Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the July Edition:
• VMware introduces integrations with Dell EMC to accelerate workforce transformation
• HPE unveils new high-performance computing solution
• Weathering the cybersecurity storm - Hishamul Hasheel VP, Software and Security, Redington Gulf - Value Distribution
• AWS Greengrass is now available
• CyberArk acquires Conjur for $42 Million
• Fidelis Cybersecurity releases endpoint cloud solution
• Fortinet Threat Landscape report highlights most threats are opportunistic
• Fujitsu rolls out new biometric authentication solution
• Trend Micro launches $100 Million venture fund
• Malwarebytes unveils inaugural channel programme
• Red Hat Ceph storage release expands versatility as object store
• Veeam and Microsoft extend alliance to deliver availability for always-on cloud
Axa Assurance Maroc - Insurer Innovation Award 2024
Redington Value Journal - July 2017
1. Issue 13 // July 2017
VMWARE INTRODUCES INTEGRATIONS
WITH DELL EMC TO ACCELERATE
WORKFORCE TRANSFORMATION
With these integrated solutions, organisations will be able to leverage converged
infrastructure to optimise integrated desktop and application workloads.
The new HPE Apollo 6000 Gen10, HPE SGI 8600 and HPE
Apollo 10 Series systems are workload-optimised to deliver
faster, more efficient insights.
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:
V
Mware has
introduced
new technology
integrations with
Dell that enhance
VMware End-User Computing
(EUC) solutions to help
customers realise the benefits
of workplace transformation
through mobile, desktop and
cloud technologies.
With these integrated
solutions, organisations of all
sizes and industries with various
use cases will be able to leverage
converged infrastructure to
optimise integrated desktop and
application workloads and utilise
unified endpoint management
(UEM) to streamline
management and significantly
drive down costs.
Integration between VMware
AirWatch and Dell Client
Command Suite will extend
remote management capabilities
for key Dell hardware system
attributes to enhance AirWatch
HPE unveils new
high performance
computing solutions
Hewlett Packard Enterprise has
announced a new generation of
High Performance Computing
(HPC) and artificial intelligence
(AI) systems, software and
Continued on page 3
Continued on page 3
services. The new HPE Apollo
6000 Gen10, HPE SGI 8600 and
HPE Apollo 10 Series systems are
workload-optimised to deliver
faster, more efficient insights
Unified Endpoint Management
(UEM). Additionally, Dell
has announced Dell EMC
VDI Complete Solutions that
will offer a complete desktop
and application virtualisation
solution powered by VMware
Horizon with workload
optimised infrastructure,
integrated software, optional
Dell Wyse thin clients and
competitive pricing.
According to the company,
these integrated solutions
while reducing vulnerability to
cyber-attacks and improving
economic control, said the
company.
The first co-created system
since HPE acquired SGI, the
HPE SGI 8600 is a liquid cooled
petascale system, based on the
legacy SGI ICE XA architecture,
purpose-built to solve the most
complex scientific, engineering
and national security challenges.
According to the company, it
delivers fast parallel processing
performance, scales to more than
10,000 nodes without additional
switches using integrated switches
and hypercube technology and
offers more choice and flexibility
based on industry standards.
The HPE Apollo 6000 Gen10’s
new capabilities include reliability,
accessibility, serviceability
and manageability, better
application licensing efficiency,
reduced latency and higher
IOPs performance and reduced
power consumption and cooling
requirements, said the firm.
New cost effective platforms,
Sumit Dhawan, VMware
showcase the benefits of Dell
Technologies, a family of
businesses that provides the
essential infrastructure for
organisations to build its digital
future, transform IT and protect
the most important asset –
information.
For more information, please write to sales.value@redingtonmea.com
3. AWS Greengrass is
now available
AWS Greengrass eliminates the complexity involved in programming and updating IoT devices.
Amazon Web Services has
announced that AWS Greengrass
is now available to all customers,
enabling users to run AWS
compute, messaging, data
caching, and sync capabilities on
connected devices.
With AWS Greengrass,
devices can run AWS Lambda
functions to perform tasks
locally, keep device data in sync,
and communicate with other
devices while leveraging the
full processing, analytics, and
storage power of the AWS Cloud.
AWS Greengrass
“eliminates the complexity
involved in programming
and updating IoT devices.”
Developers can add AWS
Lambda functions to connected
devices right from the AWS
Management Console, and
devices can execute the code
locally, responding to events
and taking actions in near
real-time. AWS Greengrass also
includes IoT messaging and
synching capabilities so devices
can send messages to other
devices without connecting
back to the cloud. It allows
customers the flexibility to have
devices rely on the cloud when
it makes sense, perform tasks
on their own when it makes
sense, and talk to each other
when it makes sense – all in a
single, seamless environment.
“By embedding AWS
Lambda and IoT capabilities in
connected devices, Greengrass
gives customers the flexibility
to have devices act locally on
the data they generate while
using the AWS Cloud for
management, analytics, and
storage – all using a single,
familiar AWS programming
model,” said Dirk Didascalou,
Vice President of IoT at AWS.
“We are excited to make AWS
Greengrass available to all
customers, and with our partners
shipping AWS Greengrass-
capable devices it is now
incredibly easy to build and run
IoT applications that seamlessly
span devices on the edge and in
the AWS Cloud.”
More than a dozen AWS
partners, including Annapurna,
BSquare, Canonical, Digi
International, Intel, Lenovo,
Mongoose, Qualcomm
Technologies, Raspberry Pi,
Samsung, Technicolor and
Wistron are integrating AWS
Greengrass into their platforms.
“VMware and Dell, together,
are delivering powerful business
benefits that can drive down cost
and time-to-desktop that can have
a real impact to the bottom line
for organisations, and also to front
line IT practitioners,” said Sumit
Dhawan, Senior Vice President
and General Manager, End-User
Computing, VMware. “Integrating
industry-leading solutions from
both companies demonstrates
that we are better together and
in a stronger position to help
businesses frustrated with the
burden of managing multiple
vendor contracts, service
level agreements, solution
management consoles and
everything in between that drive
up the total cost of ownership.”
“Organisations are looking
for solutions that will help
them accelerate their workforce
transformation while controlling
cost and complexity,” said Steve
Lalla, Senior Vice President and
General Manager, commercial
client software and solutions, Dell.
“Through our close collaboration
with VMware, we are able to
deliver integrated solutions from
the endpoint to the data centre
and required software that will
provide even greater value to
organisations than ever before.”
Both VMware AirWatch
integration with Dell Client
Command Suite and the Dell
EMC VDI Complete Solutions
is available immediately
through partners.
From page 1 From page 1
VMware... HPE...
3
In the last two months itself, we have
seen a glimpse of what can transpire
if enterprises, whether small or
large, take cybersecurity lightly.
Both WannaCry and NotPetya, the
recent ransomware attacks, have
crippled organisations from going
about their regular operations and
had monumental information and
financial loss.
These kinds of attacks have
tested the security posture of
firms who had firmly believed that
their security systems can provide
adequate protection. WannaCry
ransomware has brought the
spotlight back on the fundamentals
of evaluating a firm’s security
vulnerabilities, ensuring security
awareness among end-users and
patching systems on time.
The business of selling security
solutions means that what we are
trading is based on ‘trust’. The
current market circumstances offer
huge opportunities for our partners,
both, from an advisory role and
selling holistic solutions. Partners
need to hone their skills in next-gen
anti-malware, patch management,
advanced email security, privileged
identity management and APT
protection solutions. They need
to elevate their role from being
only security solutions providers
to trusted IT security advisors and
consultants with a core competency
in specific industry verticals.
At Redington Value, we look
to continue enabling our resellers
in addressing the full life cycle
of information security needs of
regional customers. We provide
end-to-end support in sales, pre-
sales, consultancy and professional
services engagement in multiple
areas. We encourage our partners
to take advantage of our support
to be able to emerge as successful
security resellers.
Weathering the
cybersecurity
storm
By Hishamul Hasheel, VP, Software and
Security, Redington Value
COLUMN: REDefined
HPE Apollo 10 Series, are
optimised for entry level Deep
Learning and AI applications that
are easy to manage and deploy.
The HPE Apollo sx40 System is a
1U dual socket Intel Xeon Gen10
server with support for up to 4
NVIDIA Tesla SXM2 GPUs with
NVLink. The HPE Apollo pc40
System is a 1U dual socket Intel
Xeon Gen10 server with support
for up to 4 PCIe GPU cards.
HPE’s HPC systems are
enhanced by a new compute
experience designed to address
the data intense needs of HPC and
AI customers. The key elements
of the HPC experience include
enhanced firmware security and
increased agility with software
defined HPC capabilities.
For more information, please write to sales.value@redingtonmea.com
4. about alerts and affected endpoints
while providing metadata, so users
can quickly distinguish between
threats and false alarms and save
hours of legwork and research, said
the firm.
“When an attacker gets on an
endpoint, they gain a foothold in
your network – so what begins as
an inadvertent click on a well-
crafted phishing email can escalate
as attackers move laterally within
your network and gain access to
your sensitive information,” said
Fidelis Cybersecurity CTO Kurt
Bertone. “Security teams are
buried in alerts, so we designed
our technology to provide the
visibility, context and automation
that security professionals need to
detect, investigate and resolve the
modern threats that enterprises
face today.”
Fidelis Cybersecurity has
announced the availability of Fidelis
Endpoint Cloud, which is expected
to provide security personnel
with the visibility, context and
automation required to investigate
and resolve threats lurking on
endpoints and to protect their
organisations from cyberattacks.
According to the company, this
solution includes all the features
and benefits of the on-premise
Security solutions provider
CyberArk Software has acquired
privately-held Conjur, a Newton,
Massachusetts based provider of
DevOps security software for $42
million in cash.
Conjur’s technology for
securing DevOps extends
CyberArk’s reach deeper into
the DevOps lifecycle to protect
Conjur’s innovative DevOps
security solution is gaining
momentum with developers,
security and operations
teams in modern enterprise IT
organisations around the world.”
CyberArk acquires Conjur for $42 million
Conjur’stechnologyforsecuringDevOpsextendsCyberArk’sreachdeeperintotheDevOpslifecycle.
Fidelis Cybersecurity releases endpoint cloud solution
The solution includes all the benefits of the on-premise version of Fidelis Endpoint with the added convenience, scalability and
economy of a cloud-based deployment model.
44
secrets and manage machine
identities.
“While empowering
organisations with more
efficiency and speed, the DevOps
process is also dramatically
expanding the attack surface
across the entire enterprise,”
said Udi Mokady, Chairman and
CEO, CyberArk. “CyberArk’s
acquisition of Conjur further
strengthens our market
leadership position – providing
the industry’s only enterprise-
class solution for privileged
account security and secrets
management on premises,
in the cloud and across the
DevOps pipeline. Now with
Conjur, CyberArk customers can
truly embrace DevOps without
compromising on security.”
“Conjur’s innovative DevOps
security solution is gaining
standard for privileged account
security and secrets management,
helping customers move to a true
DevSecOps delivery model that
supports greater business agility.”
The CyberArk-Conjur
Solution for DevOps is available
now from CyberArk.
With the Fidelis Endpoint Cloud
offering, all of the management,
metadata and analytics components
of the Fidelis Endpoint solution
are deployed in a Fidelis-provided
cloud infrastructure – making it
possible for organisations to focus
on security without the distractions
of provisioning, patching and
maintaining their ‘back end’ security
infrastructure.
Fidelis Endpoint Cloud can be
deployed as a standalone solution
or in conjunction with the Fidelis
Network product. When used
together, network and endpoint
event data is automatically
correlated to confirm and validate
alerts and suspicious activity.
Fidelis Endpoint Cloud is
generally available and includes all
the benefits of the latest version of
the solution.
version of Fidelis Endpoint with
the added convenience, scalability
and economy of a cloud-based
deployment model with capacity-
based subscription pricing.
With Fidelis Endpoint,
users can quickly identify other
compromised machines, determine
the root cause of issues, and take
rapid response and remediation
actions. The solution eases the steps
needed to retrieve information
Elizabeth Lawler, Conjur
momentum with developers,
security and operations teams
in modern enterprise IT
organisations around the world,”
said Elizabeth Lawler, CEO
and Co-Founder, Conjur. “We
are excited to become part of
CyberArk to set a new industry
For more information, please write to sales.value@redingtonmea.com
5. The biometric authentication solution helps organisations secure their networks against
unauthorised access, while also reducing the risk of attack from hackers and identity thieves.
Fujitsu has launched PalmSecure
ID Login, a new biometric
authentication solution that
helps organisations secure their
networks against unauthorised
access, while also reducing the
risk of attack from hackers and
identity thieves.
According to the company,
PalmSecure ID Login integrates
Fujitsu rolls out new biometric
authentication solution
Fujitsu’s highly secure biometric
palm vein authentication
technology into corporate
network environments using
Microsoft Active Directory –
helping boost IT security while
also making it easier for users to
log on to their system without
needing to remember complex
passwords, which need to be
changed on a regular basis.
To log on to their PC,
or authenticate for internal
system access, PalmSecure ID
Login users simply hover their
hand over a contactless palm
vein scanner – already built
in to several Fujitsu Lifebook
notebooks and Stylistic 2-in-1
tablets, and available as a stand-
55
alone USB pluggable device.
Enrolled users can log in from
any device within a corporate
network, since PalmSecure ID
Login is connected to Microsoft
Active Directory, which centrally
manages and stores all access
data, including biometrics.
The Fujitsu PalmSecure
technology works by capturing
an infrared scan of oxygen-
depleted blood veins within the
palm of a hand. The technology
combines the convenience of a
contactless sensor with biometric
security. For users, the system
is more convenient and faster
than typing a password – with
identity verification usually
completed within one second,
said the firm.
Thomas Bengs, Director
and Head of Biometrics, Fujitsu,
EMEIA, said, “Passwords are
forgotten, lost and get stolen,
which makes them a serious
vulnerability in any organisation’s
security arrangements. Replacing
password logins with palm
vein biometric authentication
technology reduces the risk of
misuse from stolen or unsecured
passwords, including the worst-
case scenarios of catastrophic
hacker attacks, identity fraud
and large scale data theft. It’s
also impossible to forget your
credentials, since they’re in the
palm of your hand – unlike
a smart card, or a difficult to
remember password.”
Fujitsu PalmSecure ID Login
is available to order across EMEIA
from June 2017, with availability
in Oceania and the Americas to
follow. Fujitsu PalmSecure ID
Login is sold directly from Fujitsu
and through the firm’s partners
with pricing varying according to
geographical regions.
Fortinet has announced the
findings of its latest Global Threat
Landscape Report. The data
spans the cybersecurity kill chain
focusing on three central aspects
of the landscape, including
application exploits, malicious
software, and botnets against the
backdrop of important enterprise
technology and industry sector
Fortinet Threat Landscape report
highlights most threats are opportunistic
Research demonstrates highly automated cyber defenses are critical to
mitigate pervasive ‘cybercrime-as-a-service’ attacks.
Phil Quade, Fortinet
trends. The research reveals that
while more high profile attacks
have dominated the headlines,
the reality is that most threats
faced by most organisations are
opportunistic in nature fueled by
a pervasive Crime-as-a-Service
infrastructure.
Phil Quade, Chief Information
Security Officer, Fortinet said,
“As organisations increasingly
adopt convenience and cost-
saving IT techniques, such as
cloud services, or add a variety of
smart devices to their network,
visibility and control of their
security is at risk. Meanwhile,
attackers are buying or re-using
tools of their own. Cybersecurity
strategies need to increasingly
adopt trustworthy network
segmentation and high degrees of
automation to prevent and detect
adversaries’ efforts to target the
newly-exposed flanks of our
businesses and governments.”
Three important research
highlights are as follows:
Attack tools never forget and
are always ready for service,
anywhere and anytime:
Modern tools and Crime-as-a-
Service infrastructures enable
adversaries to operate on a
global scale at light speed. As
a result, the Internet seems
not interested in geographic
distances or boundaries because
most threat trends appear more
global than regional.
Hyperconvergence and IoT
are accelerating the spread
of malware: As networks
and users increasingly share
information and resources,
attacks are spreading rapidly
across distributed geographic
areas and a wide variety of
industries. Studying malware
can help provide views into the
preparation and intrusion stages
of these attacks.
Visibility of distributed
and elastic infrastructure is
diminishing: Visibility and control
over today’s infrastructures are
diminishing as the number of
potential attack vectors across
the expanded network landscape
continues to grow.
For more information, please write to sales.value@redingtonmea.com
6. Veeam - Partner Academy - Dubai - 5 June
Veeam - Enablement Session with Fujisoft - Dubai - 8 June
Fortinet and Redington Value Iftar - Amman - 12 June Barracuda,MicrosoftandRedingtonValueIftar-Dubai-12June
Fortinet - Enablement Session with Hilal Group - Dubai - 6 June
Sonicwall - CSSP Bootcamp - Dubai - 11-14 June
Huawei - Partner Pre Sales Training Program - Volume Server - Dubai - 13 June
CheckPointSuhoor-Manama-12June
6
EVENTS
DellEMC,VMwareandRSA-Iftar-Riyadh-13June
Fortinet-PartnerIftar-Jeddah-13June
For more information, please write to sales.value@redingtonmea.com
7. Veeam - Enablement Session with Atom Options - Dubai - 18 June
Fortinet and Redington Value Iftar - Dubai - 14 June
Huawei - Partner Pre Sales Training Program - Campus Switch - Dubai - 20 June Huawei - Partner Pre Sales Training Program - Entry Level - Dubai - 20 June
Malwarebytes and Redington Value Iftar - Dubai - 13 June
Veeam - Enablement Session with Atom Options - Dubai - 18 June
Huawei - Huawei Iftar with Partner - Jeddah -20 June Veeam - Enablement Session with Mezzan - Dubai - 22 June
Huawei - Partner Pre Sales Training Program - WiFi - Dubai - 13 June
HPE - Redington Value HPE Iftar - Riyadh - 20 June
7
For more information, please write to sales.value@redingtonmea.com
8. Cisco - Sales Floordays and Demos - Nigeria - 8 June
8
Cisco - Sales Floor Day & Demos - Tanzania - 2 June
Dell EMC - Partner Enablement Session - Kenya - 14 June
Dell EMC - Partner Enablement Session - Kenya - 7 June
Tripp Lite -Lunch and Learn Partner Session - Kenya - 15 June Cisco - Sales Floor Day and Demos - Kenya - 22 June
Fortinet - Partner Training - Uganda - 14 June
Symantec - Partner Event - Kenya - 15 June
Dell EMC - Partner Event - Kenya - 23 June Tripp Lite -Lunch and Learn Partner Session - Kenya - 29 June
Fortinet-PartnerTraining-Tanzania-6June
EVENTS
For more information, please write to sales.value@redingtonmea.com
9.
10. 10
Trend Micro has announced the
launch of a corporate venture
fund to explore emerging
technology markets. With an
initial investment of $100
million, this venture fund will
allow Trend Micro to nurture
We want our channel to feel
part of a mutually beneficial
partnership where both parties
are invested in driving growth
together.”
Trend Micro launches $100M venture fund
Theventurefundwillallowthefirmtoexploreemergingtechnologymarkets.
a portfolio of startups that are
incubating ideas and living at
the epicenter of hyper growth
markets, such as the Internet of
Things (IoT).
Eva Chen, Founder and
CEO, Trend Micro, said, “Trend
Micro’s vision has always been
to make the world safe for
exchanging digital information.
The explosion of devices is
transforming how the world
works, thinks and acts. It is
clear that the ecosystem is still
evolving and there is work to
do to ensure organisations and
individuals can operate and live
safely in this new reality.”
Trend Micro’s venture will
offer companies, financial
backing, access to its world-
class global threat intelligence,
strategic alliances, as well as its
Platforms today. The second
mega wave was all about the
cloud; we made a bet early
on to securing the cloud and
so far we have secured over
two billion workload hours on
Amazon Web Services (AWS)
alone. Now, we believe the next
wave has arrived with IoT; our
fund will help us harness this
opportunity.”
With a strong financial
position and 72 quarters of
consecutive profitability, Trend
Micro says it is well positioned
to invest funds to do research
and make advancements
consistent with its corporate
strategy. The formation of this
venture arm allows additional
freedom to dive into new
areas without disrupting core
business resources.
Eva Chen, Trend Micro
channel of more than 28,000
partners.
In return, working with
these investments will uncover
insights into emerging
ecosystem opportunities,
disruptive business models,
market gaps and skillset
shortages. These learnings
will influence Trend Micro’s
cybersecurity solution planning
across the company.
“We have a 29-year history
of successfully anticipating
technology trends to secure all
types of environments,” said
Chen. “The first mega wave
we caught was the growth
of the PC marketplace; we
committed early on to endpoint
protection and remain a Leader
in Gartner’s Magic Quadrant
for Endpoint Protection
Malwarebytes unveils inaugural
channel programme
Partners can look forward to attractive margins from the new EMEA channel programme.
Malwarebytes, the advanced
malware prevention and
remediation solution provider,
has introduced its inaugural
channel programme for
partners across EMEA.
According to the firm, the
programme has been designed
to be simple and focuses on
driving deal registrations
with a commitment from the
company to help its partners
“close business opportunities
quickly and easily.”
Where traditional
channel schemes evaluate
partners based on revenue,
Malwarebytes looks to
incentivise its reseller and
distributor network based on
the exposure and opportunity
reach they provide for the
security company. Partners
can attain gold and platinum
levels based on numbers
of deal registrations rather
than revenue, certification
programs or complex points
based programmes.
“As a company,
Malwarebytes has always
been innovative and we’re
carrying that ethos through
to our partner programme,”
said Anthony O’Mara, EMEA
Vice President, Malwarebytes.
“Vendors often make partners
jump through far too many
hoops, wanting arbitrary
criteria to be met, often
dictating to resellers how to
run their business. We’re not
doing any of that. We know
our partners run successful
businesses. So, we’ve
designed our programme to
be flexible, forward-looking
and mutually beneficial.
We want our channel to feel
part of a mutually beneficial
partnership where both parties
are invested in driving growth
together.”
By providing support
and positive incentives, the
company said that it is offering
the reseller community
the tools they need to take
advantage of the opportunities
in the security space.
For more information, please write to sales.value@redingtonmea.com
11. The new capabilities enable businesses to deliver digital life experience
users expect.
Veeam and Microsoft extend alliance to
deliver availability for the always-on cloud
Veeam Software has announced
new capabilities enabling any
business to deliver the digital
life experience users expect by
protecting applications and
data running in hybrid cloud
leveraging backup and disaster
recovery based on Microsoft Azure
and Veeam ‘Always-On Cloud’
Availability Platform.
The new capabilities include
the following:
Veeam Disaster Recovery in
Microsoft Azure simplifies and
automates a disaster recovery
in Azure, helping businesses
maintain business continuity and
availability of critical workloads
with all-encompassing on-demand
Peter McKay, Veeam
11
DR in Azure. Veeam DR in Azure
combines Veeam Direct Restore
and new Veeam PN (Veeam
Powered Network).
Veeam PN for Microsoft Azure is
designed to simplify and automate
the setup of a DR site in Azure
using lightweight software-defined
networking (SDN). It helps
maintain business continuity and
availability by eliminating the
complexity of VPN deployments
and is designed for businesses of all
sizes and service providers.
The company announced a
new Scale Out Backup Repository
(SOBR) support for cloud object
storage as an Archive Tier extent.
This new functionality, arriving
with Veeam Availability Suite
v10, enables customers to archive
Veeam backups to Azure Blob
storage. This native support helps
customers to leverage Azure to
reduce long-term data archival,
retention and compliance costs.
Veeam Agent for Microsoft
Windows, previously announced
and was made generally available
at VeeamON 2017 in May. This
solution extends Veeam ‘Always-
On Cloud’ Availability Platform
to public cloud and physical
servers. This new solution
offers features and capabilities
designed to ensure Availability for
Windows-based physical servers,
workstations and endpoints,
as well as Windows workloads
running in Azure.
Microsoft announced that it
will enable all Azure customers to
access and use disks in Azure up
to 4TB in size (previously 1TB).
This enhancement means Veeam
customers can fully realize a more
cost-effective solution using a
Veeam virtual appliance to back
up four times as much data in
Azure Storage.
The firm also announced an
update to its SaaS Availability
solution, Veeam Backup for Office
365. In this update, a multi-tenant
architecture enables protecting
larger Office 365 deployments
with a single installation, while
empowering Veeam Cloud and
Service Providers (VCSPs) to
deliver Office 365 backup services.
Peter McKay, Co-CEO
and President, Veeam, said,
“Veeam and Microsoft have
its customers covered with
new solutions for backup and
disaster recovery using Azure.
With Veeam, enterprises can
confidently move to Azure and
Hybrid Cloud, and be confident
that their data and applications
will always be available, no
matter what happens.”
Intoday’senvironmentofexplodingdatagrowth,
customersneedsupportforexistingandmodern
workloadsastheyupdatetheirinfrastructurewith
software-definedtechnologiestobemorenimble
andcost-efficient.”
Newest version of storage platform broadens protocol support to extend flexibility of object storage deployments for
traditional and modern workloads.
Red Hat has announced Red Hat
Ceph Storage 2.3. This release,
based on Ceph 10.2 (Jewel),
introduces a new Network File
System (NFS) interface, offers new
compatibility with the Hadoop S3A
filesystem client, and adds support
Red Hat Ceph storage release expands
versatility as object store
for deployment in containerised
environments. According to the
company, these improvements
expand the product’s versatility as
an object storage platform, offering
the ability to support big data
analytics and serve as a common
platform for file-based workloads
Red Hat Ceph Storage is an
open, software-defined, unified
storage platform. It decouples
software from hardware to run
cost-effectively on industry-
standard servers and disks, scales
flexibly and massively to support
multiple petabyte deployments,
and provides web-scale object
storage for modern use cases.
Ranga Rangachari, Vice
Ranga Rangachari, Red Hat
President and General Manager,
Storage, Red Hat, said, “In
today’s environment of exploding
data growth, customers need
support for existing and modern
workloads as they update their
infrastructure with software-
defined technologies to be more
nimble and cost-efficient. Red Hat
aims to assist customers with IT
modernisation, and object storage
advancements in Red Hat Ceph
Storage 2.3 coupled with Red Hat
Consulting and Global Support can
be instrumental to their transition
and ultimate success.”
Red Hat Ceph Storage 2.3
and its containerised image will
be generally available via the
Red Hat Customer Portal and on
the Red Hat Container Registry,
respectively.
For more information, please write to sales.value@redingtonmea.com