COVER STORY
16 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
Change is the only constant in enterprise security both in
ter...
STORYCOVER
COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 17
E
nterprise mobility and BYOD are emerging as the
top prioritie...
COVER STORY
18 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
O
rganizations are now turning their focus from
endpoint secur...
COVER STORY
20 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
A
trend toward the next generation firewall (NGFW)
is gradually...
STORYCOVER
COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 21
W
hile virtualization brings in significant benefits
for organiza...
COVER STORY
22 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
Make security a separate P&L account
Irrespective of the stren...
Presented by
22-24 2013AUGUST
THE LEELA,KOVALAM
Presented by
Powered by Organised by
Presented by
Gold Partners
Platinum P...
24 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in
SPECIAL FOCUS
I
ndustry pundits say that various network edge
products suc...
CRN 01 September Cover Story
Upcoming SlideShare
Loading in …5
×

CRN 01 September Cover Story

420 views

Published on

RSMRS, RS Market Research Solutions has got a good coverage in this month CRN issue with RSMRS featured in the cover story. You can check by searching RS Market Research Solutions, RSMRS and Kalyan Banga. Proud to be an RSMRS ian!!

Best Regards,
Kalyan Banga
Founder & Principal Analytics Consultant
Hello: +91-9433948532
Web: http://fusionanalyticsworld.com
LinkedIn: http://www.linkedin.com/company/fusion-analytics-world
Facebook: http://www.facebook.com/AnalyticsFusion
Twitter: http://twitter.com/analyticsfusion

Published in: Data & Analytics, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
420
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

CRN 01 September Cover Story

  1. 1. COVER STORY 16 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in Change is the only constant in enterprise security both in terms of the threats as well as the responses. Presenting a few of the existing and emerging security trends SONAL DESAI & AMIT SINGH E nterprise security is a solutions-driven business offering channels almost assured double-digit growth and margins. This fact is evident from the increasing spend on security across segments. As per a PwC survey, large businesses (those with revenue of over `5,000 crore) and government organizations saw a 11 percent and 8 percent increase respectively in security spending in FY2011-12. Medium businesses (with revenue from `500 crore to `5,000 crore) saw a 17 percent increase in security spending followed by small businesses (with revenue less than `500 crore) where the spending increased by 14 percent. The monetary value of the enterprise security market in India was estimated at `3,423 crore in 2012 and is likely to grow at 14.76 percent to reach `4,508 crore in 2014 according to RS Market Research Solutions. The increasing use of the Internet is a potential driver for the enterprise security market. The higher adoption of smart devices by employees also calls for greater security measures at companies. Another factor explaining the rise in enterprise security is the regulatory mandates and compliance measures. According to one estimate, most organizations spend 11-15 percent of their revenue on IT of which 2-3 percent goes toward security. Here are some trends which partners can leverage to strengthen their security practice. SECURITY LANDSCAPE THE ENTERPRISE 0 1000 2000 3000 4000 5000 3423.55 INRCrore 2012 2013 2014 3925.87 4508.77CAGR 14.76% MARKET SIZE—ENTERPRISE SECURITY (INDIA) Source: RS Market Research Solutions
  2. 2. STORYCOVER COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 17 E nterprise mobility and BYOD are emerging as the top priorities and key investment areas for CIOs. As mobile devices become ubiquitous and store more personal and corporate data, new tools to secure the information will drive the mobile-security market. The increased risk to personal and corporate data is an opportunity for the security partners as the global market for mobile security is expected to reach $14.4 billion by 2017, according to research firm Global Industry Analysts. Many of the organizations also opt for it to reduce their Capex, says Sudarsan Ranganathan, CEO, Veeras Infotek, Chennai. “Some of the areas to focus on, include, mobile device management, mobile application management, data loss prevention and encryption.” About 50 percent of the organizations in India would adopt BYOD as a strategy by 2017, asserts Sajan Paul, Director, Systems Engineering, Juniper Networks. According to the latest Symantec State of Mobility Survey 2013, organizations proactive in mobile adoption are experiencing nearly 50 percent higher revenue growth than those restricting mobility. All things considered, businesses perceive net positive results with mobility,” shares Anand Naik, Managing Director, Sales, India and Saarc, Symantec. However, the biggest nightmare associated with mobility is company data that flows into a wide variety of mobile devices and applications, many of which were not built to meet enterprise standards. IT administrators are losing control of what tools and applications are used inside the enterprise and business users are becoming their own system administrators. Also, this would shrink traditional perimeter to server and data centers, anything out of DC should be considered as external entity, says Pinakin Dave, National Manager, Channels & Alliances, McAfee India. “With 72 percent of Indian businesses facing mobility incidents in the past 12 months and 37 percent facing revenue loss due to mishaps, this trend introduces significant opportunities for partners,” says Naik. It is important to develop a balance between the security and privacy demands from an organizational, as well as employee standpoint. “CIOs are deploying solutions that offer a holistic security policy, where the controls can be applied securely to a device and location agnostic network. This can be addressed by adopting an integrated, adaptive, and collaborative security approach,” shares Diwakar Dayal, Head, Sales, Security Business, Borderless Networks, India & Saarc, Cisco Systems. The CIO should also focus on designing a next generation security architecture built on top of a multi function platform with deep network integration. Due to the evolving threat landscape, he requires a new approach to deal with the `any to any’ challenges which arise, suggests Vishal Bindra, CEO, ACPL Systems, Delhi. Many organizations expect one single solution to help secure BYOD on an end to end basis which is practically not possible. BYOD needs to be looked at from different dimensions like data loss prevention, network access control, authentication system, internal intrusion prevention systems, internal firewalls, securing Wi-Fi etc. On top of all, is the internal IT policy which should be detailed and fool-proof to drive the initiative and guide effectively and prevent failure of specific tools, says Srinivasa Boggaram, SE Team Lead, McAfee India. While MDM is an integral part of mobile security, Vishak Raman, Senior Regional Director, India and Saarc, Fortinet, warns not to confuse MDM with total mobile security. “MDM does provide an expanded level of policy enforcement and offers remote location/lock/wiping capabilities to protect against loss or theft. However, MDM solutions enforce different policies based on the mobile device they are supporting, resulting in inconsistent security coverage. Mobile security emerging as top priority How do you protect corporate data when employees leave the office at the end of the day with corporate data on their smartphones? DIWAKAR DAYAL, Lead, Security, Borderless Networks Sales, India & Saarc, Cisco Systems “CIOs are deploying solutions which offer a holistic security policy where the controls can be applied securely to a device- and location-agnostic network” VISHAK RAMAN Senior Regional Director, India & Saarc, Fortinet “MDM provides an expanded level of policy enforcement. MDM solutions enforce policies based on the mobile devices, resulting in inconsistent security coverage” The global market for mobile security is expected to reach $14.4 billion by 2017. About 50 percent of the organizations in India will adopt BYOD as a strategy by 2017. Organizations adopting mobility and mobile security are experiencing 50 percent higher revenue growth than those opposing it. Mobile device management, mobile application management, data loss prevention and encryption are a few areas to focus on. HIGHLIGHTS
  3. 3. COVER STORY 18 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in O rganizations are now turning their focus from endpoint security to network security. The adoption of SoCloMo (social media, cloud computing and mobility) is breaking open the rigid boundaries of enterprise IT from a controlled environment to a situation where CIOs have to secure the data distributed across cloud, mobile and social platforms. So far, the security policies of organizations revolved around securing and controlling endpoints, but now the policies need to shift to control the data on the network, informs Jitendra Gupta, Director, Channel and Alliances, India and South Asia, Juniper Networks. “Network security has become a boardroom issue for most organizations and CISOs and CSOs are charged with ensuring security of mission critical data traversing the networks,” states Sunil Sharma, VP Sales & Operations, India & Saarc, Cyberoam. The network security market in India stood at `1,406 crore in FY2012-13, and is expected to be `1,638 crore in FY2013-14. According to RS Market Research Solutions, large enterprises contributed 44.3 percent, the mid- market 8.2 percent, small businesses 15 percent, and the government and education segments 32.5 percent. Enterprises across the board, especially sectors such as BFSI, government and telecom are investing in network security solutions. Data from Cisco’s Annual Security report 2013 indicates that contrary to the global spam volumes which have reduced by 18 percent during the last year, India has seen an escalation in the level of malicious spam. According to CERT-In, an estimated 14,392 websites were hacked in 2012 till October. Ashok Prabhu, CEO, ValuePoint TechSol, Bengaluru, says, “Many enterprise customers have allowed employees to use social media, but they are unable to track the origin and persistence of zero-day attacks. We are deploying context-aware intelligent solutions for them.” According to Vishal Bindra, CEO, ACPL Systems, Delhi, “Data privacy and the need to adhere to regulations by customers in the pharma and manufacturing segments, or multi group companies which have adopted SaaS, are forcing cloud service providers to look at network security in a holistic manner.” “Money and spying are the two motivators for cyber attacks targeting Web servers. IAM acts as a gateway between the user and the applications,” says Durganadh Venkata, Senior VP, Business Development & Operations, Locuz Enterprise Solutions, Hyderabad. Moreover, the Indian government recently updated its IPv6 roadmap which details some pilot projects and a new set of deliverables to transition to IPv6 by 2017. Since IPv6 requires upgradation of the network infrastructure, security is a major concern. “The exhaustion of IPv4 addresses, evolution of IPv6-oriented technologies, government initiatives to push transition to IPv6, YoY explosive growth of mobile devices, and the emergence of the Internet of Things will boost network security in a big way,” forecasts Diwakar Dayal, Lead, Security, Borderless Networks Sales, India & Saarc, Cisco Systems. Current security solutions are taking network and Web application protection to the next level by providing definitive intelligence about attackers. It uses intrusion deception technology against Web-based threats. “These solutions use deception to create detection points or tar traps to identify malicious actors in real-time as they attempt to hack their desired target. Once attackers are identified, it prevents them from compromising critical information, wastes their time by presenting false vulnerabilities and provides valuable intelligence to thwart future attacks. This is transforming the security industry and changing the ROI of hacking by making it costly, time consuming and tedious for attackers to chase after false data.” Informs Ashish Dhawan, Managing Director, Asia, Juniper Networks. Security moving from endpoint to network The security policies of organizations hitherto revolved around controlling endpoints. That is now changing in favor of controlling the data on the network SUNIL SHARMA, VP, Sales & Operations, India & Saarc, Cyberoam “Network security has become a board-room issue, and CISOs and CSOs are charged with ensuring the security of mission-critical data traversing the network” VISHAL BINDRA CEO, ACPL Systems “Multi group companies which have adopted SaaS, are forcing cloud service providers to look at network security in a holistic manner” The Indian network security market is expected to be worth `1,638 crore in FY2013-14. BFSI and government are continuously investing in network security. Companies which have adopted SaaS are forcing cloud service providers to offer holistic network security. IAM is being used by enterprises for Web application and server protection. The exhaustion of IPv4 addresses, and the government push to IPv6, will boost network security. HIGHLIGHTS
  4. 4. COVER STORY 20 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in A trend toward the next generation firewall (NGFW) is gradually hotting up. The demand is coming from large enterprises which cannot afford to have disruptions from newer attacks because downtime can kill millions of dollars. NGFW provides advanced protection through complete visibility and reporting till layer 7, and also does not hamper the current work, says Kalyan Banga of RS Market Research Solutions. Srikant Vissamsetti, VP, Network Security, McAfee India, states that the worldwide NGFW market is expected to grow from $500 million in 2012 to $4.6 billion by 2016. “NGFW as a concept that completely meets the requirements of large enterprises. They are looking for solutions for IP fragmentation, TCP stream segmentation, RPC fragmentation, URL obfuscation, HTML evasion and FTP evasion, so this is a large opportunity for partners.” Concurs Rahul Meher, MD, Leon Computers, Pune, “The change in the threat landscape and the ever-growing use of Web 2.0 technologies are increasingly challenging traditional firewalls to evolve. Secondly, organizations in the BFSI, manufacturing, IT-ITeS and PSU segments, as well as MSPs, are seeking clarity on scanning, application intelligence, performance, manageability and reporting. These are definite opportunities for partners.” Agrees Vibhore Shrivastava, Business Head, IT Infrastructure, Meta Infotech, “We are seeing demand for NGFW from the retail, education, e-commerce and hospitality segments. Enterprises are providing their employees access to social networking, but have blocked the chat and games features. Also, industries which have high-availability as an important criterion are looking at NGFW.” Meta Infotech has deployed NGFW for HDFC Bank and AICT, and recently bagged a large contract from ICICI Bank. Enterprises are moving toward NGFW as traditional firewalls primarily focus on limiting access based on ports and protocols. With more applications using few ports and protocols like HTTP and SSL, the traditional firewalls are providing limited value. Says Vissamsetti, “NGFW addresses this by providing application visibility and adding user context. The threat landscape changed from exploiting servers to exploiting desktop-based applications when employees visit malicious sites and open infected documents that come via email. NGFW addresses this by adding IPS which does deep packet inspection.” Sunil Pillai, Co-founder & MD, iValue InfoSolutions, Bengaluru, concludes that the security need is moving from protocol-based protection to application layer/ functionality-specific needs along with protection from new threat vectors like APT. NGFW offers the perfect proposition for this. Next generation firewall hotting up Next generation firewalls provide advanced protection through complete visibility and reporting till layer 7 RAHUL MEHER Managing Director, Leon Computers “Customers want clarity on scanning, application intelligence, performance, manageability and reporting. These are opportunities for partners” The worldwide NGFW market is expected to grow to $4.6 billion by 2016. BFSI, IT-ITeS and manufacturing are high-growth areas for NGFW. NGFW offers advanced protection through complete visibility and reporting till layer 7. NGFW offers solutions for IP fragmentation, TCP stream segmentation, RPC fragmentation, URL obfuscation, and HTML and FTP evasion. HIGHLIGHTS There is currently a lot of hype in security circles surrounding the term ‘next generation firewall’ (NGFW). The hype is creating slight market confusion and leaving CISOs wondering how this technology differs from unified threat management (UTM). If you buy into the NGFW buzz, you may believe that it is an entirely new, innovative technology which has emerged. In reality an NGFW is a sub-set of the existing UTM market or even the evolution of the old firewall market. NGFW is generally described as a product which tightly integrates firewall, intrusion prevention systems (IPSs), VPN technologies and robust application control capabilities. All these features have historically been offered by many security products. In contrast, UTM appliances typically scale with a broad feature-set that can encompass most or all of the features required to protect networks from today’s blended threats. These features include an IPS, application control, network antivirus and VPN but are not limited to them; they often also include Web filtering, data leakage prevention and a host of other security capabilities. In other words, a UTM appliance can be deployed as a next-generation firewall, but a next generation firewall is limited in its abilities. Fortinet’s definition of NGFW is different. Our higher- end UTM solutions are marketed as NGFWs, so they have the full breadth of security functionalities targeted at large enterprises, telcos and financial services institutions. A COUNTER POINT
  5. 5. STORYCOVER COMPUTER RESELLER NEWS 01/09/2013 www.crn.in 21 W hile virtualization brings in significant benefits for organizations, there are security challenges to be addressed in storage virtualization, server virtualization and the like. “Identity is becoming the new perimeter, therefore it needs more clarity on information access management,” says Vic Mankotia, VP, Solution Strategy, APAC, CA Technologies. Any organization which has more than 40 instances is considering virtualization security. Also, according to Sudarsan Ranganathan, CEO, Veeras Infotek, Chennai, companies which have a roadmap to private, public or hybrid clouds are opting for virtualization security. Informs Nityanand Shetty, MD, Essen Vision, Mumbai, there has been strong uptake of virtualization security from verticals such as BFSI, telecom and government which are high adopters of the cloud. Ashok Prabhu, CEO, ValuePoint Techsol, Bengaluru, adds that since it is a niche technology the demand is coming from large enterprises. “Because it secures virtual machines and the traffic between VMs, there is significant traction in virtualization security.” Besides, virtualization security offers great scope for services. “The technology works on virtual IP, which means that the application has to bypass compute traffic to meet high-availability requirements. Protecting such applications is a great opportunity, and the services revenue can be anywhere between `6 lakh-10 lakh for three years,” informs Vibhore Shrivastava, Business Head, IT Infrastructure, Meta Infotech, Mumbai. VDI too is supporting the virtualization security . Says Vishak Raman, Senior Regional Director, India & Saarc, Fortinet, “Allowing mobile devices to access VDI gives organizations the ability to leverage their existing investment in VDI and provides a secure window into the corporate network.” Further, with virtualization taking center-stage, the virtual firewall is gaining traction. “It’s a network firewall service totally on a virtual environment and provides the general monitoring through the usual network firewall,” says Kalyan Banga, Regional Head, RSMRS. Virtualization security on path to maturity With virtualization having gained ground, can virtualization security be far behind? There’s been uptake from the BFSI, telecom and government verticals VIBHORE SHRIVASTAVA, Business Head IT Infrastructure, Meta Infotech “Protecting applications is a great opportunity, and the services revenue can be anywhere between `6 lakh-10 lakh for three years” What are the trends in security in the BFSI segment? Security trends in the financial segment includes DLP, data waste monitoring, application change management and managed security services. Compliance and regulation are driving these trends. For example, when data changes location, it changes the security barriers as well. One has to therefore put in place controls to avert risks. Each of these drivers is inter-connected and impacts the ecosystem. In an enterprise, either the information security is absent or it is deployed based on best practices or frameworks which are publicly available. What are the challenges you face as a CISO? Generating awareness among users to follow a certain security process and convincing the management that information security is not a hurdle, but a business enabler are the biggest challenges any CISO faces. The CISO has to create a rapport with his stakeholders and come across as a business person with the knowledge of technology. IT solution providers should come across as consultants. What are your suggestions for IT channel partners? Bankers are late users of technology. IT partners can leverage their position to educate them about newer solutions with visible ROI. Because service delivery is of paramount importance for any financial institution, we expect partners to be consultants who can roll out projects in a time-bound manner. Banks are now opting for 256-bit SSL certification for websites and mobile banking applications. They are implementing DLP solutions to prevent data leakage, as well as two-factor authentication, and user-based and role- based access. Security partners have great opportunities in these areas. “Security partners have great opportunity in BFSI” INTERVIEW: ONKAR NATH Generating awareness among users to follow a certain security process and convincing the management that information security is a business enabler are the biggest challenges a CISO faces In a recent panel discussion, Onkar Nath, CISO, Central Bank of India, shared his views on security trends ONKAR NATH
  6. 6. COVER STORY 22 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in Make security a separate P&L account Irrespective of the strengths and weaknesses of a partner, the right approach to grow the security business is to set it up as a separate business unit. “While this may not be easy for many partners, we have seen that focused partners have met with better results. Security is a service-oriented space with a highly specialized approach required,” says Nityanand Shetty, MD, Essen Vision. Later on, partners can go for dividing their security business into various practices. “Once we delve deep into security and increase certifications and specializations we can divide it into separate practices internally,” remarks Vishal Bindra, CEO, ACPL Systems. “We have divided our security business into multiple practices such as application and data security, APT and IPv6.” Most importantly, new entrants must partner with a vendor offering complete security solutions including web security, firewall, DLP, IPS, load balancing, authentication systems and mobile device management. “Even if you start with basic firewall and web security solutions it’s always better to start with a vendor offering a complete portfolio so that you need not change vendors to graduate to high-end technologies,” explains Shetty. Focus on certification Certification works in two ways in a partner’s favor. First, it increases the confidence of customers who consider the certifications of both the partner and the implementation team members as key criteria for awarding large projects. Second, vendors give extra rebates to certified solutions partners. Says Shetty, “Specialization is the core of the security business without which one cannot survive. Moreover, our margins are often enhanced because the various certifications we have gained as a company have helped us to earn better.” The company has more than 10 professionals certified in technologies such as firewall, DLP, IPS, IDS, web security, load balancing and application acceleration. Further, knowledge of laws and government guidelines is essential. Better understanding of vertical- specific guidelines for security is always beneficial to address gaps and suggest solutions. Understand the customer’s business CIOs and enterprise vendors are scouting for partners who have a strong understanding of how technology can help a customer’s business to grow. The starting point is to identify the pain areas of the customer which probably even the customer is not aware of. Moreover, security is all about educating the customer. “It’s the partner’s responsibility to identify gaps and suggest solutions,” says Philip George, CEO, Axcenta ITES. Advises Bindra, “Explain that procuring security solutions is different from buying routers and switches. Establish the difference between brands and products, and explain the pros and cons of each. Be vendor- neutral.” Talk about evolving threats and industry trends, and discuss the benefits of emerging security solutions. It always helps to prepare case studies, show POCs, and keep referrals handy. “Our discussions with customers start with their security policy and the processes they follow to secure people, processes, technologies, data and information. We then ask the customers to identify their assets in order of importance, classify those, and decide what they want to protect, which policy they want to implement, and who should be their vendor,” informs Bindra. Build a services focus Security practice is a service-oriented business. As Shetty points out, “Security is anyway a services business where an emergency can arrive anytime and you have to provide immediate support. The idea is to separate the support into professional security services. Services include conducting security audits, suggesting solutions, ensuring compliance and providing post- sales support.” Essen Vision recently launched a separate professional security services division with a focus on services around endpoint, data, network and server security and compliance. “We are complementing our product and solutions knowledge to offer security consultation which pure-play consultants could not offer,” says Shetty. Develop strong processes CIOs look at the internal practices and processes within an organization before assigning a work order to it. The reason is that they do not want to depend on a few people. Other parameters include long tenures (of employment), case referrals and vendor authorizations. “We prefer to work with partners who are good at knowledge-sharing, provide us with longer road-maps, and present their plans for crisis management clearly,” informs Ramkumar Mohan, Head, IT & CISO, Orbiz, Gurgaon. “Security is anyway a services business where an emergency can arrive anytime and you have to provide immediate support. The idea is to separate the support into professional security services.” How to build a security practice Thinking of setting up an enterprise security business? Here are a few pointers in that direction
  7. 7. Presented by 22-24 2013AUGUST THE LEELA,KOVALAM Presented by Powered by Organised by Presented by Gold Partners Platinum Partners Workshop Partner Exhibitors Thank you to all our sponsors, exhibitors, delegates and speakers in making CRN Leadership Summit a great success.
  8. 8. 24 COMPUTER RESELLER NEWS 01/09/2013 www.crn.in SPECIAL FOCUS I ndustry pundits say that various network edge products such as application delivery controllers (ADCs), load balancers and wide area network (WAN) optimization appliances which help organizations reduce network latency and improve application performance are the biggest systems integration opportunities. The market for WAN solutions is increasing, and the latest estimates from Gartner (May 2013) predict that the Indian enterprise WAN market will grow from $266.3 million in 2012 to $373.8 million by 2017. Gartner also estimates the WAN optimization market to be worth $40 million in 2013; this is expected to grow at a CAGR of 25 percent. Says Vijay Logani, Product Specialist, Cisco India & Saarc, “As the employee workforce becomes more mobile, organizations face new challenges to provide LAN-like response time over the WAN.” The data center boom has also increased awareness and demand for application acceleration. Logani adds that for any organization planning a DR center for its data center, WAN optimization is critical as it could considerably reduce bandwidth costs and latency. Desktop virtualization projects are also driving demand for app acceleration and latency reduction solutions. “To get the maximum benefit from VDI, most organizations will need to invest in edge devices that would provide them a LAN-like experience over the WAN,” says Kaushal Valluri, Director, Channels, Citrix India. Adds Shailendra Singh, Country Manager, A10 Networks, “Cloud computing and mobility have been the biggest drivers. The cloud is forcing people to use the WAN backbone more than the LAN, and with mobile users accessing the Internet it becomes imperative for CIOs to rethink WAN optimization.” Sectors such as BFSI are expected to drive growth. “Financial inclusion, where the need is to connect every remote branch to the core banking system, is not possible without ADCs,” says Shibu Paul, Country Manager, Array Networks, India & Saarc. Channel opportunities Till a few months back the market leaders in this space such as F5 Networks and Riverbed had been mostly working with large SIs. However, in the recent past, they have started wooing tier-2 channels. A key challenge for most partners remains the cost of the solution. Typical project sizes start at around $25,000, and most customers outside enterprises shy away from project implementation because of the high cost. However, vendors want channels to stay focused and look for opportunities. “Today, every customer who is running an enterprise- class application over HTTP or HTTPS is a potential user of application acceleration appliances,” opines Parag Khurana, MD, F5 Networks. “Almost all core banking vendors have made their applications Web-enabled. How else do you ensure that a remote user working with a low-speed Internet connection gets a uniform service?” OPTIMIZEDACCELERATION Yesterday’s buzzwords—WAN optimization and application acceleration—are becoming tomorrow’s opportunities. Gartner puts a figure to the size of the Indian enterprise WAN market in 2017: $373 million RAMDAS S WAN optimization is essentially a collection of techniques, including de-duplication, caching, traffic shaping, protocol spoofing and latency optimization, used alone or in combination, for increasing data transfer efficiencies across WANs. In most cases they work in Layer 2 and Layer 3, but modern WAN optimization appliances even work over Layer 7 or application layer. In most cases effective delivery of WAN optimization requires symmetrical appliances at the edge of all networks connected. Application Delivery Controllers (ADCs) deliver accelerated application experience to users using many of the techniques used by WAN optimizers, but they also use different types of load balancers including link load balancing and server load balancing, and acceleration techniques over SSL and TCP protocols. Both the technologies, while addressing similar problems, are used in different cases. WAN optimization is useful when the users are within a corporate network spread across different geographies, while ADCs deliver content to a wider audience, for example, users of a Web application. THE TECHNOLOGIES EXPLAINED

×