Cedar Rapids, 52402-1257, IA,
United States
2Nd Story Software Technographics
Discover the latest software purchases and digital transformation initiatives being undertaken by 2Nd Story Software and its business and technology executives. Each quarter our research team identifies on-prem and cloud applications that are being used by the 10 2Nd Story Software employees from the public (Press Releases, Customer References, Testimonials, Case Studies and Success Stories) and proprietary sources.
During our research, we have identified that 2Nd Story Software has purchased the following applications: Microsoft Azure Cloud Services for Application Hosting and Computing Services in 2017, Microsoft 365 for Collaboration in 2017, F5 Defense.Net for DDoS Protection in 2018 and the related IT decision-makers and key stakeholders.
Our database provides customer insight and contextual information on which enterprise applications and software systems 2Nd Story Software is running and its propensity to invest more and deepen its relationship with Microsoft , Amazon Web Services (AWS) , F5 Networks or identify new suppliers as part of their overall Digital and IT transformation projects to stay competitive, fend off threats from disruptive forces, or comply with internal mandates to improve overall enterprise efficiency.
We have been analyzing 2Nd Story Software revenues, which have grown to $1.0 million in 2024, plus its IT budget and roadmap, cloud software purchases, aggregating massive amounts of data points that form the basis of our forecast assumptions for 2Nd Story Software intention to invest in emerging technologies such as AI, Machine Learning, IoT, Blockchain, Autonomous Database or in cloud-based ERP, HCM, CRM, EPM, Procurement or Treasury applications.
IaaS
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
|---|---|---|---|---|---|---|---|---|
| Microsoft | Legacy | Microsoft Azure Cloud Services | Application Hosting and Computing Services | IaaS | n/a | 2017 | 2017 |
|
|
|
|
|
Application Hosting and Computing Services | IaaS |
|
2022 | 2022 |
|
|
|
|
|
Content Delivery Network | IaaS |
|
2022 | 2022 |
|
|
|
|
|
Content Delivery Network | IaaS |
|
2022 | 2022 |
|
Collaboration
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
|---|---|---|---|---|---|---|---|---|
| Microsoft | Legacy | Microsoft 365 | Collaboration | Collaboration | n/a | 2017 | 2017 |
|
CyberSecurity
Vendor |
Previous System |
Application |
Category |
Market |
VAR/SI |
When |
Live |
Insight |
|---|---|---|---|---|---|---|---|---|
| F5 Networks | Legacy | F5 Defense.Net | DDoS Protection | CyberSecurity | n/a | 2018 | 2018 |
In 2018, 2Nd Story Software implemented F5 Defense.Net to protect its customer facing website. The deployment positions F5 Defense.Net as a perimeter DDoS Protection layer for web traffic, providing both network layer and application layer defenses against volumetric and protocol based attacks.
The implementation of F5 Defense.Net incorporates standard DDoS Protection capabilities, including traffic scrubbing, anomaly detection, rate limiting, and rule based mitigation policies. Configuration work focused on edge policy tuning for HTTP request patterns and volumetric thresholds, and on establishing automated mitigation workflows to drop or challenge hostile traffic before it reaches application servers.
Operational coverage is narrowly scoped to the company website and related online endpoints, reflecting the vendor selection for a small retail operator with ten employees. The deployment impacts the IT function and customer facing operations by hardening availability and by centralizing attack monitoring and alerting for site incidents.
Governance around the F5 Defense.Net deployment emphasizes monitoring, incident playbooks, and controlled access to mitigation policy controls. Logging and alert streams are configured for continuous visibility, and runbook procedures are used to coordinate mitigation actions between IT and customer support during high traffic or attack events.
|
| First Name | Last Name | Title | Function | Department | Phone | |
|---|---|---|---|---|---|---|
| No data found | ||||||
| Date | Company | Status | Vendor | Product | Category | Market |
|---|---|---|---|---|---|---|
| No data found | ||||||