Calyptix Adds to Sales & DevelopmentCalyptix Adds to Sales & Development
Calyptix builds staff to meet market demand
December 5, 2007

CHARLOTTE, N.C. -- Internet security firm, Calyptix Security Corporation, has extended its sales staff as well as its development staff in accommodating the growing demands for its UTM (Unified Threat Management) device, AccessEnforcer™.
Calyptix’ sales efforts will be significantly stepped up with these additional team members, enabling the company to build on the strong installation base already making Internet security simpler and more cost effective for small to medium-sized businesses across a wide range of business sectors.
Ben Sanders and Scott McConnell, joining the Calyptix team as Channel Sales Representatives, are broadening the exposure of AccessEnforcer across the Southeast. Their exuberance for the product and the company supports the sales progress that is already being made in a variety of business sectors across the Southeast. The Calyptix development team is also growing with the addition of two programmers. Josh Pilkington, a Microsoft Specialist, is working on integration with Microsoft environments and software that impacts AccessEnforcer’s internal systems and new development. Zach Wadler, a Unix Specialist, is contributing to quality assurance, process automation and development. “This is an exciting time for Calyptix. Our staff expansion is a direct result of our growing success with customers and partners. The UTM is being rapidly adopted by businesses across all sectors, including healthcare, retail, legal, accounting, non-profits and financial services organizations,” comments Calyptix CEO Ben Yarbrough. “Most IT professionals recognize that the traditional firewall is simply not enough anymore in today’s threat environment. We will continue to build our team to address the demands we are experiencing in both sales support and development.” Calyptix Security Corp.
Read more about:
2007About the Author(s)
You May Also Like
Hacking Your Digital Identity: How Cybercriminals Can and Will Get Around Your Authentication Methods
Oct 26, 2023Modern Supply Chain Security: Integrated, Interconnected, and Context-Driven
Nov 06, 2023How to Combat the Latest Cloud Security Threats
Nov 06, 2023Reducing Cyber Risk in Enterprise Email Systems: It's Not Just Spam and Phishing
Nov 01, 2023SecOps & DevSecOps in the Cloud
Nov 06, 2023