting Your Organization