Startup Of The Week: WorkLight Enables Web 2.0 Mashups - InformationWeek
Government // Enterprise Architecture
05:00 PM
Connect Directly

Startup Of The Week: WorkLight Enables Web 2.0 Mashups

The WorkLight server pulls data from corporate apps and makes them available in Facebook and Google gadgets.

Do you wish your business applications were more like Facebook or a gadget? WorkLight brings Web 2.0 inside the enterprise by letting users mash up information from CRM and ERP systems with consumer apps such as RSS feeds, Facebook, and iGoogle--while also maintaining IT security controls.
-- Andrew Conry-Murray


PRODUCT: WorkLight 2.1

PRINCIPALS: Shahar Kaminitz, founder and CEO; Yuval Tarsi, founder and CTO

INVESTORS: Genesis Partners, Index Ventures, Shlomo Kramer

FUNDING: $5.1 million

EARLY CUSTOMERS: Ness Technologies, financial services companies

Kaminitz harnesses consumer innovation

Kaminitz harnesses consumer innovation

Rather than rejigger business apps to behave like Web 2.0 tools, WorkLight combines consumer apps with corporate data and security controls so companies can leverage that innovation while letting employees use familiar products. "Innovation comes from the consumer side of the Web," says CEO Kaminitz. "You can't catch up with Facebook and Google."

So where's the business value in Facebook? Kaminitz says organizations can encourage users to create corporate profiles, which can then be used to search for knowledge-area experts. The key value is that WorkLight can get information out of application silos and let enterprises use it in new and inventive ways to boost productivity. For instance, employees can create gadgets that compare sales records with inventory levels. And user-created gadgets can be shared company-wide.

Kaminitz and Tarsi both served in the Israeli army's elite intelligence unit, which has produced other tech entrepreneurs. Kaminitz comes from Amdocs, where he built Web front ends for enterprise apps.

The foundation of the product is software that runs on a server inside the corporate firewall. The software includes adapters that extract data from ERP and CRM applications from vendors such as SAP and Oracle and from other data sources, and it uses common Web formats such as Ajax to expose the information to end users. It can integrate with Microsoft's Active Directory to enforce existing authorization policies to ensure that information isn't exposed to people who shouldn't see it.


Timeline Chart

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
How Enterprises Are Attacking the IT Security Enterprise
How Enterprises Are Attacking the IT Security Enterprise
To learn more about what organizations are doing to tackle attacks and threats we surveyed a group of 300 IT and infosec professionals to find out what their biggest IT security challenges are and what they're doing to defend against today's threats. Download the report to see what they're saying.
Register for InformationWeek Newsletters
White Papers
Current Issue
Digital Transformation Myths & Truths
Transformation is on every IT organization's to-do list, but effectively transforming IT means a major shift in technology as well as business models and culture. In this IT Trend Report, we examine some of the misconceptions of digital transformation and look at steps you can take to succeed technically and culturally.
Twitter Feed
Sponsored Live Streaming Video
Everything You've Been Told About Mobility Is Wrong
Attend this video symposium with Sean Wisdom, Global Director of Mobility Solutions, and learn about how you can harness powerful new products to mobilize your business potential.
Flash Poll