SlideShare a Scribd company logo
Klarich says enterprises require con-
sistent security regardless of where
their applications reside.
EMC Corporation recently announced the re-
sults of new research revealing that organisa-
tionsarefailingtoappreciatethegrowingchal-
lenges of protecting their data and, as a result,
are experiencing the economic impact of data
loss. New findings from the EMC Global Data
Protection Index 2016, an independent study
by Vanson Bourne of enterprise backup in 18
countriesaroundtheworld,revealedthat,while
businesseshavebeensuccessfulinreducingthe
impact of the four biggest traditional data loss
Cyberthreats’ impact
highlighted in the new
EMC Global Survey
Tripp Lite, a manufacturer
of power protection and con-
nectivity solutions, is now
featuring new lower prices
on their B070- and B072-
Series of Cat5 rack-mount
KVM switches.
The recent price drops al-
Tripp Lite slashes prices for
Cat5 KVM Switches
Palo Alto widens breach
prevention to the cloud
Palo Alto Networks, the next-
generation security company,
has announced advancements
to its Next-Generation Securi-
ty Platform that is designed to
extend the breach prevention
capabilities of the platform
and address the security needs
Issue 03// August 2016
Goulden says EMC continues to innovate to stay
ahead of both existing and new challenges.
Continue on page 2
Vendor’s new isolated recovery solutions protect data against
destructive cyberattacks and ransomware
PAN-OS Version 7.1 deliv-
ers Universal protection
across multi-cloud envi-
ronments and SaaS Apps
MovebringsITmanagers
thelowest-pricedrack-
mountKVMsolutions
risks, they are unprepared for new, emerging
threats,whicharetakingtheirtollinstead.When
compared to the EMC Global Data Protection
Index 2014, 13% more businesses experienced
data loss or disruption in the last 12 months,
costing them an average of $914,000.
EMCcommissionedtheupdatedresearchto
help organisations recognise and prepare for
therapidlychanginglandscapeofthreatstoen-
terprisedata.ThesurveyresultsfromtheEMC
Global Data Protection Index 2016 identified
thefollowingthreemajorchallengestomodern
data protection namely threats to protection
data, threats to data in the cloud and evolving
protection needs.
Continue on page 2 Continue on page 2
The new KVM solutions provide
innovative features and
exceptional quality.
Redington value is a value added distributor for the following brands in parts of Middle East & Africa:
2
For more information, please write to sales.value@redingtongulf.com
EMC...
Palo Alto...
DavidGoulden,CEO,EMCInfor-
mation Infrastructure, said: “Our
customers are facing a rapidly
evolvingdataprotectionlandscape
onanumberoffronts,whetherit’s
toprotectmoderncloudcomputing
environments or to shield against
devastating cyberattacks. Our re-
searchshowsthatmanybusinesses
areunawareofthepotentialimpact
and are failing to plan for them,
which is a threat in itself.”
Goulden said as a leader in data
protection and cloud computing,
EMCcontinuestoinnovatetostay
ahead of both existing and new
challenges by providing modern
cloud-centric data protection so-
lutions. “In addition, today we are
introducing the first in a range of
new Isolated Recovery Solutions,
that are designed to help protect
customerdataagainstcyberattacks
such as ransomware and destruc-
tive hacking,” he said.
Nearly a quarter (23%) of busi-
nesses surveyed had experienced
datalossorunplannedsystemsdis-
ruptionduetoanexternalsecurity
breachandthatnumberincreased
to over one third (36%) when tak-
inginternalbreachesintoaccount,
the survey found. Businesses are
increasinglyfacingthreatsnotjust
to their primary data, but also to
their backup and protection data.
On the other hand, more than
80% of survey respondents indi-
cated that their organisations will
run at least part of eight key busi-
nessapplicationsinthepubliccloud
inthenexttwoyears;yetlessthan
half said they protect cloud data
against corruption and less than
half against deletion.
EMC said it is critical for or-
ganisations to include cloud ap-
plications in their overall data
protection strategies. EMC of-
fers a comprehensive portfolio
of solutions for cloud-to-cloud
and on-premise-to-cloud data
protection to facilitate this, the
company stated.
of businesses working with
cloud-based environments
and software-as-a-service
(SaaS) applications.
According to Palo Alto Net-
works, the demand for organ-
isations to become ever more
agile and competitive is driv-
ing a change in the way busi-
ness applications are devel-
oped, deployed, and adopted.
The company said work-
loads and data are increasingly
distributed across physical
and cloud computing envi-
ronments and this changes the
threat landscape and increases
the risk of exposure to cyber-
attacks, which is compounded
by the limitations of legacy se-
curity products that were not
designed for this distributed,
cloud-based infrastructure.
Palo Alto Networks said
it has addressed these chal-
lenges, and many more, in
PAN-OS 7.1. The vendor said
this version of the operating
system extends the breach
prevention capabilities of
the security platform to all
major clouds and provides
visibility, control, and threat
prevention designed to protect
customer data regardless of
where it resides.
In addition, among the new
features are certificate and
two-factor authentication ad-
vancements that help protect
user credentials or neutralise
them if they are stolen.
Lee Klarich, executive vice
president, product manage-
ment at Palo Alto Networks,
said: “Enterprises require
consistent security regardless
of where their applications
reside. The latest release of
PAN-OS addresses new chal-
lenges presented by the cloud,
enabling organisations to take
advantage of agile cloud-based
infrastructure and applica-
tions while maintaining a
consistent security posture.”
Vendorlaunchesitslatest
innovationstoadaptto
changingroleofdatacentres
‘Smart Choices for Digital
Infrastructure’ is a concept which
supports managers through the
decision process.
Cablingsystemsandopticalfibre
solutionsvendorNexans,recently
launched its data centre innova-
tions under the name of “Smart
ChoicesforDigitalInfrastructure”.
According to Nexans, the dif-
ferent data centre infrastructure
technologieswillhelpmanagersto
support the exponential increase
in data transmission.
The company said the digi-
tal transformation requires ag-
ile, carefully planned IT infra-
structure, efficient data access
and exchange.
Nexansaddedthateachofthese
factorsisvitaltosuccess,butnet-
work managers face difficult de-
cisions to provide the optimum
platform for their specific needs.
‘Smart Choices for Digital In-
frastructure’ is a concept which
supports managers through the
decisionprocessbyincorporating
cabling systems which support
severalconsecutivegenerationsof
activeequipmentandthatarero-
bust,flexibleandscalabletoadapt
to new requirements.
Nexans’ latest offering include
flexible,cost-effectivebandwidth
architectures,optimisedspaceus-
age, performance protection and
enhancement, faster modular
deployment and design through
to operation’ support services.
Nexans
introduces
‘Smart Choices
for Digital
Infrastructure’
low IT managers to choose
from several highly fea-
tured KVM switches and
consoles for controlling an
entire network while still
managing expenses.
According to Tripp Lite,
these KVM solutions pro-
vide innovative features
and exceptional quality,
along with the reliability for
which Tripp Lite has long
been known.
The company said key fea-
tures of Tripp Lite’s KVM
switches include connection
of up to 32 servers with inex-
pensive Cat5 cabling, sleek,
compact design that helps
reduce cable clutter and im-
prove airflow and console
switches that include built-
in LCD, keyboard and mouse.
Other features according
to Tripp Lite include models
with IP access that add flex-
ibility of remote monitoring
from virtually anywhere in
the world, multi-user capa-
bilities, password protection
and advanced encryption to
simplify IT tasks while keep-
ing server access secure.
“With these price reduc-
tions, IT departments of
all sizes can now centralise
device management easily
and affordably,” said David
Posner, Tripp Lite’s Direc-
tor of Marketing for Cables
and Connectivity. “Our
KVM solutions are simply
the best value available
in the market.”
Tripp Lite is a leading
manufacturer of products
that power, connect and
protect computers and IT
equipment in any envi-
ronment, from desktops
to data centres.
The company’s innova-
tions include the world’s
first UPS system designed
specifically for personal
computers and the world’s
most trusted premium surge
suppressor–the Isobar, with
more than 19 million in use.
Tripp Lite...
3
For more information, please write to sales.value@redingtongulf.com
Redington Value Distribu-
tion, a value-added distributor
across MEA, has announced
that it has partnered with
Pivot3 to bring the vendor’s
dynamic hyper converged in-
frastructure (HCI) solutions
to enterprise customers across
the region.
Under the agreement,
Redington Value Distribu-
tion with its vast network of
channel partners, will offer
Pivot3 products and solutions
in the enterprise data cen-
tre domain across technolo-
gies ranging from compute,
Redington Value
Distribution partners
with Pivot3
Distributor to offer the vendor’s hyper con-
verged infrastructure solutions across MEA
Mathrani says HCI solutions are only
just beginning to penetrate the enter-
prise data centre.
storage, network, software,
security, virtualisation, high
availability, business conti-
nuity and cloud. In addition,
the distributor will also have
offerings in voice and unified
communications space.
The vendor’s acquisition
of NexGen Storage makes
Pivot3 the only company in
the industry to offer custom-
ers solutions that allow IT
to prioritise application per-
formance based on business
priority along with complete
implementation flexibility and
QoS management.
“While the HCI market has
been growing exponentially
for years, this innovative tech-
nology is only just beginning to
penetrate the enterprise data
centre,” added Rajesh Math-
rani, General Manager, Sales,
Middle East at Redington
Value Distribution.
Mathrani said with Pivot3’s
dynamic offerings to cus-
tomers in industries such
as hospitality, surveillance,
healthcare, transportation,
entertainment, education,
insurance and retail, Red-
ington Value and its channel
partners now have a unique
solution which can address
the needs of these industries
while providing customers
complete control over their
deployments helping them
move from legacy data cen-
tre storage environments to
software defined storage.
Redington said together
with Pivot3, it will empower
its channel partners to ad-
dress the requirements of
mid-market and enterprise
customers offering a practi-
cal and proven path to the
software-defined data centres
of the future without com-
promising on simplicity and
economics of easy-to-manage
HCI platform.
“This is a great opportunity
for both our organisations to
expand our footprint in the
MEA markets,” said Anand
Chakravarthi, area vice presi-
dent, Pivot3 Dubai. “Red-
ington Value and its large
network of partners gain a
competitive advantage with
the technology offerings from
Pivot3 and we gain access to
markets across MEA with this
association,” he said.
Chakravarthi explained that
being a very channel oriented
organisation, Pivot3 recognise
the strength in addressing the
needs of enterprise customers
through channel partners and
Redington’s partners are a key
element in the joint growth
strategy. “Over the last few
years we have built quite a
good set of enterprise cus-
tomer references within this
region and the partnership
will help us scale higher with
the help of Redington’s elab-
orate partner network,” he
pointed out.
This partnership between
Redington and Pivot3 will
also be an opportunity for
channel partners to address
the enterprise data centre
space and will help many to
penetrate deeper into their
clients’ accounts while cre-
ating much closer alliances
with customers.
Distribution industry honours Veeam Software
VeeamSoftware,theinnovativepro-
viderofsolutionsthatdeliveravail-
ability for the “Always-On Enter-
prise”,hasannouncedthatitrecently
receiveda“GoldEMEARisingStar”
award from the Global Technology
DistributionCouncil(GTDC).
The Rising Star Awards recog-
nise technology companies with
exceptional sales growth through
European, Middle East and Africa
distributorsoverthepastyear.
This year’s awards were pre-
sented during an evening dinner
event at the 2016 GTDC Sum-
mit EMEA conference at the
Vendor recognised for outstanding sales growth in the EMEA region
Pommier says Veeam’s business
depends on the channel and the
excellent work of partners.
Grand Hotel Huis ter Duin.
Veeamwasamongonly15overall
winners chosen from hundreds of
manufacturersandpublisherswho
rely on distributors to meet the
product and service requirements
of technology solution providers in
theEMEAmarket.
Gold, Silver and Bronze Rising
Star Award winners were selected
infourrevenuecategoriesandover-
all software business, respectively,
witheachcategorywinnerbasedon
sales growth over the past year, as
tracked by the Context SalesWatch
DistributionPanel.
“We’veenjoyedgreatsuccessinthe
‘Rising Star’ award in the past – it’s
anhonourforus–andtowinitagain
is testament to Veeam’s hard work,
impressive growth and foresight,”
saidGillesPommier,VicePresident,
ChannelandCloudEMEAatVeeam
Software.“Ourbusinessdependson
thechannelandtheexcellentworkof
ourpartnercommunity.LikeVeeam,
theyhaveacknowledgedtheneedfor
theAlways-OnEnterprise,andrec-
ognisethatproductssuchasVeeam
AvailabilitySuitecanhelptheircus-
tomersmakethisareality.”
To be eligible for a Rising Star
award,vendorsmusthavesoldcor-
respondingproductsthroughGTDC
members for at least one year. Se-
lectionsforGold,SilverandBronze
winners in each revenue category
are based on Context SalesWatch
datafromApril2015–March2016.
“Thisyear’swinnersspanabroad
range of product categories – our
most diverse yet - representing to-
day’smostprogressiveandinnovative
marketsegments,”commentedTim
Curran,GTDCCEO.“It’simpressive
toseesomanywinnersfocusedonthe
hottesttrends,fromcloud,mobility
andbigdatatosecurity,virtualisation
andhyper-convergedinfrastructure,
forexample.”
Curran said the growth of these
companiesshowcasesthevalueand
impactofdistributionpartnerships
throughouttheEMEAregion.
4
For more information, please write to sales.value@redingtongulf.com
VendorusesGoogleCloud
Platformandaddssoftware-
definednetworking
Fitzgerald says CloudForms 4.1 is the
most comprehensive, hybrid cloud
management solution.
OpensourcesolutionsmakerRedHat
Inc, has announced the general avail-
abilityofRedHatCloudForms4.1,the
latestversionofitsopenhybridcloud
managementsolution.
WithsupportforGoogleCloudPlat-
form, Red Hat CloudForms 4.1 now
supports greater choice and flexibil-
ity for customers who want to run
hybrid cloud workloads on Google
Cloud Platform, Microsoft Azure or
AmazonWebServices.
Inaddition,RedHatCloudForms4.1
expandsthescopeofitsmanagement
capabilities with software-defined
networking (SDN), providing a more
unified management experience for
software-defineddatacentres.
AccordingtoRedHat,CloudForms
4.1 makes it easier to automate com-
plexITprocessesthroughintegration
withAnsibleTower,andprovidescus-
tomerswithasimpler,cloud-friendly
subscriptionmodel.
JoeFitzgerald,vicepresident,Man-
agement at Red Hat, said: “We hear
constant customer demands focus-
ing on rapidly advancing their hybrid
cloud strategies and the need for one,
consistent management view across
theirphysical,virtual,andcloudenvi-
ronments.CloudFormsoffersthat,and
webelieveCloudForms4.1istheindus-
try’smostcomprehensive,hybridcloud
management solution on the market.
CloudFormsnownotonlysupportsthe
world’slargestpublicclouds,butalso
integrateswithAnsibletodramatically
simplifyautomation.”
Red Hat
CloudForms
expands public
cloud management
Networking giant Cisco has an-
nounced it will help engineers, de-
velopers, partners and customers
embrace a monumental change in
how networks are built and man-
aged—preparingtheindustryforthe
transitiontodigital-readynetworks.
Cisco is also building on the in-
tersection between security and
networking with new technologies
designed to simplify branch office
securityandmakeitmoreeffective.
InMarchthisyear,Ciscolaunched
the Digital Network Architecture
(Cisco DNA)—a radical new ap-
proach to networking designed for
thedigitalera.
The vendor said as customers
embrace mobility, cloud, analytics
and the Internet of Things (IoT) to
digitisetheirbusiness,ITteamsare
Cisco prepares digital-ready
networks
Networking giant improves threat visibility and enforcement
capabilities with new embedded security technology
Reed says organisations need to ad-
dress the expanding threat landscape
across mobility and cloud.
strugglingtokeepupwiththeever-
increasingcomplexityofthenetwork,
sophisticationofsecurityattacksand
growingcustomerexpectations.
Ciscosaiditrealisedthattradition-
alnetworkssimplycouldnotscaleto
meettheincreasingdemandsofthe
digital business and a new network
wasneededforthedigitalera.
The company added that Cisco
DNA helps IT address these de-
mandsbymovingnetworkingfrom
hardware-centrictosoftware-driven,
frommanualtoautomated,andfrom
reactivetoadaptive.
“Organisationsneedtoaddressthe
expanding threat landscape across
mobility and cloud, while facing
increasingly sophisticated security
attacks,” said Jeff Reed, senior vice
president, Networking Infrastruc-
CyberArk unveils cloud-based privileged
account for endpoint
CyberArk, the company that
protects organisations from
cyberattacks that have made
their way inside the network
perimeter, has announced new
capabilities for CyberArk View-
finity that deliver privileged ac-
count security to the endpoint.
With CyberArk Viewfin-
ity version 5.5, customers can
benefit from an enhanced,
single privilege management
and application control solu-
tion to reduce the attack sur-
face while being able to block
CyberArk Viewfinity integrates privilege management with
app control to protect against malware-based attacks
With CyberArk Viewfinity version 5.5
customers can benefit from an en-
hanced, single privilege management.
the progression of malware-
based attacks, and balance
business user productivity and
enterprise security.
Following the acquisition of
Viewfinity in Q4 2015, CyberArk
Viewfinity is now available as
part of the CyberArk Privileged
Account Security Solution.
The company said with the
latest release, customers can
gain greater privilege manage-
ment and application control
features in an on-premises or
software-as-a-service (SaaS)-
based offering.
“As malware continues to be a
frequently-used and successful
means for hijacking credentials,
organisations must realise that
the endpoint problem is a privi-
lege problem,” said Roy Adar,
Senior Vice President, Product
Management, CyberArk. “The
fact is, motivated attackers will
eventually get inside your net-
work – it’s what happens next
that matters.”
Adar added that establishing a
footholdonendpointsandescalat-
ing privileges enables attackers to
jumpfromendpoints,toservers,to
domaincontrollersuntiltheyown
thenetwork.“CyberArkViewfinity
extends privilege security to the
endpoint to mitigate these risks
without excessively restrictive
controls on users,” Adar said.
NewintegrationwiththeCyber-
Ark Shared Technology Platform
enablesallprivilegedauditlogsto
bestoredandreviewedcentrally,as
wellasnewflexible,customisable
reporting capabilities.
According to the security solu-
tions vendor, evidence shows that
advanced attacks often start with
phishing emails sent to non-privi-
legedbusinessusers,andacampaign
ofjust10emailswilltypicallyyield
a greater than 90% chance that at
least one person will become the
criminal’sprey.
ture and Solutions at Cisco. “With
DNA, Cisco is reinventing how we
secure networks for the digital era
by embedding advanced security
capabilities into a single network
architecture. But technology alone
isn’tenough.WearealsopreparingIT
professionalswithnewskills,training
network-savvydevelopersandhelp-
ing customers navigate the journey
todigital-readynetworks.”
5
For more information, please write to sales.value@redingtongulf.com
TechnologymajorHewlettPackard
Enterprise (HPE) has announced
a new high-performance comput-
ing (HPC) solutions that includes
acomprehensivesoftware-defined
platform, enhancements to its
Apollo servers, as well as, a new
ANSYS computer-aided engineer-
ing (CAE) software based solution
designedtohelpmanufacturingor-
ganisations optimise their design
simulationdeployments.
Once the domain of academics
and research institutions, HPC is
rapidlymakingitswayintoindustries
like energy, life sciences, financial
servicesandmanufacturing.While
organisations in these industries
recognise the technology’s strate-
gicimportance,perceivedcomplex-
ity and diversity of HPC environ-
ments may appear to outweigh the
businessbenefits.
HPE Unveils Software Defined
HPC platform
New software platform delivers Simplicity,
Speed and Flexibility
Mannel says HPC is rapidly becoming
one of the essential ingredients for
the digital economy.
HPE’s announcement dramati-
callysimplifiesthedeploymentand
managementofHPCsolutions,en-
suringcompaniesofallsizescannow
accelerate their HPC projects and
create competitive differentiation
fortheirbusiness.
“HPCisrapidlybecomingoneof
theessentialingredientsforthedigi-
taleconomyacrossorganisationsof
alltypesandsizes,”saidBillMannel,
vicepresidentandgeneralmanager,
HPC, Big Data and IoT Servers at
HPE. “Today we are excited to un-
veil new additions to our recently
announced portfolio capabilities
designedtoaccelerateaccessibility
and time to value for HPC by sig-
nificantlysimplifyingdeployments,
streamlining management and
boostingperformance.”
“As the global HPC market
leader with 35.9% market share
HPE is upping the ante with new
additions to its already-large HPE
Apollo portfolio of purpose-built
solutions,” said Steve Conway,
Research Vice President in IDC’s
High Performance Computing
group. “These innovative solu-
tions aim to accelerate HPC adop-
tion by organisations of all sizes
and segments by enabling faster
time to value and increased com-
petitive differentiation through
better parallel processing perfor-
mance, along with reduced com-
plexity and deployment time.”
Gigamon to Offer First Visibility Solution for Public Cloud
GigamonInc,aprovideroftrafficvis-
ibilitysolutions,hasstartedtrialsfor
the world’s first solution that allows
enterprisestoseeinformationtravers-
ingpublicclouds.
Gigamon’s visibility solutions
for public cloud kicks off with field
trials of its Amazon Web Services
(AWS) Elastic Compute Cloud
(EC2)offering.
Thepercentageofworkloadshosted
in the public cloud is set to explode
from16toalmost40%overthenext
fiveyears,accordingtoJPMorgan.
Innovative solution to enable enterprises monitor and
secure workloads hosted by Amazon Web Services
Hooper says Gigamon is a market pio-
neer that has transformed the world
of IT through the power of visibility.
NewFirewallenables
organisationstooperatesecure,
distributed,cloud-basednetwork
environments
Gheri says as threats became more
targeted, traditional port blocking
firewalls are no longer enough.
With this rapid growth comes in-
creasing concern for network secu-
rityvulnerability,complianceriskand
compromisedperformance.
Gigamonsaidseamlesspubliccloud
adoptionhingesonenterprisesbeing
able to take advantage of the agility
offeredbyon-demandcomputeand
confidencethathostingbusinesscriti-
calapplicationsonsharedinfrastruc-
turedoesnotmeancompromisesin
securityoravailability.
Inaddition,thevendorsaidthean-
nouncement takes a significant step
forwardfortheindustrybyallowing
enterprises to for the first time ever,
gain visibility into previously un-
available public cloud applications
andinformation.
“Gigamon is a market pioneer
that has transformed the world of
IT through the power of visibility.
Whether it’s delivering more effec-
tive and efficient security, bringing
unprecedentedsubscriberawareness
toserviceprovidersorscalingperfor-
mance management, our Visibility
Fabrichasbeenatthecenterofhelp-
ingourcustomersnavigatedisruptive
changesaroundtheirnext-generation
infrastructure,” said Paul Hooper,
CEO,Gigamon.“Withthismilestone,
Gigamon enters a new phase in ex-
ecutingourcompanyvision.Weare
expandingourmarketyetagaintothe
thousandsofbusinessesthatwantto
confidently and securely host their
ITinfrastructureonpublicclouds.”
According to Gigamon, this in-
dustry-leading capability is key to
accelerating public cloud adoption
andreducingitsassociatedmigration
disruptionandrisks.WithGigamon’s
visibility solution, enterprises gain
unprecedented flexibility to design
andprovisionthepubliccloudmoni-
toringinfrastructurethatmeetstheir
business needs with the freedom to
choose the most appropriate public
cloudprovidertoaddresstheirspecific
requirements,thecompanysaid.
NetworksecuritysolutionsvendorBar-
racudahasannouncedtheavailabilityof
Barracuda,NextGenFirewallF-Series
version 7.0, which is designed for or-
ganisations adopting cloud-based ap-
plications,operatingdispersednetwork
environments and leveraging public
cloudplatforms.
Thenvendor’sNextGenFirewallVer-
sion7.0providessecurityandreliability
in these environments, especially for
organisations leveraging public cloud
platformslikeMicrosoftAzureandAm-
azonAWS.Barracudasaidorganisations
areincreasinglyadoptingvirtualisation,
software defined networks and cloud
applications such as Office 365, Sales-
forceandvideoconferencing.Assuch,
the vendor stated that the role of the
firewallhasevolvedfromaperimeter-
based security device to a distributed
securitysolutionthatmustintelligently
optimise traffic to improve network
performanceandprovidereliableaccess
tothesemissioncriticalapplicationsfor
allusersacrossalllocations.
AccordingtothecompanytheBarra-
cudaNextGenFirewallisdesignedfrom
the ground-up for the cloud era and
enablesintelligentnetworkperimeters
at headquarters, remote and branch
offices,andsatellitelocationstodeliver
secure,direct,businessqualityaccessto
applicationshostedinprivateandpublic
cloudenvironmentswhileminimizing
theneedtobackhaultraffic.
Barracuda Expands
Cloud-Ready Next-
Generation Firewall
Technology
6
For more information, please write to sales.value@redingtongulf.com
Amazon Web Services Inc (AWS),
an Amazon.com company, has an-
nounced that Amazon Elastic File
System(AmazonEFS),anew,fully
managedservicethatmakesiteasy
to set up and scale file storage in
the AWS Cloud, is now available
to all customers.
With a few clicks in the AWS
Management Console, custom-
ers can use Amazon EFS to create
file systems that are accessible to
multipleAmazonElasticCompute
AWS launches Elastic File System
Newelasticfilestorageservicemakesiteasytodeploy
andscalefilesystemsintheAWSCloud
Cloud (Amazon EC2) instances
via the Network File System
(NFS) protocol.
According to the company,
Amazon EFS can automatically
scale without needing to provi-
sion storage or throughput, en-
abling file systems to grow seam-
lessly to petabyte scale, while
supporting thousands of con-
current client connections with
consistent performance.
“Ascustomerscontinuetomove
more and more of their IT infra-
structuretoAWS,they’veaskedfor
a shared file storage service with
theelasticity,simplicity,scalability
andon-demandpricingtheyenjoy
with our existing object (Amazon
S3), block (Amazon EBS) and ar-
chive (Amazon Glacier) storage
services,” said Peter DeSantis,
Vice President, Compute Servic-
es, AWS. “Initially, our custom-
ers most passionately asking for
a file system were trying to solve
for throughput-heavy use cases
like data analytics applications,
large-scale processing workloads,
andmanyformsofcontentandweb
serving. Customers were excited
aboutAmazonEFS’sperformance
for those workloads, and pretty
soon they were asking if we could
expandAmazonEFStoworkexcel-
lently for more latency-sensitive
and metadata-heavy workloads
like highly dynamic web appli-
cations. That’s what we’ve been
workingonforthelastfewmonths
and we’re excited to release it to
customers today.”
AmazonEFSisdesignedtosup-
portabroadrangeoffileworkloads
– from big data analytics, media
processing,andgenomicsanalysis
thataremassivelyparallelisedand
require high levels of throughput,
tolatency-sensitiveusecasessuch
as content management, home di-
rectory storage, and web serving.
AmazonEFSishighlyavailableand
durable, redundantly storing each
file system object across multiple
availability zones.
Amazon EFS can automatically scale
without needing to provision storage
or throughput.
Fidelis
Cybersecurity
unveils threat
intelligence
database
Fidelis Cybersecurity says the new
security resources are available at no cost.
Fidelis Cybersecurity, a provider
of products and services for de-
tecting and stopping advanced
cyberattacks, has announced the
availability of a new threat intel-
ligence database and freeware
tools designed to help the secu-
rity community stop attacks and
prevent data theft.
The company said the new re-
sourcesareavailableatnocostand
includetheBarncatThreatIntelli-
genceDatabase,theThreatScanner
toolforfindingmalwareresidingon
anendpoint,andCCNumberFinder
to support PCI DSS compliance.
Hardik Modi, Vice President,
ThreatResearchatFidelisCyberse-
curity,said:“Afteryearsofongoing
researchandthousandsofhoursof
incidentresponseengagements,we
areeagertogivebacktothesecurity
communitybysharingsomeofthe
threatintelligencewehavecurated
andfreetoolswehavedeveloped.”
Modi said by making these tools
and intelligence available to re-
searchers and security analysts,
Fidelis Cybersecurity is hop-
ing organisations will be able to
find and stop attackers faster and
more efficiently.
According to the company, the
Fidelis Barncat Intelligence Data-
base includes more than 100,000
recordswithconfigurationsettings
extracted from malware samples
gathered during Fidelis’ incident
response investigations and other
intelligence gathering operations
over the past decade.
New tools to help security
practitioners find attack-
ers faster
Check Point’s new security appliances
for SMBs
SecurityvendorCheckPointSoft-
ware Technologies Ltd, recently
announced two new additions to
the Check Point 700 Series appli-
ances,bothaddressingtheunique
securityneedsofsmallbusinesses.
The new Check Point 770 and
790 appliances, together with the
730 and 750, provide advanced
threatpreventionfeaturessuchas
New770and790appliancesextendtheCheckPoint700seriesfamily
The 770 and 790 extend the capa-
bilities of Check Point’s 700 Series
appliance array.
firewall, VPN, antivirus, anti-bot,
application control, URL filtering
and email security.
In addition, the appliances de-
liver optimised network perfor-
mance of up to 4 Gbps of firewall
throughput and up to 330 Mbps
whenthreatpreventionfunctions
are activated.
According to the 2016 Verizon
Data Breach Investigations Re-
port, cyber criminals use several
avenues to infiltrate small busi-
nesses – such as phishing, ran-
somware and denial-of-service
attacks. With the cost of these
attacks on a small business av-
eraging more than $35,000 (ac-
cording to First Data Market
Insight), the impact of today’s
cyber threats can have a devas-
tating effect in an increasingly
competitive marketplace.
“With small businesses playing
such a big role in the economic
growth and innovation across the
globe, there is a need for a simple
solution that helps keep these
small, often resource-strapped
organisations a step ahead of to-
day’s cybersecurity challenges,”
said Gabi Reish, Vice President
of product management, Check
Point. “The 770 and 790 extend
the capabilities of our 700 Series
appliance family, providing the
advanced protection necessary to
protect small business customer
networks from threats and un-
necessary exposure.”
CheckPointsaidthenew770and
790 deliver security optimised for
smallbusinesses.Thesecompactap-
pliancesaresimpletoconfigureand
manage,providingadvancedthreat
preventionagainstcyber-attacks.
7
For more information, please write to sales.value@redingtongulf.com
Fortinet touts Security
Fabric solution in Middle
East
Commercial espionage key
reason for cyberattacks;
report
Vendormovestoaddresstheenterprisenetworkand
challengesCIOsface
TrendMicrorevealsadvancedtechnologiesinthemining
industrycouldleadtoadvancedthreats
Zakhour says the Fortinet Security
Fabric has traits that allow organisa-
tions to adapt and avoid becoming
obsolete.
Trend Micro says data stolen through
corporate espionage can have devas-
tating effects on the targeted firm.
TechnologypowerhouseDellMiddle
Easthasurgedtheregionalsystems
integration(SI)channeltoembrace
businessprocessandsolutionslife-
Dell urges systems integrators to embrace
business process selling
Understandingbusinessprocessandsolutionslifecyclecrucialforpartnersuccess
Hasan says there’s a big gap and
demand for SIs in the market who
understand solutions lifecycle.
cyclewhenintegrationsolutionsin
acustomer’senvironment.
Thecallcomesatatimewhenthe
Middle East IT industry is trans-
formingandthegrowingemphasis
intheregiononbusinessprocessand
specificallysolutionslifecyclewhen
itcomestosolutionsintegration.
Shams Hasan, Enterprise Prod-
uctManager,DellMiddleEast,said
whiletheneedforbusinessprocess
andsolutionslifecycleisgrowingin
thechannel,theemphasisseemsto
bemorefromthegrowingconcerns
of customers rather than solution
integrators. Hasan observed that
there’s still a big gap in the market
between the demand for SIs who
understand, speak and bring a so-
lutions lifecycle commitment and
supply. “SIs who take heed of this
supply gap would be big winners
tomorrow,”Hasansaid.
HecontinuedthatDellisalready
well-positionedforcustomers,solu-
tion integrators, and partners look-
ing for technology strategies and
solutions that are future ready for
digitaltransformation.
“Dell’s Future-Ready Enterprise
strategygivesorganisationsawayto
buildITcertaintyinuncertaintimes,
with the speed, scale and savings
businessdemands,”headded.When
wetalktoourbusinesspartners,we
emphasize our ability to serve as a
partnerwhocanprovideacomplete
solution–onecreatedwithaholistic
viewthattakesadvantageofthefull
spectrumofITtodeliversuccessful
businessoutcomes.Wetalkaboutour
uniquepositionastheonlytechnol-
ogy company that actually delivers
onthepromiseofintegrated,end-to-
endsolutions–fromthedatacentre
tothefarthestendpointandallalong
thecloudsandnetworksinbetween.”
HasansaidwithDell’send-to-end
solutions,organisationscanbecome
nimbleandcompetitiveeverywhere
intheenterprise,inthemannerthat
bestfitstheirbudget,staffingandtim-
ingrequirements—whetherdeploy-
ing pre-configured systems, using
validatedreferencearchitecturesfor
guidanceorbuilding“do-it-yourself”
withbest-of-breedplatforms.
Security vendor Fortinet Middle
East, has revealed that it is push-
ing the Fortinet Security Fabric,
launched earlier this year, as a re-
sponse to the current state of the
enterprise network and the chal-
lenges that CIOs face today.
According to the manufacturer
of fast and secure cyber security
solutions,whichoffersenterprise-
levelnextgenerationfirewallsand
a vast array of network security
products, the Fortinet Security
ITsecurityvendorTrendMicrohas
revealed that the UAE is among 22
victimsofcyberattacksreportedglob-
allyintheminingsector,accordingto
thevendor’slatestreport.
The report stated that with Saudi
Arabia’s mining sector to represent
10%ofitsnon-oilrevenueby2030,and
withothercountrieslikeOmanandthe
UAEinvestinginnewertechnologies,
theoutlookforintegratedITplatforms
and cloud operations in the mining
sectorissettogrowintheregion.
Fabricprovidesorganisationswith
a framework for meeting today’s
andtomorrow’ssecuritychalleng-
es, bringing the power of threat
intelligence to all four corners
of a network.
Maya Zakhour, Channel Direc-
tor, Middle East at Fortinet, said:
“The Fortinet Security Fabric has
characteristics that allow organ-
isations to adapt as necessary and
avoidbecomingobsoletewiththe
next wave of new trends that will
hit the market.”
Zakhoursaidthecompanyiswit-
nessingagrowingtrendofspeciali-
sations,whichworkstotheadvan-
tageofchannelpartners,especially
inthenetworksecuritymarket.She
addedthatsinceFortinethasprod-
uctsthatcatertoeverylayerofthe
network, the company is pushing
Fortinet Security Fabric by edu-
cating partners on the solutions
bestsuitedforthem,basedontheir
specialisations and the industry
vertical they are targeting.
With this, stated Trend Micro,
companiesinthesectorwillhavetobe
preparedforthesecuritychallenges
thesetechnologyadvancesbring.
According to the Trend Micro
report, the mining industry is be-
ing targeted by cybercriminals
and is now investigating 17 inci-
dents involving cyberattacks on
22 entities operating in the sector
since 2010. The most recent at-
tack was recorded in April 2016,
when hackers leaked 14.8GB of
data from the Canadian mining
corporationGoldcorp.
Thoughthereportdoesnothave
majorcasesfromtheMiddleEast
andAfrica,companiesintheregion
are not immune to these attacks.
TheUAEbasedfirmMineralsand
MarineAssetsCorporation(MAC)
and Canadian company Nautilus
were the victims of a targeted cy-
ber scam, wherein Nautilus paid
a$10mdepositintendedforMAC
into an unknown bank account.
Redington Value Journal - August 2016

More Related Content

What's hot

Microsoft Telecommunications Newsletter | May 2021
Microsoft Telecommunications Newsletter | May 2021Microsoft Telecommunications Newsletter | May 2021
Microsoft Telecommunications Newsletter | May 2021
Rick Lievano
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09
meyersb1
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
vmblog
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
cummins1
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
scharter
 
Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020
Rick Lievano
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Hewlett Packard Enterprise Business Value Exchange
 
Next Generation Platform Innovation in M2M
Next Generation Platform Innovation in M2MNext Generation Platform Innovation in M2M
Next Generation Platform Innovation in M2M
Verizon Thought Leadership
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
Abner Germanow
 
Cloud Go Green
Cloud Go GreenCloud Go Green
Cloud Go Green
Software Park Thailand
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
Ericsson
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Juniper Networks
 
Anticipating a hostile reaction for Augmented Reality
Anticipating a hostile reaction for Augmented RealityAnticipating a hostile reaction for Augmented Reality
Anticipating a hostile reaction for Augmented Reality
David Wood
 
Internet of Things application platforms
Internet of Things application platformsInternet of Things application platforms
Internet of Things application platforms
The Marketing Distillery
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
IndianAppDevelopers
 
zSystems New z13 Excellent Presentation
zSystems New z13 Excellent PresentationzSystems New z13 Excellent Presentation
zSystems New z13 Excellent Presentation
Luigi Tommaseo
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
trentlivingston
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
TFM&A
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
Jim Romeo
 
Impact of cloud computing to Asian IT Industry
Impact of cloud computing  to Asian IT IndustryImpact of cloud computing  to Asian IT Industry
Impact of cloud computing to Asian IT Industry
Thanachart Numnonda
 

What's hot (20)

Microsoft Telecommunications Newsletter | May 2021
Microsoft Telecommunications Newsletter | May 2021Microsoft Telecommunications Newsletter | May 2021
Microsoft Telecommunications Newsletter | May 2021
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09
 
VMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry ExpertsVMblog - 2020 IT Predictions from 26 Industry Experts
VMblog - 2020 IT Predictions from 26 Industry Experts
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
 
Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020Microsoft Telecommunications Industry News | November 2020
Microsoft Telecommunications Industry News | November 2020
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Next Generation Platform Innovation in M2M
Next Generation Platform Innovation in M2MNext Generation Platform Innovation in M2M
Next Generation Platform Innovation in M2M
 
Interop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking IndustryInterop 2006: Evolution of the Networking Industry
Interop 2006: Evolution of the Networking Industry
 
Cloud Go Green
Cloud Go GreenCloud Go Green
Cloud Go Green
 
Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network” Discussion paper: ”The coming obsolescence of the enterprise network”
Discussion paper: ”The coming obsolescence of the enterprise network”
 
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsBuilding the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network Needs
 
Anticipating a hostile reaction for Augmented Reality
Anticipating a hostile reaction for Augmented RealityAnticipating a hostile reaction for Augmented Reality
Anticipating a hostile reaction for Augmented Reality
 
Internet of Things application platforms
Internet of Things application platformsInternet of Things application platforms
Internet of Things application platforms
 
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 Revealing the Potential and Risks From the Coming Together of IoT, AI, and C... Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...
 
zSystems New z13 Excellent Presentation
zSystems New z13 Excellent PresentationzSystems New z13 Excellent Presentation
zSystems New z13 Excellent Presentation
 
Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?Cloud Computing - Is it the Future of ESI?
Cloud Computing - Is it the Future of ESI?
 
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...
 
PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715PulseSecure_Report_HybridIT_120715
PulseSecure_Report_HybridIT_120715
 
Impact of cloud computing to Asian IT Industry
Impact of cloud computing  to Asian IT IndustryImpact of cloud computing  to Asian IT Industry
Impact of cloud computing to Asian IT Industry
 

Similar to Redington Value Journal - August 2016

Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
Redington Value Distribution
 
Redington Value Journal - December 2017
Redington Value Journal - December 2017Redington Value Journal - December 2017
Redington Value Journal - December 2017
Redington Value Distribution
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
Redington Value Distribution
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
Redington Value Distribution
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
Baqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar Kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Baqar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
bakar kazmi
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
Maliha Ali
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
Universitas Bina Darma Palembang
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
Ambuj Sharma
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
Redington Value Distribution
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
SonaliG6
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Angie Miller
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
emmaelice
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
GARL
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
Giuseppe Paterno'
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
myehuman
 

Similar to Redington Value Journal - August 2016 (20)

Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
Redington Value Journal - December 2017
Redington Value Journal - December 2017Redington Value Journal - December 2017
Redington Value Journal - December 2017
 
Redington Value Journal - June 2018
Redington Value Journal - June 2018Redington Value Journal - June 2018
Redington Value Journal - June 2018
 
Value Journal - September 2020
Value Journal - September 2020Value Journal - September 2020
Value Journal - September 2020
 
Cyberoam-Brochure
Cyberoam-BrochureCyberoam-Brochure
Cyberoam-Brochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
CyberoamBrochure
CyberoamBrochureCyberoamBrochure
CyberoamBrochure
 
5691 computer network career
5691 computer network career5691 computer network career
5691 computer network career
 
Insecure mag-19
Insecure mag-19Insecure mag-19
Insecure mag-19
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx21 Cybersecurity Companies You Need to Know.pptx
21 Cybersecurity Companies You Need to Know.pptx
 
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing  A Case StudyAuthentication And Authorization Issues In Mobile Cloud Computing  A Case Study
Authentication And Authorization Issues In Mobile Cloud Computing A Case Study
 
Top firewall companies 2020 converted
Top firewall companies 2020 convertedTop firewall companies 2020 converted
Top firewall companies 2020 converted
 
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 

More from Redington Value Distribution

Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
Redington Value Distribution
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
Redington Value Distribution
 
Value Journal - April-May 2021
Value Journal - April-May 2021 Value Journal - April-May 2021
Value Journal - April-May 2021
Redington Value Distribution
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
Redington Value Distribution
 
Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
Redington Value Distribution
 
Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
Redington Value Distribution
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
Redington Value Distribution
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
Redington Value Distribution
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
Redington Value Distribution
 
Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
Redington Value Distribution
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
Redington Value Distribution
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
Redington Value Distribution
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
Redington Value Distribution
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
Redington Value Distribution
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
Redington Value Distribution
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
Redington Value Distribution
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
Redington Value Distribution
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
Redington Value Distribution
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
Redington Value Distribution
 
Value journal September_2019
Value journal September_2019 Value journal September_2019
Value journal September_2019
Redington Value Distribution
 

More from Redington Value Distribution (20)

Value Journal - June 2021
Value Journal - June 2021Value Journal - June 2021
Value Journal - June 2021
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Value Journal - April-May 2021
Value Journal - April-May 2021 Value Journal - April-May 2021
Value Journal - April-May 2021
 
Value Journal - March 2021
Value Journal - March 2021Value Journal - March 2021
Value Journal - March 2021
 
Value Journal - February 2021
Value Journal - February 2021Value Journal - February 2021
Value Journal - February 2021
 
Value Journal - January 2021
Value Journal - January 2021Value Journal - January 2021
Value Journal - January 2021
 
Value Journal - December 2020
Value Journal - December 2020Value Journal - December 2020
Value Journal - December 2020
 
Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Value Journal - August 2020
Value Journal - August 2020Value Journal - August 2020
Value Journal - August 2020
 
Value Journal _July 2020
Value Journal _July 2020Value Journal _July 2020
Value Journal _July 2020
 
Value journal June 2020
Value journal June 2020Value journal June 2020
Value journal June 2020
 
Value stories - 5th Issue
Value stories - 5th IssueValue stories - 5th Issue
Value stories - 5th Issue
 
Value journal March2020
Value journal March2020Value journal March2020
Value journal March2020
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Value Journal January 2020
Value Journal January 2020Value Journal January 2020
Value Journal January 2020
 
Value Journal December 2019
Value Journal December 2019Value Journal December 2019
Value Journal December 2019
 
Value journal November_2019
Value journal November_2019Value journal November_2019
Value journal November_2019
 
Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019Value stories - 4th Issue - October 2019
Value stories - 4th Issue - October 2019
 
Value journal October_2019
Value journal October_2019 Value journal October_2019
Value journal October_2019
 
Value journal September_2019
Value journal September_2019 Value journal September_2019
Value journal September_2019
 

Recently uploaded

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Paige Cruz
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
SOFTTECHHUB
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
Pixlogix Infotech
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 

Recently uploaded (20)

Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfObservability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdf
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website20 Comprehensive Checklist of Designing and Developing a Website
20 Comprehensive Checklist of Designing and Developing a Website
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 

Redington Value Journal - August 2016

  • 1. Klarich says enterprises require con- sistent security regardless of where their applications reside. EMC Corporation recently announced the re- sults of new research revealing that organisa- tionsarefailingtoappreciatethegrowingchal- lenges of protecting their data and, as a result, are experiencing the economic impact of data loss. New findings from the EMC Global Data Protection Index 2016, an independent study by Vanson Bourne of enterprise backup in 18 countriesaroundtheworld,revealedthat,while businesseshavebeensuccessfulinreducingthe impact of the four biggest traditional data loss Cyberthreats’ impact highlighted in the new EMC Global Survey Tripp Lite, a manufacturer of power protection and con- nectivity solutions, is now featuring new lower prices on their B070- and B072- Series of Cat5 rack-mount KVM switches. The recent price drops al- Tripp Lite slashes prices for Cat5 KVM Switches Palo Alto widens breach prevention to the cloud Palo Alto Networks, the next- generation security company, has announced advancements to its Next-Generation Securi- ty Platform that is designed to extend the breach prevention capabilities of the platform and address the security needs Issue 03// August 2016 Goulden says EMC continues to innovate to stay ahead of both existing and new challenges. Continue on page 2 Vendor’s new isolated recovery solutions protect data against destructive cyberattacks and ransomware PAN-OS Version 7.1 deliv- ers Universal protection across multi-cloud envi- ronments and SaaS Apps MovebringsITmanagers thelowest-pricedrack- mountKVMsolutions risks, they are unprepared for new, emerging threats,whicharetakingtheirtollinstead.When compared to the EMC Global Data Protection Index 2014, 13% more businesses experienced data loss or disruption in the last 12 months, costing them an average of $914,000. EMCcommissionedtheupdatedresearchto help organisations recognise and prepare for therapidlychanginglandscapeofthreatstoen- terprisedata.ThesurveyresultsfromtheEMC Global Data Protection Index 2016 identified thefollowingthreemajorchallengestomodern data protection namely threats to protection data, threats to data in the cloud and evolving protection needs. Continue on page 2 Continue on page 2 The new KVM solutions provide innovative features and exceptional quality. Redington value is a value added distributor for the following brands in parts of Middle East & Africa:
  • 2. 2 For more information, please write to sales.value@redingtongulf.com EMC... Palo Alto... DavidGoulden,CEO,EMCInfor- mation Infrastructure, said: “Our customers are facing a rapidly evolvingdataprotectionlandscape onanumberoffronts,whetherit’s toprotectmoderncloudcomputing environments or to shield against devastating cyberattacks. Our re- searchshowsthatmanybusinesses areunawareofthepotentialimpact and are failing to plan for them, which is a threat in itself.” Goulden said as a leader in data protection and cloud computing, EMCcontinuestoinnovatetostay ahead of both existing and new challenges by providing modern cloud-centric data protection so- lutions. “In addition, today we are introducing the first in a range of new Isolated Recovery Solutions, that are designed to help protect customerdataagainstcyberattacks such as ransomware and destruc- tive hacking,” he said. Nearly a quarter (23%) of busi- nesses surveyed had experienced datalossorunplannedsystemsdis- ruptionduetoanexternalsecurity breachandthatnumberincreased to over one third (36%) when tak- inginternalbreachesintoaccount, the survey found. Businesses are increasinglyfacingthreatsnotjust to their primary data, but also to their backup and protection data. On the other hand, more than 80% of survey respondents indi- cated that their organisations will run at least part of eight key busi- nessapplicationsinthepubliccloud inthenexttwoyears;yetlessthan half said they protect cloud data against corruption and less than half against deletion. EMC said it is critical for or- ganisations to include cloud ap- plications in their overall data protection strategies. EMC of- fers a comprehensive portfolio of solutions for cloud-to-cloud and on-premise-to-cloud data protection to facilitate this, the company stated. of businesses working with cloud-based environments and software-as-a-service (SaaS) applications. According to Palo Alto Net- works, the demand for organ- isations to become ever more agile and competitive is driv- ing a change in the way busi- ness applications are devel- oped, deployed, and adopted. The company said work- loads and data are increasingly distributed across physical and cloud computing envi- ronments and this changes the threat landscape and increases the risk of exposure to cyber- attacks, which is compounded by the limitations of legacy se- curity products that were not designed for this distributed, cloud-based infrastructure. Palo Alto Networks said it has addressed these chal- lenges, and many more, in PAN-OS 7.1. The vendor said this version of the operating system extends the breach prevention capabilities of the security platform to all major clouds and provides visibility, control, and threat prevention designed to protect customer data regardless of where it resides. In addition, among the new features are certificate and two-factor authentication ad- vancements that help protect user credentials or neutralise them if they are stolen. Lee Klarich, executive vice president, product manage- ment at Palo Alto Networks, said: “Enterprises require consistent security regardless of where their applications reside. The latest release of PAN-OS addresses new chal- lenges presented by the cloud, enabling organisations to take advantage of agile cloud-based infrastructure and applica- tions while maintaining a consistent security posture.” Vendorlaunchesitslatest innovationstoadaptto changingroleofdatacentres ‘Smart Choices for Digital Infrastructure’ is a concept which supports managers through the decision process. Cablingsystemsandopticalfibre solutionsvendorNexans,recently launched its data centre innova- tions under the name of “Smart ChoicesforDigitalInfrastructure”. According to Nexans, the dif- ferent data centre infrastructure technologieswillhelpmanagersto support the exponential increase in data transmission. The company said the digi- tal transformation requires ag- ile, carefully planned IT infra- structure, efficient data access and exchange. Nexansaddedthateachofthese factorsisvitaltosuccess,butnet- work managers face difficult de- cisions to provide the optimum platform for their specific needs. ‘Smart Choices for Digital In- frastructure’ is a concept which supports managers through the decisionprocessbyincorporating cabling systems which support severalconsecutivegenerationsof activeequipmentandthatarero- bust,flexibleandscalabletoadapt to new requirements. Nexans’ latest offering include flexible,cost-effectivebandwidth architectures,optimisedspaceus- age, performance protection and enhancement, faster modular deployment and design through to operation’ support services. Nexans introduces ‘Smart Choices for Digital Infrastructure’ low IT managers to choose from several highly fea- tured KVM switches and consoles for controlling an entire network while still managing expenses. According to Tripp Lite, these KVM solutions pro- vide innovative features and exceptional quality, along with the reliability for which Tripp Lite has long been known. The company said key fea- tures of Tripp Lite’s KVM switches include connection of up to 32 servers with inex- pensive Cat5 cabling, sleek, compact design that helps reduce cable clutter and im- prove airflow and console switches that include built- in LCD, keyboard and mouse. Other features according to Tripp Lite include models with IP access that add flex- ibility of remote monitoring from virtually anywhere in the world, multi-user capa- bilities, password protection and advanced encryption to simplify IT tasks while keep- ing server access secure. “With these price reduc- tions, IT departments of all sizes can now centralise device management easily and affordably,” said David Posner, Tripp Lite’s Direc- tor of Marketing for Cables and Connectivity. “Our KVM solutions are simply the best value available in the market.” Tripp Lite is a leading manufacturer of products that power, connect and protect computers and IT equipment in any envi- ronment, from desktops to data centres. The company’s innova- tions include the world’s first UPS system designed specifically for personal computers and the world’s most trusted premium surge suppressor–the Isobar, with more than 19 million in use. Tripp Lite...
  • 3. 3 For more information, please write to sales.value@redingtongulf.com Redington Value Distribu- tion, a value-added distributor across MEA, has announced that it has partnered with Pivot3 to bring the vendor’s dynamic hyper converged in- frastructure (HCI) solutions to enterprise customers across the region. Under the agreement, Redington Value Distribu- tion with its vast network of channel partners, will offer Pivot3 products and solutions in the enterprise data cen- tre domain across technolo- gies ranging from compute, Redington Value Distribution partners with Pivot3 Distributor to offer the vendor’s hyper con- verged infrastructure solutions across MEA Mathrani says HCI solutions are only just beginning to penetrate the enter- prise data centre. storage, network, software, security, virtualisation, high availability, business conti- nuity and cloud. In addition, the distributor will also have offerings in voice and unified communications space. The vendor’s acquisition of NexGen Storage makes Pivot3 the only company in the industry to offer custom- ers solutions that allow IT to prioritise application per- formance based on business priority along with complete implementation flexibility and QoS management. “While the HCI market has been growing exponentially for years, this innovative tech- nology is only just beginning to penetrate the enterprise data centre,” added Rajesh Math- rani, General Manager, Sales, Middle East at Redington Value Distribution. Mathrani said with Pivot3’s dynamic offerings to cus- tomers in industries such as hospitality, surveillance, healthcare, transportation, entertainment, education, insurance and retail, Red- ington Value and its channel partners now have a unique solution which can address the needs of these industries while providing customers complete control over their deployments helping them move from legacy data cen- tre storage environments to software defined storage. Redington said together with Pivot3, it will empower its channel partners to ad- dress the requirements of mid-market and enterprise customers offering a practi- cal and proven path to the software-defined data centres of the future without com- promising on simplicity and economics of easy-to-manage HCI platform. “This is a great opportunity for both our organisations to expand our footprint in the MEA markets,” said Anand Chakravarthi, area vice presi- dent, Pivot3 Dubai. “Red- ington Value and its large network of partners gain a competitive advantage with the technology offerings from Pivot3 and we gain access to markets across MEA with this association,” he said. Chakravarthi explained that being a very channel oriented organisation, Pivot3 recognise the strength in addressing the needs of enterprise customers through channel partners and Redington’s partners are a key element in the joint growth strategy. “Over the last few years we have built quite a good set of enterprise cus- tomer references within this region and the partnership will help us scale higher with the help of Redington’s elab- orate partner network,” he pointed out. This partnership between Redington and Pivot3 will also be an opportunity for channel partners to address the enterprise data centre space and will help many to penetrate deeper into their clients’ accounts while cre- ating much closer alliances with customers. Distribution industry honours Veeam Software VeeamSoftware,theinnovativepro- viderofsolutionsthatdeliveravail- ability for the “Always-On Enter- prise”,hasannouncedthatitrecently receiveda“GoldEMEARisingStar” award from the Global Technology DistributionCouncil(GTDC). The Rising Star Awards recog- nise technology companies with exceptional sales growth through European, Middle East and Africa distributorsoverthepastyear. This year’s awards were pre- sented during an evening dinner event at the 2016 GTDC Sum- mit EMEA conference at the Vendor recognised for outstanding sales growth in the EMEA region Pommier says Veeam’s business depends on the channel and the excellent work of partners. Grand Hotel Huis ter Duin. Veeamwasamongonly15overall winners chosen from hundreds of manufacturersandpublisherswho rely on distributors to meet the product and service requirements of technology solution providers in theEMEAmarket. Gold, Silver and Bronze Rising Star Award winners were selected infourrevenuecategoriesandover- all software business, respectively, witheachcategorywinnerbasedon sales growth over the past year, as tracked by the Context SalesWatch DistributionPanel. “We’veenjoyedgreatsuccessinthe ‘Rising Star’ award in the past – it’s anhonourforus–andtowinitagain is testament to Veeam’s hard work, impressive growth and foresight,” saidGillesPommier,VicePresident, ChannelandCloudEMEAatVeeam Software.“Ourbusinessdependson thechannelandtheexcellentworkof ourpartnercommunity.LikeVeeam, theyhaveacknowledgedtheneedfor theAlways-OnEnterprise,andrec- ognisethatproductssuchasVeeam AvailabilitySuitecanhelptheircus- tomersmakethisareality.” To be eligible for a Rising Star award,vendorsmusthavesoldcor- respondingproductsthroughGTDC members for at least one year. Se- lectionsforGold,SilverandBronze winners in each revenue category are based on Context SalesWatch datafromApril2015–March2016. “Thisyear’swinnersspanabroad range of product categories – our most diverse yet - representing to- day’smostprogressiveandinnovative marketsegments,”commentedTim Curran,GTDCCEO.“It’simpressive toseesomanywinnersfocusedonthe hottesttrends,fromcloud,mobility andbigdatatosecurity,virtualisation andhyper-convergedinfrastructure, forexample.” Curran said the growth of these companiesshowcasesthevalueand impactofdistributionpartnerships throughouttheEMEAregion.
  • 4. 4 For more information, please write to sales.value@redingtongulf.com VendorusesGoogleCloud Platformandaddssoftware- definednetworking Fitzgerald says CloudForms 4.1 is the most comprehensive, hybrid cloud management solution. OpensourcesolutionsmakerRedHat Inc, has announced the general avail- abilityofRedHatCloudForms4.1,the latestversionofitsopenhybridcloud managementsolution. WithsupportforGoogleCloudPlat- form, Red Hat CloudForms 4.1 now supports greater choice and flexibil- ity for customers who want to run hybrid cloud workloads on Google Cloud Platform, Microsoft Azure or AmazonWebServices. Inaddition,RedHatCloudForms4.1 expandsthescopeofitsmanagement capabilities with software-defined networking (SDN), providing a more unified management experience for software-defineddatacentres. AccordingtoRedHat,CloudForms 4.1 makes it easier to automate com- plexITprocessesthroughintegration withAnsibleTower,andprovidescus- tomerswithasimpler,cloud-friendly subscriptionmodel. JoeFitzgerald,vicepresident,Man- agement at Red Hat, said: “We hear constant customer demands focus- ing on rapidly advancing their hybrid cloud strategies and the need for one, consistent management view across theirphysical,virtual,andcloudenvi- ronments.CloudFormsoffersthat,and webelieveCloudForms4.1istheindus- try’smostcomprehensive,hybridcloud management solution on the market. CloudFormsnownotonlysupportsthe world’slargestpublicclouds,butalso integrateswithAnsibletodramatically simplifyautomation.” Red Hat CloudForms expands public cloud management Networking giant Cisco has an- nounced it will help engineers, de- velopers, partners and customers embrace a monumental change in how networks are built and man- aged—preparingtheindustryforthe transitiontodigital-readynetworks. Cisco is also building on the in- tersection between security and networking with new technologies designed to simplify branch office securityandmakeitmoreeffective. InMarchthisyear,Ciscolaunched the Digital Network Architecture (Cisco DNA)—a radical new ap- proach to networking designed for thedigitalera. The vendor said as customers embrace mobility, cloud, analytics and the Internet of Things (IoT) to digitisetheirbusiness,ITteamsare Cisco prepares digital-ready networks Networking giant improves threat visibility and enforcement capabilities with new embedded security technology Reed says organisations need to ad- dress the expanding threat landscape across mobility and cloud. strugglingtokeepupwiththeever- increasingcomplexityofthenetwork, sophisticationofsecurityattacksand growingcustomerexpectations. Ciscosaiditrealisedthattradition- alnetworkssimplycouldnotscaleto meettheincreasingdemandsofthe digital business and a new network wasneededforthedigitalera. The company added that Cisco DNA helps IT address these de- mandsbymovingnetworkingfrom hardware-centrictosoftware-driven, frommanualtoautomated,andfrom reactivetoadaptive. “Organisationsneedtoaddressthe expanding threat landscape across mobility and cloud, while facing increasingly sophisticated security attacks,” said Jeff Reed, senior vice president, Networking Infrastruc- CyberArk unveils cloud-based privileged account for endpoint CyberArk, the company that protects organisations from cyberattacks that have made their way inside the network perimeter, has announced new capabilities for CyberArk View- finity that deliver privileged ac- count security to the endpoint. With CyberArk Viewfin- ity version 5.5, customers can benefit from an enhanced, single privilege management and application control solu- tion to reduce the attack sur- face while being able to block CyberArk Viewfinity integrates privilege management with app control to protect against malware-based attacks With CyberArk Viewfinity version 5.5 customers can benefit from an en- hanced, single privilege management. the progression of malware- based attacks, and balance business user productivity and enterprise security. Following the acquisition of Viewfinity in Q4 2015, CyberArk Viewfinity is now available as part of the CyberArk Privileged Account Security Solution. The company said with the latest release, customers can gain greater privilege manage- ment and application control features in an on-premises or software-as-a-service (SaaS)- based offering. “As malware continues to be a frequently-used and successful means for hijacking credentials, organisations must realise that the endpoint problem is a privi- lege problem,” said Roy Adar, Senior Vice President, Product Management, CyberArk. “The fact is, motivated attackers will eventually get inside your net- work – it’s what happens next that matters.” Adar added that establishing a footholdonendpointsandescalat- ing privileges enables attackers to jumpfromendpoints,toservers,to domaincontrollersuntiltheyown thenetwork.“CyberArkViewfinity extends privilege security to the endpoint to mitigate these risks without excessively restrictive controls on users,” Adar said. NewintegrationwiththeCyber- Ark Shared Technology Platform enablesallprivilegedauditlogsto bestoredandreviewedcentrally,as wellasnewflexible,customisable reporting capabilities. According to the security solu- tions vendor, evidence shows that advanced attacks often start with phishing emails sent to non-privi- legedbusinessusers,andacampaign ofjust10emailswilltypicallyyield a greater than 90% chance that at least one person will become the criminal’sprey. ture and Solutions at Cisco. “With DNA, Cisco is reinventing how we secure networks for the digital era by embedding advanced security capabilities into a single network architecture. But technology alone isn’tenough.WearealsopreparingIT professionalswithnewskills,training network-savvydevelopersandhelp- ing customers navigate the journey todigital-readynetworks.”
  • 5. 5 For more information, please write to sales.value@redingtongulf.com TechnologymajorHewlettPackard Enterprise (HPE) has announced a new high-performance comput- ing (HPC) solutions that includes acomprehensivesoftware-defined platform, enhancements to its Apollo servers, as well as, a new ANSYS computer-aided engineer- ing (CAE) software based solution designedtohelpmanufacturingor- ganisations optimise their design simulationdeployments. Once the domain of academics and research institutions, HPC is rapidlymakingitswayintoindustries like energy, life sciences, financial servicesandmanufacturing.While organisations in these industries recognise the technology’s strate- gicimportance,perceivedcomplex- ity and diversity of HPC environ- ments may appear to outweigh the businessbenefits. HPE Unveils Software Defined HPC platform New software platform delivers Simplicity, Speed and Flexibility Mannel says HPC is rapidly becoming one of the essential ingredients for the digital economy. HPE’s announcement dramati- callysimplifiesthedeploymentand managementofHPCsolutions,en- suringcompaniesofallsizescannow accelerate their HPC projects and create competitive differentiation fortheirbusiness. “HPCisrapidlybecomingoneof theessentialingredientsforthedigi- taleconomyacrossorganisationsof alltypesandsizes,”saidBillMannel, vicepresidentandgeneralmanager, HPC, Big Data and IoT Servers at HPE. “Today we are excited to un- veil new additions to our recently announced portfolio capabilities designedtoaccelerateaccessibility and time to value for HPC by sig- nificantlysimplifyingdeployments, streamlining management and boostingperformance.” “As the global HPC market leader with 35.9% market share HPE is upping the ante with new additions to its already-large HPE Apollo portfolio of purpose-built solutions,” said Steve Conway, Research Vice President in IDC’s High Performance Computing group. “These innovative solu- tions aim to accelerate HPC adop- tion by organisations of all sizes and segments by enabling faster time to value and increased com- petitive differentiation through better parallel processing perfor- mance, along with reduced com- plexity and deployment time.” Gigamon to Offer First Visibility Solution for Public Cloud GigamonInc,aprovideroftrafficvis- ibilitysolutions,hasstartedtrialsfor the world’s first solution that allows enterprisestoseeinformationtravers- ingpublicclouds. Gigamon’s visibility solutions for public cloud kicks off with field trials of its Amazon Web Services (AWS) Elastic Compute Cloud (EC2)offering. Thepercentageofworkloadshosted in the public cloud is set to explode from16toalmost40%overthenext fiveyears,accordingtoJPMorgan. Innovative solution to enable enterprises monitor and secure workloads hosted by Amazon Web Services Hooper says Gigamon is a market pio- neer that has transformed the world of IT through the power of visibility. NewFirewallenables organisationstooperatesecure, distributed,cloud-basednetwork environments Gheri says as threats became more targeted, traditional port blocking firewalls are no longer enough. With this rapid growth comes in- creasing concern for network secu- rityvulnerability,complianceriskand compromisedperformance. Gigamonsaidseamlesspubliccloud adoptionhingesonenterprisesbeing able to take advantage of the agility offeredbyon-demandcomputeand confidencethathostingbusinesscriti- calapplicationsonsharedinfrastruc- turedoesnotmeancompromisesin securityoravailability. Inaddition,thevendorsaidthean- nouncement takes a significant step forwardfortheindustrybyallowing enterprises to for the first time ever, gain visibility into previously un- available public cloud applications andinformation. “Gigamon is a market pioneer that has transformed the world of IT through the power of visibility. Whether it’s delivering more effec- tive and efficient security, bringing unprecedentedsubscriberawareness toserviceprovidersorscalingperfor- mance management, our Visibility Fabrichasbeenatthecenterofhelp- ingourcustomersnavigatedisruptive changesaroundtheirnext-generation infrastructure,” said Paul Hooper, CEO,Gigamon.“Withthismilestone, Gigamon enters a new phase in ex- ecutingourcompanyvision.Weare expandingourmarketyetagaintothe thousandsofbusinessesthatwantto confidently and securely host their ITinfrastructureonpublicclouds.” According to Gigamon, this in- dustry-leading capability is key to accelerating public cloud adoption andreducingitsassociatedmigration disruptionandrisks.WithGigamon’s visibility solution, enterprises gain unprecedented flexibility to design andprovisionthepubliccloudmoni- toringinfrastructurethatmeetstheir business needs with the freedom to choose the most appropriate public cloudprovidertoaddresstheirspecific requirements,thecompanysaid. NetworksecuritysolutionsvendorBar- racudahasannouncedtheavailabilityof Barracuda,NextGenFirewallF-Series version 7.0, which is designed for or- ganisations adopting cloud-based ap- plications,operatingdispersednetwork environments and leveraging public cloudplatforms. Thenvendor’sNextGenFirewallVer- sion7.0providessecurityandreliability in these environments, especially for organisations leveraging public cloud platformslikeMicrosoftAzureandAm- azonAWS.Barracudasaidorganisations areincreasinglyadoptingvirtualisation, software defined networks and cloud applications such as Office 365, Sales- forceandvideoconferencing.Assuch, the vendor stated that the role of the firewallhasevolvedfromaperimeter- based security device to a distributed securitysolutionthatmustintelligently optimise traffic to improve network performanceandprovidereliableaccess tothesemissioncriticalapplicationsfor allusersacrossalllocations. AccordingtothecompanytheBarra- cudaNextGenFirewallisdesignedfrom the ground-up for the cloud era and enablesintelligentnetworkperimeters at headquarters, remote and branch offices,andsatellitelocationstodeliver secure,direct,businessqualityaccessto applicationshostedinprivateandpublic cloudenvironmentswhileminimizing theneedtobackhaultraffic. Barracuda Expands Cloud-Ready Next- Generation Firewall Technology
  • 6. 6 For more information, please write to sales.value@redingtongulf.com Amazon Web Services Inc (AWS), an Amazon.com company, has an- nounced that Amazon Elastic File System(AmazonEFS),anew,fully managedservicethatmakesiteasy to set up and scale file storage in the AWS Cloud, is now available to all customers. With a few clicks in the AWS Management Console, custom- ers can use Amazon EFS to create file systems that are accessible to multipleAmazonElasticCompute AWS launches Elastic File System Newelasticfilestorageservicemakesiteasytodeploy andscalefilesystemsintheAWSCloud Cloud (Amazon EC2) instances via the Network File System (NFS) protocol. According to the company, Amazon EFS can automatically scale without needing to provi- sion storage or throughput, en- abling file systems to grow seam- lessly to petabyte scale, while supporting thousands of con- current client connections with consistent performance. “Ascustomerscontinuetomove more and more of their IT infra- structuretoAWS,they’veaskedfor a shared file storage service with theelasticity,simplicity,scalability andon-demandpricingtheyenjoy with our existing object (Amazon S3), block (Amazon EBS) and ar- chive (Amazon Glacier) storage services,” said Peter DeSantis, Vice President, Compute Servic- es, AWS. “Initially, our custom- ers most passionately asking for a file system were trying to solve for throughput-heavy use cases like data analytics applications, large-scale processing workloads, andmanyformsofcontentandweb serving. Customers were excited aboutAmazonEFS’sperformance for those workloads, and pretty soon they were asking if we could expandAmazonEFStoworkexcel- lently for more latency-sensitive and metadata-heavy workloads like highly dynamic web appli- cations. That’s what we’ve been workingonforthelastfewmonths and we’re excited to release it to customers today.” AmazonEFSisdesignedtosup- portabroadrangeoffileworkloads – from big data analytics, media processing,andgenomicsanalysis thataremassivelyparallelisedand require high levels of throughput, tolatency-sensitiveusecasessuch as content management, home di- rectory storage, and web serving. AmazonEFSishighlyavailableand durable, redundantly storing each file system object across multiple availability zones. Amazon EFS can automatically scale without needing to provision storage or throughput. Fidelis Cybersecurity unveils threat intelligence database Fidelis Cybersecurity says the new security resources are available at no cost. Fidelis Cybersecurity, a provider of products and services for de- tecting and stopping advanced cyberattacks, has announced the availability of a new threat intel- ligence database and freeware tools designed to help the secu- rity community stop attacks and prevent data theft. The company said the new re- sourcesareavailableatnocostand includetheBarncatThreatIntelli- genceDatabase,theThreatScanner toolforfindingmalwareresidingon anendpoint,andCCNumberFinder to support PCI DSS compliance. Hardik Modi, Vice President, ThreatResearchatFidelisCyberse- curity,said:“Afteryearsofongoing researchandthousandsofhoursof incidentresponseengagements,we areeagertogivebacktothesecurity communitybysharingsomeofthe threatintelligencewehavecurated andfreetoolswehavedeveloped.” Modi said by making these tools and intelligence available to re- searchers and security analysts, Fidelis Cybersecurity is hop- ing organisations will be able to find and stop attackers faster and more efficiently. According to the company, the Fidelis Barncat Intelligence Data- base includes more than 100,000 recordswithconfigurationsettings extracted from malware samples gathered during Fidelis’ incident response investigations and other intelligence gathering operations over the past decade. New tools to help security practitioners find attack- ers faster Check Point’s new security appliances for SMBs SecurityvendorCheckPointSoft- ware Technologies Ltd, recently announced two new additions to the Check Point 700 Series appli- ances,bothaddressingtheunique securityneedsofsmallbusinesses. The new Check Point 770 and 790 appliances, together with the 730 and 750, provide advanced threatpreventionfeaturessuchas New770and790appliancesextendtheCheckPoint700seriesfamily The 770 and 790 extend the capa- bilities of Check Point’s 700 Series appliance array. firewall, VPN, antivirus, anti-bot, application control, URL filtering and email security. In addition, the appliances de- liver optimised network perfor- mance of up to 4 Gbps of firewall throughput and up to 330 Mbps whenthreatpreventionfunctions are activated. According to the 2016 Verizon Data Breach Investigations Re- port, cyber criminals use several avenues to infiltrate small busi- nesses – such as phishing, ran- somware and denial-of-service attacks. With the cost of these attacks on a small business av- eraging more than $35,000 (ac- cording to First Data Market Insight), the impact of today’s cyber threats can have a devas- tating effect in an increasingly competitive marketplace. “With small businesses playing such a big role in the economic growth and innovation across the globe, there is a need for a simple solution that helps keep these small, often resource-strapped organisations a step ahead of to- day’s cybersecurity challenges,” said Gabi Reish, Vice President of product management, Check Point. “The 770 and 790 extend the capabilities of our 700 Series appliance family, providing the advanced protection necessary to protect small business customer networks from threats and un- necessary exposure.” CheckPointsaidthenew770and 790 deliver security optimised for smallbusinesses.Thesecompactap- pliancesaresimpletoconfigureand manage,providingadvancedthreat preventionagainstcyber-attacks.
  • 7. 7 For more information, please write to sales.value@redingtongulf.com Fortinet touts Security Fabric solution in Middle East Commercial espionage key reason for cyberattacks; report Vendormovestoaddresstheenterprisenetworkand challengesCIOsface TrendMicrorevealsadvancedtechnologiesinthemining industrycouldleadtoadvancedthreats Zakhour says the Fortinet Security Fabric has traits that allow organisa- tions to adapt and avoid becoming obsolete. Trend Micro says data stolen through corporate espionage can have devas- tating effects on the targeted firm. TechnologypowerhouseDellMiddle Easthasurgedtheregionalsystems integration(SI)channeltoembrace businessprocessandsolutionslife- Dell urges systems integrators to embrace business process selling Understandingbusinessprocessandsolutionslifecyclecrucialforpartnersuccess Hasan says there’s a big gap and demand for SIs in the market who understand solutions lifecycle. cyclewhenintegrationsolutionsin acustomer’senvironment. Thecallcomesatatimewhenthe Middle East IT industry is trans- formingandthegrowingemphasis intheregiononbusinessprocessand specificallysolutionslifecyclewhen itcomestosolutionsintegration. Shams Hasan, Enterprise Prod- uctManager,DellMiddleEast,said whiletheneedforbusinessprocess andsolutionslifecycleisgrowingin thechannel,theemphasisseemsto bemorefromthegrowingconcerns of customers rather than solution integrators. Hasan observed that there’s still a big gap in the market between the demand for SIs who understand, speak and bring a so- lutions lifecycle commitment and supply. “SIs who take heed of this supply gap would be big winners tomorrow,”Hasansaid. HecontinuedthatDellisalready well-positionedforcustomers,solu- tion integrators, and partners look- ing for technology strategies and solutions that are future ready for digitaltransformation. “Dell’s Future-Ready Enterprise strategygivesorganisationsawayto buildITcertaintyinuncertaintimes, with the speed, scale and savings businessdemands,”headded.When wetalktoourbusinesspartners,we emphasize our ability to serve as a partnerwhocanprovideacomplete solution–onecreatedwithaholistic viewthattakesadvantageofthefull spectrumofITtodeliversuccessful businessoutcomes.Wetalkaboutour uniquepositionastheonlytechnol- ogy company that actually delivers onthepromiseofintegrated,end-to- endsolutions–fromthedatacentre tothefarthestendpointandallalong thecloudsandnetworksinbetween.” HasansaidwithDell’send-to-end solutions,organisationscanbecome nimbleandcompetitiveeverywhere intheenterprise,inthemannerthat bestfitstheirbudget,staffingandtim- ingrequirements—whetherdeploy- ing pre-configured systems, using validatedreferencearchitecturesfor guidanceorbuilding“do-it-yourself” withbest-of-breedplatforms. Security vendor Fortinet Middle East, has revealed that it is push- ing the Fortinet Security Fabric, launched earlier this year, as a re- sponse to the current state of the enterprise network and the chal- lenges that CIOs face today. According to the manufacturer of fast and secure cyber security solutions,whichoffersenterprise- levelnextgenerationfirewallsand a vast array of network security products, the Fortinet Security ITsecurityvendorTrendMicrohas revealed that the UAE is among 22 victimsofcyberattacksreportedglob- allyintheminingsector,accordingto thevendor’slatestreport. The report stated that with Saudi Arabia’s mining sector to represent 10%ofitsnon-oilrevenueby2030,and withothercountrieslikeOmanandthe UAEinvestinginnewertechnologies, theoutlookforintegratedITplatforms and cloud operations in the mining sectorissettogrowintheregion. Fabricprovidesorganisationswith a framework for meeting today’s andtomorrow’ssecuritychalleng- es, bringing the power of threat intelligence to all four corners of a network. Maya Zakhour, Channel Direc- tor, Middle East at Fortinet, said: “The Fortinet Security Fabric has characteristics that allow organ- isations to adapt as necessary and avoidbecomingobsoletewiththe next wave of new trends that will hit the market.” Zakhoursaidthecompanyiswit- nessingagrowingtrendofspeciali- sations,whichworkstotheadvan- tageofchannelpartners,especially inthenetworksecuritymarket.She addedthatsinceFortinethasprod- uctsthatcatertoeverylayerofthe network, the company is pushing Fortinet Security Fabric by edu- cating partners on the solutions bestsuitedforthem,basedontheir specialisations and the industry vertical they are targeting. With this, stated Trend Micro, companiesinthesectorwillhavetobe preparedforthesecuritychallenges thesetechnologyadvancesbring. According to the Trend Micro report, the mining industry is be- ing targeted by cybercriminals and is now investigating 17 inci- dents involving cyberattacks on 22 entities operating in the sector since 2010. The most recent at- tack was recorded in April 2016, when hackers leaked 14.8GB of data from the Canadian mining corporationGoldcorp. Thoughthereportdoesnothave majorcasesfromtheMiddleEast andAfrica,companiesintheregion are not immune to these attacks. TheUAEbasedfirmMineralsand MarineAssetsCorporation(MAC) and Canadian company Nautilus were the victims of a targeted cy- ber scam, wherein Nautilus paid a$10mdepositintendedforMAC into an unknown bank account.