SlideShare a Scribd company logo
1 of 8
Download to read offline
For more information, please write to sales.value@redingtonmea.com
Issue 09 // March 2017
HPE DELIVERS DATA-
CENTRIC IOT SECURITY
HPE SecureData for Hadoop and IoT seamlessly integrates with Apache NiFi ecosystem,
adding Format-Preserving Encryption to wide-scale dataflows.
Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:
use, according to the company.
“While IoT and Big Data
analytics are driving new ways
for organisations to improve
efficiencies, identify new revenue
H
ewlett Packard
Enterprise (HPE)
has introduced
HPE SecureData
for Hadoop and
IoT, designed to secure sensitive
information that is generated
and transmitted across Internet
of Things (IoT) environments,
with HPE Format-preserving
Encryption (FPE). The solution
features the industry’s first-to-
market Apache NiFi integration
with NIST standardised and FIPS
compliant format-preserving
encryption technology to protect
IoT data at rest, in transit and in
streams, and innovate, they
are also creating new attack
vectors for leaking sensitive
information to adversaries,” said
Albert Biketi, Vice President and
General Manager, HPE Security,
Data Security, Hewlett Packard
Enterprise. “HPE SecureData
enables business users to easily
build data security in, delivering
persistent protection in IoT and
Big Data ecosystems, and allowing
organisations to securely innovate.”
Apache NiFi, is an integrated
data logistics platform for
automating the movement of
data between disparate systems.
It provides real-time control
that makes it easy to manage
the movement of data between
any source and any destination.
Derived from the National Security
Agency’s Niagarafiles project,
Apache NiFi is an open source
platform that enables security and
risk architects, as well as business
users, to graphically design and
easily manage data flows in their
Dell EMC unveils new integrated
partner programme
The new programme’s tenets are to be simple, predictable and profitable.
was built from the ground up and
retains the best characteristics
from the legacy programmes.
The new programme caters to
the needs of partners today while
also keeping in mind how that
might evolve in the future. Its
primary tenets are to be simple,
predictable and profitable.
John Byrne, President, Global
Channel, Dell EMC, said, “Dell
EMC provides vast opportunities to
our partners through an industry
leading portfolio of innovative
products, services and solutions,
and with the new programme,
Continued on page 2
Continued on page 2
John Byrne, Dell EMC
Dell EMC has officially launched
the integrated partner programme,
which according to the company,
provides the support for partners
to excel.”
The new programme tiers,
developed to elevate the company’s
partners over competitors and
establish a clear path to level-up,
For more information, please write to sales.value@redingtonmea.com
2
Our secure internet gateway,
Cisco Umbrella, can protect
today’s enterprise and
beyond as mobility increases
and new cloud services are
adopted.”
IoT or back-end environments. The
HPE SecureData NiFi integration
enables organisations to
incorporate data security into their
IoT strategies by allowing them to
more easily manage sensitive data
flows and insert encryption closer
to the intelligent edge.
Additionally, as an
expansion of HPE’s alliance with
Hortonworks, HPE SecureData
for Hadoop and IoT is the only
offering from a security vendor
certified to seamlessly integrate
with Hortonworks DataFlow
(HDF). This integration ensures
information is secured throughout
the dataflow management and
streaming analytics process as HDF
quickly collects, curates, analyses
and delivers insights in real-time,
on-premises or in the cloud.
HPE SecureData for Hadoop
and IoT extends data-centric
protection, enabling organisations
to encrypt data closer to the
intelligent edge before it moves
into the back-end Hadoop
Big Data environment, while
maintaining the original format
for processing and enabling secure
Big Data analytics.
HPE SecureData for Hadoop
and IoT is currently available
globally as part of the HPE
SecureData family.
include Titanium, Platinum and
Gold, and a new status level within
the Titanium Tier, Titanium Black.
Benefits to solution provider
partners include generous rebates
focused on profitable behaviours such
as driving new business, service sales
(inclusive of consulting, deployment,
support and education services),
training participation and selling the
full portfolio. As a partner progresses
their tier, benefits also increase.
The Titanium Black Status
is an invitation only, special
designation created to strengthen
the relationship with partners
who are extremely aligned with
the company.
The unified programme
embraces the entire Dell EMC
partner ecosystem, inclusive of
solution providers, cloud service
providers, strategic outsourcers,
OEM partners, systems
integrators and distribution
partners. It includes unique
tracks with specific advantages
and incentives that align to a
particular partner type and
attained tier designation.
As part of this full ecosystem
strategy, included as well is the
“Powered by Dell EMC” brand
programme for those businesses
that embed Dell EMC technologies
into the marketplace.
From page 1 From page 1
HPE delivers... Dell EMC...
Cisco releases Secure
Internet Gateway in the cloud
Cisco Umbrella provides visibility and protection against threats wherever users work.
Cisco has launched the industry’s
first Secure Internet Gateway
(SIG) in the cloud, Cisco
Umbrella, to address the new
enterprise security challenges of
today’s mobile, cloud-era.
Cisco Umbrella, a secure
internet gateway, is a cloud-
delivered security platform
that provides the first line of
defense to protect employees
both on and off the corporate
network. Umbrella stops
current and emergent threats
over all ports and protocols
for the most comprehensive
coverage. It blocks access to
malicious domains, URLs, IPs,
and files before a connection
is ever established or a file
downloaded. With most
threats targeting the endpoint,
it’s critical to cover all ports
and protocols to provide a
safety net that covers 100
percent of traffic. Umbrella’s
powerful, effective security
does not require the typical
operational complexity.
By performing everything
in the cloud, there is no
hardware to install, and no
software to manually update.
Organisations can provide
protection for all devices in
minutes and leverage their
existing Cisco investments —
including AnyConnect client,
Integrated Services Router
4K Series, and wireless LAN
controllers— to easily point
Internet traffic to Umbrella
whether on or off the
corporate network.
“Mobility has changed the
enterprise network. The cloud
has changed applications
– their development and
delivery – and how we think
about, access and store data.
Our secure internet gateway,
Cisco Umbrella, can protect
today’s enterprise and
beyond as mobility increases
and new cloud services are
adopted. It provides the most
comprehensive visibility and
enforcement for internet
traffic, and together with
Cloudlock, Cisco’s Cloud
Access Security Broker, it
enables discovery and control
for SaaS apps, both on and
off the corporate network,”
said David Ulevitch, Vice
President, General Manager,
Security Business Group,
Cisco Systems.
David Ulevitch, Cisco Systems
For more information, please write to sales.value@redingtonmea.com
3
Ramkumar Balakrishnan,
Redington Value
Maged Eid, Nexthink
7
Redington Value partners
with Nexthink as MEA VAD
The distributor will act as an end-to-end supply chain
solution provider for the company.
The distributor will deliver the company’s solutions for Big Data and security requirements.
Nexthink, a leader in end-user
experience management, has
announced that it has signed
a value-added distribution
partnership with Redington Value
for the Middle East and Africa.
Redington Value has
announced an agreement with
Gemini to distribute purpose-
built solutions for Big Data
and security across the META
region, including the Gemini
SBOX Appliance, a secure
appliance for Splunk.
Nexthink offers
organisations real-time
analytics and insights from an
employee perspective, to make
smarter data-driven decisions
and align their IT operations
with the needs of the business
and the end-users.
As part of the agreement,
Redington will act as an end-
to-end supply chain solution
provider for the company,
offering pre-and post-sales
expertise, training logistics,
marketing and financial
assistance (or credit services)
to its channel partners,
resellers, system integrators,
and customers.
Ramkumar Balakrishnan,
President, Redington Value
said, “Real-time analytics
help IT departments make
smarter business decisions;
and with an award-winning
software like Nexthink,
organisations will be
able to transform their
IT infrastructure. We are
extremely pleased to partner
with a vendor like Nexthink
and look forward to a long
and valuable partnership.”
Maged Eid, Regional
Director Middle East and
Africa (excluding KSA),
Nexthink, said, “We are
excited to welcome Redington
to our selective channel
network. The distributor has
an excellent track record
and market insights that
will further strengthen our
position and ensure that every
option is available to our
resellers and end-users.”
Gemini appoints Redington Value as
META distributor
The distributor will
deliver Gemini products
through its extensive
network of channel partners
throughout the Middle East,
Turkey and Africa.
“Redington Value is
excited to announce its
distribution partnership
with Gemini. The company
simplifies Big Data, which
is essential for businesses
who want to get the right
information,” said Ramkumar
Balakrishnan, President,
Redington Value. “With data
being generated everywhere,
from the IT data centre to
the Internet of Things, it
has become increasingly
important to monitor, analyse
and drive value from data. Our
collaboration with Gemini
represents a strategic
addition to our existing
portfolio and supports one of
our key initiatives – enabling
the channel to provide
cutting-edge technology to
the market.”
“We’re dedicated to
serving the Middle East and
are continuing to invest
in the region to support
our growing number of
customers. Redington Value
is the perfect partner to
help us rapidly build on the
successful momentum we’ve
had in the region. We’re
thrilled to work with them
as our sole distributor in
META,” said Tony Ayaz, Co-
Founder and CEO, Gemini.
Post cybersecurity firm Symantec’s
acquisition of Blue Coat last year,
the company has unveiled an
integrated partner programme –
Symantec Secure One.
According to the company’s
Global Partner Sales leader,
Torjus Gylstorf, the programme,
which will be launched this
spring, is designed to give
partners more opportunity for
growth and profitability.
He said, “The new programme
will be even easier to navigate
based on two competences – Core
Security and Enterprise Security
– for our combined enterprise
portfolio. Partners will have a
huge opportunity to cross-sell
and up-sell, providing our mutual
customers with leading solutions
to solve the world’s biggest
cybersecurity problems.”
Other key initiatives that
partners can expect from
Symantec Secure One include
transitioning opportunity
registration to a front-end
discount only, which ensures that
the financials of doing business
with the company will be more
predictable moving forward.
Gylstorf added, “We’re also
creating new opportunities
to earn with a Platinum
Performance Rebate, Renewal
Incumbency, and by enabling
partners to submit an
unlimited number of activity
proposals for Symantec Partner
Development Funds.
“With a $30-billion-dollar
opportunity in cybersecurity, we
will see massive growth potential
in our industry this year. We’re
excited about this new era for
our company, our partnership
and our programme, and we look
forward to defining the future of
cybersecurity, together.”
Symanteclaunches
integratedpartner
programme
The programme is designed
to offer partners more
opportunity for growth and
profitability.
For more information, please write to sales.value@redingtonmea.com
Aruba Networks - WLAN Partner Workshop - Dubai - 7 February
Entrust - Partner Bootcamp - Dubai - 19-23 February
Fortinet - Partner Meet - Dubai - 1 February
Zoolz - Partner Roundtable - Dubai - 21 February
Oracle - Primavera Day - Dubai - 1 February
Fortinet - Partner Meet - Bahrain - 16 FebruaryOracle - Hands-on Workshop - Riyadh - 2 February
Trend Micro - Security Seminar with Partner EBM - Dubai - 21 February
Oracle - SAP Customer Roundtable - Doha - 20 February
44
EVENTS
For more information, please write to sales.value@redingtonmea.com
Check Point - vSEC Technical Bootcamp - Doha - 23 February
Fortinet - Partner Training Session - Uganda - 23 February
Fortinet - Partner Training Session - Tanzania - 27 February
Symantec - Partner Training Session - Kenya - 23 February
Microsoft - Azure Workshop on Red Hat Solutions - Dubai - 23 February
Avaya - Partner Training Session - Kenya - 24 February
Avaya - Partner Training Session - Kenya - 17 February
TrippLite - Lunch & Learn Partner Session - Kenya - 28 February
55
For more information, please write to sales.value@redingtonmea.com
6
“Our ‘Cloud Ready’ programme is a
great example of this philosophy, giving
customers the flexibility, choice and
freedom to begin cloud deployments
without upfront costs.”
The new programme provides 90-day licenses for use in AWS or Microsoft Azure at no additional cost to customers that
purchase qualifying network and application security products.
Barracuda has announced its
new ‘Cloud Ready’ programme
designed to help organisations
securely extend their workloads
and applications into cloud
environments. With each new
purchase of the company’s
on-premises NextGen Firewall
Barracuda announces ‘Cloud Ready’ programme
or Web Application Firewall –
including both physical and virtual
deployments – the firm provides a
cloud license for the same solution
in Amazon Web Services (AWS)
and Microsoft Azure (Azure) at no
additional cost for up to 90 days.
Leveraging Barracuda’s cloud-
enabled security suite, organisations
can deploy their applications and
workloads securely with the same
powerful capabilities and intuitive
user interface whether deployed
on-premises or in the cloud, said
the company.
“In the burgeoning cloud era, IT
buyers are in the difficult position of
trying to meet the computing needs
of today while determining where
the compute environment will live
over the next few years,” said BJ
Jenkins, CEO, Barracuda. “With
our ‘Cloud Ready’ programme,
Barracuda helps to simplify
that process. We are empowering
customers to make the right decisions
for their businesses today, while
enabling them to begin sampling
cloud with new or existing workloads
secured with leading-edge application
security and firewall technology.”
“Barracuda’s built our business
around simplicity,” said Michael
Hughes, Senior Vice President,
Worldwide Sales, Barracuda. “We’ve
designed our business model to make
things easy for customers to leverage
advanced security technology for
their businesses. Our ‘Cloud Ready’
programme is a great example of
this philosophy, giving customers
the flexibility, choice and freedom
to begin cloud deployments without
upfront costs.”
Vinay Anand, Aruba
New Niara UEBA enhancements help reduce security concerns by accelerating detection and
response for internally targeted attacks.
Following the recent acquisition
of user and entity behavioral
analytics (UEBA) firm Niara,
Aruba, a Hewlett Packard
Enterprise company, has
introduced new capabilities for
the Niara behavioral analytics
HPE Aruba introduces new
capabilities for Niara
solution to better protect data
and high-value corporate assets.
The latest Niara
enhancements are designed
to eliminate security concerns
caused by one of the most
significant challenges facing
security teams – when advanced,
next-generation attacks breach
perimeter-based security systems
such as firewalls and security
information event managers
(SIEMs). These types of
attacks typically go undetected
and have unrestricted access
across an organisation’s entire
infrastructure, resulting in
significant risks to conventional
users and devices, as well as to
Internet of Things (IoT) that
are used to control equipment
on factory floors and smart
buildings.
To help address these issues,
new Niara machine-learning and
incident investigation workflow
features, including Adaptive
Learning and Analyst Playbooks,
enable more precise attack
detection for high-value assets
and devices and users, resulting
in faster decision making for
remediation and response. When
these new Niara features are
combined with Aruba’s ClearPass
Policy Manager, individual
incidents that reach a certain risk
score within the Niara solution
(ranging from 1 to 100) can use
pre-defined ClearPass policies
to automatically quarantine,
or completely shut off network
access, providing security teams
with additional time to thoroughly
investigate the incidents.
Niara 2.0 implements new
machine learning and incident
investigation techniques, allowing
security analysts to focus their
attention on the highest priority
threats for rapid response.
“For security and network
infrastructure teams, it’s a never-
ending war against hackers,” said
Vinay Anand, Vice President and
General Manager of ClearPass
Security, at Aruba. “New features
built into the Niara security
solution are providing enterprises
with the equivalent of precision-
guided missiles that work closely
together with perimeter-based
systems to better protect data
and other corporate assets
against current and future next-
gen hacker attacks. With Niara,
Aruba is the only security vendor
that can identify potential threats
and immediately take action to
shut down an incident before
damage occurs.”
For more information, please write to sales.value@redingtonmea.com
Sayed Shamshuddin, Gigamon
“Gigamon
provides its
partners with
solutions to
help drive
incremental
revenue through
comprehensive
pre- and post-
sales support.”
The company’s Sales Director for MEA Sayed Shamshuddin on the importance of network
visibility and shares plans for the region.
How has the last 12 months
been for Gigamon in the
region?
Gigamon has been doing
exceptionally well in the region.
The Middle East and Africa is
Gigamon to roll out channel
enablement initiatives in 2017
an important market for us. The
team in the region is growing and
Gigamon is fully committed to
investing heavily in the region.
Why is network visibility vital
for today’s digital businesses?
With the networks getting faster
and attacks becoming more
sophisticated, just monitoring
traffic at one point no longer
suffices. It is increasingly difficult
to isolate a threat in real time
especially if it is an APT or a slow
and low attack. Only with full
visibility across the physical, virtual
and cloud environments is it
possible to gain enough intelligence
to isolate a threat in a quick time
frame. Gigamon has offerings like
GigaSECURE, a Security Delivery
Platform that allows organisations
to have pervasive visibility of
their network traffic, users and
applications.
What is Gigamon’s
channel strategy and what
kind of initiatives can
partners expect from you
this 2017?
Gigamon provides its partners
with solutions to help drive
incremental revenue through
comprehensive pre- and post-
sales support. With channel
playing a strategic role for us,
we continue to invest in our
partners by offering training,
both in sales and technical
streams, enabling them to sell
and service Gigamon products.
This year, we have planned
a series of end-user events
across GCC that will increase
awareness about our offerings
in this market. We believe that
these kinds of initiatives will give
us the opportunity to bolster the
relationship with our partners,
subsequently, it will also enable
our partners to reach out to
current and potential customers.
NewXGensecurityfeaturesenhanceserverprotectionand
extendtocontainerarchitectures.
security solutions. With this
release, Deep Security continues
its industry leadership protecting
physical, virtual and cloud servers
across leading environments
such as VMware, Amazon Web
Services (AWS) and Microsoft
Azure, adding multiple new
security techniques that have
been optimised for maximum
performance, operational
efficiency and response to newly
discovered threats.
Deep Security includes a smart
blend of cross generational threat
defense techniques for protecting
servers from known bad threats,
including anti-malware and
intrusion prevention (IPS) to detect
and stop sophisticated attacks. As a
Trend Micro, a global provider
of cybersecurity solutions,
has announced the upcoming
availability of Trend Micro Deep
Security 10, powered by XGen
Security. XGen Security is a
blend of cross-generational threat
defense techniques fueled by
market leading threat intelligence,
and powers all of the company’s
Trend Micro launches
Deep Security 10
part of the XGen Security strategy,
Deep Security 10 adds multiple
new security techniques, including
the prevention of unauthorised
software changes with application
control. Reimagined for the
hybrid cloud, the new application
control feature can protect servers
from sophisticated attacks such
as ransomware, even when
applications are constantly
changing and elastic workloads
are distributed across virtual and
cloud environments.
Deep Security 10 also supports
sandbox integration with Trend
Micro Deep Discovery, and will
also soon add machine learning
to its list of advanced threat
defense techniques, according to
the company.
Deep Security is optimised for
VMware, AWS and Microsoft
Azure deployments, delivering full
visibility that enables automated
discovery and protection of servers.
This new release adds many
integration and management
enhancements, including faster
connection and time to protection
for AWS and Azure workloads, along
with support for the latest Azure
account format, Azure Resource
Manager v2 (ARM). It also expands
beyond server workloads to protect
Docker containers, leveraging proven
techniques like anti-malware, IPS
and application control to protect
dynamic container deployments.
“In addition to embracing
and helping our customers with
important new infrastructure
changes like Docker containers,
Deep Security 10 also addresses
the need to purchase security
differently,” said Bill McGee, Senior
Vice President and General Manager,
hybrid cloud security for Trend
Micro. “Deep Security is available as
software, as-a-service, and through
the AWS and Azure marketplaces,
giving organisations unparalleled
purchasing flexibility, including per
hour pricing matched to the cloud.”
Deep Security 10 will be available
in March 2017.
7
Redington Value Journal - March 2017

More Related Content

What's hot

T-Bytes Agile & AI Operations
T-Bytes Agile & AI OperationsT-Bytes Agile & AI Operations
T-Bytes Agile & AI OperationsEGBG Services
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insightsVU
 
Dimension Data Overview Infographic
Dimension Data Overview InfographicDimension Data Overview Infographic
Dimension Data Overview InfographicDImension Data
 
Dimension Data - Company Profile
Dimension Data - Company ProfileDimension Data - Company Profile
Dimension Data - Company Profilekojoboy
 
Benefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – NetmagicBenefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – NetmagicNetmagic Solutions Pvt. Ltd.
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaAccenture Italia
 
Sariya it 2019
Sariya it 2019Sariya it 2019
Sariya it 2019Sariya IT
 
Dimension Data Corporate Overview Presentation (US)
Dimension Data Corporate Overview Presentation (US)Dimension Data Corporate Overview Presentation (US)
Dimension Data Corporate Overview Presentation (US)Adam Petrovsky
 
Software_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalSoftware_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalKhiro Mishra
 

What's hot (20)

Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
Host your Cloud – Netmagic Solutions
Host your Cloud – Netmagic SolutionsHost your Cloud – Netmagic Solutions
Host your Cloud – Netmagic Solutions
 
T-Bytes Agile & AI Operations
T-Bytes Agile & AI OperationsT-Bytes Agile & AI Operations
T-Bytes Agile & AI Operations
 
Huawei ict insights
Huawei ict insightsHuawei ict insights
Huawei ict insights
 
Dimension Data Overview Infographic
Dimension Data Overview InfographicDimension Data Overview Infographic
Dimension Data Overview Infographic
 
Netmagic the-storage-matrix
Netmagic the-storage-matrixNetmagic the-storage-matrix
Netmagic the-storage-matrix
 
Why Dimension Data?
Why Dimension Data?Why Dimension Data?
Why Dimension Data?
 
Dimension Data - Company Profile
Dimension Data - Company ProfileDimension Data - Company Profile
Dimension Data - Company Profile
 
Benefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – NetmagicBenefits of a Virtual Private Cloud (VPC) – Netmagic
Benefits of a Virtual Private Cloud (VPC) – Netmagic
 
Today's Need To Manage The Storage Polymorphism
Today's Need To Manage The Storage PolymorphismToday's Need To Manage The Storage Polymorphism
Today's Need To Manage The Storage Polymorphism
 
Redington Value Journal - January 2019
Redington Value Journal - January 2019Redington Value Journal - January 2019
Redington Value Journal - January 2019
 
Redington Value Journal - June 2016
Redington Value Journal - June 2016Redington Value Journal - June 2016
Redington Value Journal - June 2016
 
J3602068071
J3602068071J3602068071
J3602068071
 
I Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - ItaliaI Costi del Cybercrime 2017 - Italia
I Costi del Cybercrime 2017 - Italia
 
What the future holds for the hybrid cloud
What the future holds for the hybrid cloudWhat the future holds for the hybrid cloud
What the future holds for the hybrid cloud
 
Sariya it 2019
Sariya it 2019Sariya it 2019
Sariya it 2019
 
Redington Value Journal - December 2016
Redington Value Journal - December 2016Redington Value Journal - December 2016
Redington Value Journal - December 2016
 
Intercloud_Fabric
Intercloud_FabricIntercloud_Fabric
Intercloud_Fabric
 
Dimension Data Corporate Overview Presentation (US)
Dimension Data Corporate Overview Presentation (US)Dimension Data Corporate Overview Presentation (US)
Dimension Data Corporate Overview Presentation (US)
 
Software_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_finalSoftware_defines_the_future_infrastructure (1)_final
Software_defines_the_future_infrastructure (1)_final
 

Similar to Redington Value Journal - March 2017

T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021EGBG Services
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxhendrik441443
 
Company Profile
Company ProfileCompany Profile
Company ProfileITB001
 
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...Chandrakumar Natarajan
 
T-Byte Hybrid cloud infrastructure
T-Byte Hybrid cloud infrastructureT-Byte Hybrid cloud infrastructure
T-Byte Hybrid cloud infrastructureEGBG Services
 

Similar to Redington Value Journal - March 2017 (20)

Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021T-Byte Hybrid Cloud Infrastructure July 2021
T-Byte Hybrid Cloud Infrastructure July 2021
 
Redington Value Journal - September 2016
Redington Value Journal - September 2016Redington Value Journal - September 2016
Redington Value Journal - September 2016
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Redington Value Journal - December 2017
Redington Value Journal - December 2017Redington Value Journal - December 2017
Redington Value Journal - December 2017
 
Company Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptxCompany Profile Managemenyt company.pptx
Company Profile Managemenyt company.pptx
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
 
Redington Value Journal - February 2018
Redington Value Journal - February 2018Redington Value Journal - February 2018
Redington Value Journal - February 2018
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
Dimension Data And EMC Expand Their Partnership With The Formation Of The Cat...
 
Redington Value Journal - January 2017
Redington Value Journal - January 2017Redington Value Journal - January 2017
Redington Value Journal - January 2017
 
Redington Value Journal - June 2017
Redington Value Journal - June 2017Redington Value Journal - June 2017
Redington Value Journal - June 2017
 
Redington Value Journal - June 2019
Redington Value Journal - June 2019Redington Value Journal - June 2019
Redington Value Journal - June 2019
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Redington Value Journal - March 2018
Redington Value Journal - March 2018Redington Value Journal - March 2018
Redington Value Journal - March 2018
 
T-Byte Hybrid cloud infrastructure
T-Byte Hybrid cloud infrastructureT-Byte Hybrid cloud infrastructure
T-Byte Hybrid cloud infrastructure
 
Redington Value Journal - November 2017
Redington Value Journal - November 2017Redington Value Journal - November 2017
Redington Value Journal - November 2017
 
Redington Value Journal - April 2018
Redington Value Journal - April 2018Redington Value Journal - April 2018
Redington Value Journal - April 2018
 
Redington Value Journal - August 2018
Redington Value Journal - August 2018Redington Value Journal - August 2018
Redington Value Journal - August 2018
 

More from Redington Value Distribution

More from Redington Value Distribution (18)

Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Value journal September_2019
Value journal September_2019 Value journal September_2019
Value journal September_2019
 
Redington Value journal - August 2019
Redington Value journal - August 2019 Redington Value journal - August 2019
Redington Value journal - August 2019
 
Redington Value Journal - July 2019
Redington Value Journal - July 2019Redington Value Journal - July 2019
Redington Value Journal - July 2019
 
Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019Value Stories - 3rd issue - April 2019
Value Stories - 3rd issue - April 2019
 
Redington Value Journal - April 2019
Redington Value Journal - April 2019Redington Value Journal - April 2019
Redington Value Journal - April 2019
 
Redington Value Journal - November 2018
Redington Value Journal - November 2018Redington Value Journal - November 2018
Redington Value Journal - November 2018
 
Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018Value Stories - 2nd issue - October 2018
Value Stories - 2nd issue - October 2018
 

Recently uploaded

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

Redington Value Journal - March 2017

  • 1. For more information, please write to sales.value@redingtonmea.com Issue 09 // March 2017 HPE DELIVERS DATA- CENTRIC IOT SECURITY HPE SecureData for Hadoop and IoT seamlessly integrates with Apache NiFi ecosystem, adding Format-Preserving Encryption to wide-scale dataflows. Redington Value is a value added distributor for the following brands in parts of Middle East & Africa: use, according to the company. “While IoT and Big Data analytics are driving new ways for organisations to improve efficiencies, identify new revenue H ewlett Packard Enterprise (HPE) has introduced HPE SecureData for Hadoop and IoT, designed to secure sensitive information that is generated and transmitted across Internet of Things (IoT) environments, with HPE Format-preserving Encryption (FPE). The solution features the industry’s first-to- market Apache NiFi integration with NIST standardised and FIPS compliant format-preserving encryption technology to protect IoT data at rest, in transit and in streams, and innovate, they are also creating new attack vectors for leaking sensitive information to adversaries,” said Albert Biketi, Vice President and General Manager, HPE Security, Data Security, Hewlett Packard Enterprise. “HPE SecureData enables business users to easily build data security in, delivering persistent protection in IoT and Big Data ecosystems, and allowing organisations to securely innovate.” Apache NiFi, is an integrated data logistics platform for automating the movement of data between disparate systems. It provides real-time control that makes it easy to manage the movement of data between any source and any destination. Derived from the National Security Agency’s Niagarafiles project, Apache NiFi is an open source platform that enables security and risk architects, as well as business users, to graphically design and easily manage data flows in their Dell EMC unveils new integrated partner programme The new programme’s tenets are to be simple, predictable and profitable. was built from the ground up and retains the best characteristics from the legacy programmes. The new programme caters to the needs of partners today while also keeping in mind how that might evolve in the future. Its primary tenets are to be simple, predictable and profitable. John Byrne, President, Global Channel, Dell EMC, said, “Dell EMC provides vast opportunities to our partners through an industry leading portfolio of innovative products, services and solutions, and with the new programme, Continued on page 2 Continued on page 2 John Byrne, Dell EMC Dell EMC has officially launched the integrated partner programme, which according to the company, provides the support for partners to excel.” The new programme tiers, developed to elevate the company’s partners over competitors and establish a clear path to level-up,
  • 2. For more information, please write to sales.value@redingtonmea.com 2 Our secure internet gateway, Cisco Umbrella, can protect today’s enterprise and beyond as mobility increases and new cloud services are adopted.” IoT or back-end environments. The HPE SecureData NiFi integration enables organisations to incorporate data security into their IoT strategies by allowing them to more easily manage sensitive data flows and insert encryption closer to the intelligent edge. Additionally, as an expansion of HPE’s alliance with Hortonworks, HPE SecureData for Hadoop and IoT is the only offering from a security vendor certified to seamlessly integrate with Hortonworks DataFlow (HDF). This integration ensures information is secured throughout the dataflow management and streaming analytics process as HDF quickly collects, curates, analyses and delivers insights in real-time, on-premises or in the cloud. HPE SecureData for Hadoop and IoT extends data-centric protection, enabling organisations to encrypt data closer to the intelligent edge before it moves into the back-end Hadoop Big Data environment, while maintaining the original format for processing and enabling secure Big Data analytics. HPE SecureData for Hadoop and IoT is currently available globally as part of the HPE SecureData family. include Titanium, Platinum and Gold, and a new status level within the Titanium Tier, Titanium Black. Benefits to solution provider partners include generous rebates focused on profitable behaviours such as driving new business, service sales (inclusive of consulting, deployment, support and education services), training participation and selling the full portfolio. As a partner progresses their tier, benefits also increase. The Titanium Black Status is an invitation only, special designation created to strengthen the relationship with partners who are extremely aligned with the company. The unified programme embraces the entire Dell EMC partner ecosystem, inclusive of solution providers, cloud service providers, strategic outsourcers, OEM partners, systems integrators and distribution partners. It includes unique tracks with specific advantages and incentives that align to a particular partner type and attained tier designation. As part of this full ecosystem strategy, included as well is the “Powered by Dell EMC” brand programme for those businesses that embed Dell EMC technologies into the marketplace. From page 1 From page 1 HPE delivers... Dell EMC... Cisco releases Secure Internet Gateway in the cloud Cisco Umbrella provides visibility and protection against threats wherever users work. Cisco has launched the industry’s first Secure Internet Gateway (SIG) in the cloud, Cisco Umbrella, to address the new enterprise security challenges of today’s mobile, cloud-era. Cisco Umbrella, a secure internet gateway, is a cloud- delivered security platform that provides the first line of defense to protect employees both on and off the corporate network. Umbrella stops current and emergent threats over all ports and protocols for the most comprehensive coverage. It blocks access to malicious domains, URLs, IPs, and files before a connection is ever established or a file downloaded. With most threats targeting the endpoint, it’s critical to cover all ports and protocols to provide a safety net that covers 100 percent of traffic. Umbrella’s powerful, effective security does not require the typical operational complexity. By performing everything in the cloud, there is no hardware to install, and no software to manually update. Organisations can provide protection for all devices in minutes and leverage their existing Cisco investments — including AnyConnect client, Integrated Services Router 4K Series, and wireless LAN controllers— to easily point Internet traffic to Umbrella whether on or off the corporate network. “Mobility has changed the enterprise network. The cloud has changed applications – their development and delivery – and how we think about, access and store data. Our secure internet gateway, Cisco Umbrella, can protect today’s enterprise and beyond as mobility increases and new cloud services are adopted. It provides the most comprehensive visibility and enforcement for internet traffic, and together with Cloudlock, Cisco’s Cloud Access Security Broker, it enables discovery and control for SaaS apps, both on and off the corporate network,” said David Ulevitch, Vice President, General Manager, Security Business Group, Cisco Systems. David Ulevitch, Cisco Systems
  • 3. For more information, please write to sales.value@redingtonmea.com 3 Ramkumar Balakrishnan, Redington Value Maged Eid, Nexthink 7 Redington Value partners with Nexthink as MEA VAD The distributor will act as an end-to-end supply chain solution provider for the company. The distributor will deliver the company’s solutions for Big Data and security requirements. Nexthink, a leader in end-user experience management, has announced that it has signed a value-added distribution partnership with Redington Value for the Middle East and Africa. Redington Value has announced an agreement with Gemini to distribute purpose- built solutions for Big Data and security across the META region, including the Gemini SBOX Appliance, a secure appliance for Splunk. Nexthink offers organisations real-time analytics and insights from an employee perspective, to make smarter data-driven decisions and align their IT operations with the needs of the business and the end-users. As part of the agreement, Redington will act as an end- to-end supply chain solution provider for the company, offering pre-and post-sales expertise, training logistics, marketing and financial assistance (or credit services) to its channel partners, resellers, system integrators, and customers. Ramkumar Balakrishnan, President, Redington Value said, “Real-time analytics help IT departments make smarter business decisions; and with an award-winning software like Nexthink, organisations will be able to transform their IT infrastructure. We are extremely pleased to partner with a vendor like Nexthink and look forward to a long and valuable partnership.” Maged Eid, Regional Director Middle East and Africa (excluding KSA), Nexthink, said, “We are excited to welcome Redington to our selective channel network. The distributor has an excellent track record and market insights that will further strengthen our position and ensure that every option is available to our resellers and end-users.” Gemini appoints Redington Value as META distributor The distributor will deliver Gemini products through its extensive network of channel partners throughout the Middle East, Turkey and Africa. “Redington Value is excited to announce its distribution partnership with Gemini. The company simplifies Big Data, which is essential for businesses who want to get the right information,” said Ramkumar Balakrishnan, President, Redington Value. “With data being generated everywhere, from the IT data centre to the Internet of Things, it has become increasingly important to monitor, analyse and drive value from data. Our collaboration with Gemini represents a strategic addition to our existing portfolio and supports one of our key initiatives – enabling the channel to provide cutting-edge technology to the market.” “We’re dedicated to serving the Middle East and are continuing to invest in the region to support our growing number of customers. Redington Value is the perfect partner to help us rapidly build on the successful momentum we’ve had in the region. We’re thrilled to work with them as our sole distributor in META,” said Tony Ayaz, Co- Founder and CEO, Gemini. Post cybersecurity firm Symantec’s acquisition of Blue Coat last year, the company has unveiled an integrated partner programme – Symantec Secure One. According to the company’s Global Partner Sales leader, Torjus Gylstorf, the programme, which will be launched this spring, is designed to give partners more opportunity for growth and profitability. He said, “The new programme will be even easier to navigate based on two competences – Core Security and Enterprise Security – for our combined enterprise portfolio. Partners will have a huge opportunity to cross-sell and up-sell, providing our mutual customers with leading solutions to solve the world’s biggest cybersecurity problems.” Other key initiatives that partners can expect from Symantec Secure One include transitioning opportunity registration to a front-end discount only, which ensures that the financials of doing business with the company will be more predictable moving forward. Gylstorf added, “We’re also creating new opportunities to earn with a Platinum Performance Rebate, Renewal Incumbency, and by enabling partners to submit an unlimited number of activity proposals for Symantec Partner Development Funds. “With a $30-billion-dollar opportunity in cybersecurity, we will see massive growth potential in our industry this year. We’re excited about this new era for our company, our partnership and our programme, and we look forward to defining the future of cybersecurity, together.” Symanteclaunches integratedpartner programme The programme is designed to offer partners more opportunity for growth and profitability.
  • 4. For more information, please write to sales.value@redingtonmea.com Aruba Networks - WLAN Partner Workshop - Dubai - 7 February Entrust - Partner Bootcamp - Dubai - 19-23 February Fortinet - Partner Meet - Dubai - 1 February Zoolz - Partner Roundtable - Dubai - 21 February Oracle - Primavera Day - Dubai - 1 February Fortinet - Partner Meet - Bahrain - 16 FebruaryOracle - Hands-on Workshop - Riyadh - 2 February Trend Micro - Security Seminar with Partner EBM - Dubai - 21 February Oracle - SAP Customer Roundtable - Doha - 20 February 44 EVENTS
  • 5. For more information, please write to sales.value@redingtonmea.com Check Point - vSEC Technical Bootcamp - Doha - 23 February Fortinet - Partner Training Session - Uganda - 23 February Fortinet - Partner Training Session - Tanzania - 27 February Symantec - Partner Training Session - Kenya - 23 February Microsoft - Azure Workshop on Red Hat Solutions - Dubai - 23 February Avaya - Partner Training Session - Kenya - 24 February Avaya - Partner Training Session - Kenya - 17 February TrippLite - Lunch & Learn Partner Session - Kenya - 28 February 55
  • 6. For more information, please write to sales.value@redingtonmea.com 6 “Our ‘Cloud Ready’ programme is a great example of this philosophy, giving customers the flexibility, choice and freedom to begin cloud deployments without upfront costs.” The new programme provides 90-day licenses for use in AWS or Microsoft Azure at no additional cost to customers that purchase qualifying network and application security products. Barracuda has announced its new ‘Cloud Ready’ programme designed to help organisations securely extend their workloads and applications into cloud environments. With each new purchase of the company’s on-premises NextGen Firewall Barracuda announces ‘Cloud Ready’ programme or Web Application Firewall – including both physical and virtual deployments – the firm provides a cloud license for the same solution in Amazon Web Services (AWS) and Microsoft Azure (Azure) at no additional cost for up to 90 days. Leveraging Barracuda’s cloud- enabled security suite, organisations can deploy their applications and workloads securely with the same powerful capabilities and intuitive user interface whether deployed on-premises or in the cloud, said the company. “In the burgeoning cloud era, IT buyers are in the difficult position of trying to meet the computing needs of today while determining where the compute environment will live over the next few years,” said BJ Jenkins, CEO, Barracuda. “With our ‘Cloud Ready’ programme, Barracuda helps to simplify that process. We are empowering customers to make the right decisions for their businesses today, while enabling them to begin sampling cloud with new or existing workloads secured with leading-edge application security and firewall technology.” “Barracuda’s built our business around simplicity,” said Michael Hughes, Senior Vice President, Worldwide Sales, Barracuda. “We’ve designed our business model to make things easy for customers to leverage advanced security technology for their businesses. Our ‘Cloud Ready’ programme is a great example of this philosophy, giving customers the flexibility, choice and freedom to begin cloud deployments without upfront costs.” Vinay Anand, Aruba New Niara UEBA enhancements help reduce security concerns by accelerating detection and response for internally targeted attacks. Following the recent acquisition of user and entity behavioral analytics (UEBA) firm Niara, Aruba, a Hewlett Packard Enterprise company, has introduced new capabilities for the Niara behavioral analytics HPE Aruba introduces new capabilities for Niara solution to better protect data and high-value corporate assets. The latest Niara enhancements are designed to eliminate security concerns caused by one of the most significant challenges facing security teams – when advanced, next-generation attacks breach perimeter-based security systems such as firewalls and security information event managers (SIEMs). These types of attacks typically go undetected and have unrestricted access across an organisation’s entire infrastructure, resulting in significant risks to conventional users and devices, as well as to Internet of Things (IoT) that are used to control equipment on factory floors and smart buildings. To help address these issues, new Niara machine-learning and incident investigation workflow features, including Adaptive Learning and Analyst Playbooks, enable more precise attack detection for high-value assets and devices and users, resulting in faster decision making for remediation and response. When these new Niara features are combined with Aruba’s ClearPass Policy Manager, individual incidents that reach a certain risk score within the Niara solution (ranging from 1 to 100) can use pre-defined ClearPass policies to automatically quarantine, or completely shut off network access, providing security teams with additional time to thoroughly investigate the incidents. Niara 2.0 implements new machine learning and incident investigation techniques, allowing security analysts to focus their attention on the highest priority threats for rapid response. “For security and network infrastructure teams, it’s a never- ending war against hackers,” said Vinay Anand, Vice President and General Manager of ClearPass Security, at Aruba. “New features built into the Niara security solution are providing enterprises with the equivalent of precision- guided missiles that work closely together with perimeter-based systems to better protect data and other corporate assets against current and future next- gen hacker attacks. With Niara, Aruba is the only security vendor that can identify potential threats and immediately take action to shut down an incident before damage occurs.”
  • 7. For more information, please write to sales.value@redingtonmea.com Sayed Shamshuddin, Gigamon “Gigamon provides its partners with solutions to help drive incremental revenue through comprehensive pre- and post- sales support.” The company’s Sales Director for MEA Sayed Shamshuddin on the importance of network visibility and shares plans for the region. How has the last 12 months been for Gigamon in the region? Gigamon has been doing exceptionally well in the region. The Middle East and Africa is Gigamon to roll out channel enablement initiatives in 2017 an important market for us. The team in the region is growing and Gigamon is fully committed to investing heavily in the region. Why is network visibility vital for today’s digital businesses? With the networks getting faster and attacks becoming more sophisticated, just monitoring traffic at one point no longer suffices. It is increasingly difficult to isolate a threat in real time especially if it is an APT or a slow and low attack. Only with full visibility across the physical, virtual and cloud environments is it possible to gain enough intelligence to isolate a threat in a quick time frame. Gigamon has offerings like GigaSECURE, a Security Delivery Platform that allows organisations to have pervasive visibility of their network traffic, users and applications. What is Gigamon’s channel strategy and what kind of initiatives can partners expect from you this 2017? Gigamon provides its partners with solutions to help drive incremental revenue through comprehensive pre- and post- sales support. With channel playing a strategic role for us, we continue to invest in our partners by offering training, both in sales and technical streams, enabling them to sell and service Gigamon products. This year, we have planned a series of end-user events across GCC that will increase awareness about our offerings in this market. We believe that these kinds of initiatives will give us the opportunity to bolster the relationship with our partners, subsequently, it will also enable our partners to reach out to current and potential customers. NewXGensecurityfeaturesenhanceserverprotectionand extendtocontainerarchitectures. security solutions. With this release, Deep Security continues its industry leadership protecting physical, virtual and cloud servers across leading environments such as VMware, Amazon Web Services (AWS) and Microsoft Azure, adding multiple new security techniques that have been optimised for maximum performance, operational efficiency and response to newly discovered threats. Deep Security includes a smart blend of cross generational threat defense techniques for protecting servers from known bad threats, including anti-malware and intrusion prevention (IPS) to detect and stop sophisticated attacks. As a Trend Micro, a global provider of cybersecurity solutions, has announced the upcoming availability of Trend Micro Deep Security 10, powered by XGen Security. XGen Security is a blend of cross-generational threat defense techniques fueled by market leading threat intelligence, and powers all of the company’s Trend Micro launches Deep Security 10 part of the XGen Security strategy, Deep Security 10 adds multiple new security techniques, including the prevention of unauthorised software changes with application control. Reimagined for the hybrid cloud, the new application control feature can protect servers from sophisticated attacks such as ransomware, even when applications are constantly changing and elastic workloads are distributed across virtual and cloud environments. Deep Security 10 also supports sandbox integration with Trend Micro Deep Discovery, and will also soon add machine learning to its list of advanced threat defense techniques, according to the company. Deep Security is optimised for VMware, AWS and Microsoft Azure deployments, delivering full visibility that enables automated discovery and protection of servers. This new release adds many integration and management enhancements, including faster connection and time to protection for AWS and Azure workloads, along with support for the latest Azure account format, Azure Resource Manager v2 (ARM). It also expands beyond server workloads to protect Docker containers, leveraging proven techniques like anti-malware, IPS and application control to protect dynamic container deployments. “In addition to embracing and helping our customers with important new infrastructure changes like Docker containers, Deep Security 10 also addresses the need to purchase security differently,” said Bill McGee, Senior Vice President and General Manager, hybrid cloud security for Trend Micro. “Deep Security is available as software, as-a-service, and through the AWS and Azure marketplaces, giving organisations unparalleled purchasing flexibility, including per hour pricing matched to the cloud.” Deep Security 10 will be available in March 2017. 7