Redington Value Distribution's ‘Value Journal’, a monthly news journal whose purpose is to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the July Edition:
• Redington Value Distribution partners with Pivot3
• Palo Alto widens breach prevention to the cloud
• Tripp Lite slashes prices for Cat5 KVM Switches
• Cyberthreats' impact highlighted in the new EMC Global Survey
• Cisco prepares digital - ready networks
• HPE Unveils Software Defined HPC platform
Mike McBride will provide a look at the Industrial IoT (IIoT) landscape and the OT/IT convergence. He will cover several use cases including healthcare, entertainment and smart buildings. He will cover the challenges IIoT networking faces with emerging technologies and how edge computing will provide increased performance, security and reliability. Mike will discuss the various Edge Computing standards & opensource forums along with proposed architectures. And Mike will present new solutions being proposed (ICN, slicing, Blockchain) to support the bandwidth, latency and security requirements within Industrial verticals.
About the speaker: As Sr. Director of Innovation & Strategy, within Huawei's IP Network BU, Mike leads Industrial IoT, Edge Computing and IP/SDN architecture, standardization, and strategy across product lines and industry forums. He leads architecture and standardization activities within the IIc and BBF and has served as an IETF Working Group chair for 15 years. Mike has led emerging technology projects within opensource communities and played a key role in the formation of OPEN-O (Now ONAP). He is an Ericsson alum where he developed and directed SDN/NFV network architectures. And for many years with Cisco, Mike supported customers, worked in development teams and managed mobility, wireless and video projects across BUs. Mike began his career supporting customers at Apple Computer. He resides in Orange County, CA
The document discusses how wireless services-oriented networks are transforming airport operations by streamlining processes, lowering costs, and enhancing profitability. It describes how airports are migrating disparate wired networks to a common, interoperable wireless network to improve security, efficiency, and constituent satisfaction. The wireless network allows airports to better manage key areas like security, operations, maintainability, and loyalty programs. [/SUMMARY]
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...PODIS Ltd
The Global Entrepreneurship Summit GES 2019 spins off a cooperation agreement between PODIS Ltd, participant of GES 2019, and autoaid GmbH.
This cooperation agreement is the foundation for bringing together a patented Automatic Crash Notification SaaS and a Pioneer in cloud based automotive and remote diagnoses.
The new solution lands into the aftermarket telematics ecosystem implementing IoT, AI and big data technologies.
PODIS patented filter of false alarms in the Autoaid ODBII dongle (http://www.autoaid.de) , together as a cloud based system, will empower B2B clients to:
• Become a compliant TPSP in the eCall ecosystem,
• Offer UBI (Usage Based Insurance),
• Monitor driver's behavior.
• Access detailed accident reports,
• Gain Big Data analytics and insights from the continuous flow to a data lake,
• Perform remote car diagnostics, enabling preventive and predictive maintenance, and
• Improve Claim and the repair support providing to the insurer the First Notification of Loss (FNOL).
MT85 Challenges at the Edge: Dell Edge GatewaysDell EMC World
- Dell Technologies presented their IoT infrastructure portfolio, which spans from the edge to the core to the cloud. This includes embedded gateways, on-premise appliances, data center infrastructure, and cloud and application integration capabilities.
- Falling sensor costs, power efficiencies, ubiquity of mobility, growth of cloud computing, and other modern technologies are fueling more IoT solutions. However, enterprises face challenges like security, data volume/analytics complexity, and lack of standards.
- Dell's portfolio is designed to address these challenges and unlock IoT potential. Their edge gateways feature diverse connectivity, data protocol support, security, and manageability. This infrastructure combined with partners allows customers to gather and analyze data and
The document discusses trends in enterprise software recruiting. It notes that enterprise software is experiencing massive growth, with $5.7 billion invested in software companies in Q4 2014 alone. Key areas of focus in enterprise software include cloud services, data analytics, mobility, security, big data, storage, and cybersecurity. The document provides an overview of the enterprise technology landscape, including opportunities in infrastructure, data architecture, applications, and security layers. It also lists the top 100 cloud-based enterprise software startups by total funding.
The business alchemy of the IoT. The M2M/IoT community
is now carrying out a transformation, turning silicon, copper, rare earth elements and the airy ether of the radio spectrum into new products, services, business models and profits.
Securing Manufacturing: How we can improve speed and efficiency while protect...Conor Bronsdon
in 2019 Microsoft Services started a series of eBooks examining key opportunities in Cybersecurity & Identity transformation within different industries.
This paper (which I contributed to) examines industrial manufacturing security within the context of today's digital transformation.
Mike McBride will provide a look at the Industrial IoT (IIoT) landscape and the OT/IT convergence. He will cover several use cases including healthcare, entertainment and smart buildings. He will cover the challenges IIoT networking faces with emerging technologies and how edge computing will provide increased performance, security and reliability. Mike will discuss the various Edge Computing standards & opensource forums along with proposed architectures. And Mike will present new solutions being proposed (ICN, slicing, Blockchain) to support the bandwidth, latency and security requirements within Industrial verticals.
About the speaker: As Sr. Director of Innovation & Strategy, within Huawei's IP Network BU, Mike leads Industrial IoT, Edge Computing and IP/SDN architecture, standardization, and strategy across product lines and industry forums. He leads architecture and standardization activities within the IIc and BBF and has served as an IETF Working Group chair for 15 years. Mike has led emerging technology projects within opensource communities and played a key role in the formation of OPEN-O (Now ONAP). He is an Ericsson alum where he developed and directed SDN/NFV network architectures. And for many years with Cisco, Mike supported customers, worked in development teams and managed mobility, wireless and video projects across BUs. Mike began his career supporting customers at Apple Computer. He resides in Orange County, CA
The document discusses how wireless services-oriented networks are transforming airport operations by streamlining processes, lowering costs, and enhancing profitability. It describes how airports are migrating disparate wired networks to a common, interoperable wireless network to improve security, efficiency, and constituent satisfaction. The wireless network allows airports to better manage key areas like security, operations, maintainability, and loyalty programs. [/SUMMARY]
GES 2019 - Global Launch Lounge - “Collaborations for a Better Future” - PODI...PODIS Ltd
The Global Entrepreneurship Summit GES 2019 spins off a cooperation agreement between PODIS Ltd, participant of GES 2019, and autoaid GmbH.
This cooperation agreement is the foundation for bringing together a patented Automatic Crash Notification SaaS and a Pioneer in cloud based automotive and remote diagnoses.
The new solution lands into the aftermarket telematics ecosystem implementing IoT, AI and big data technologies.
PODIS patented filter of false alarms in the Autoaid ODBII dongle (http://www.autoaid.de) , together as a cloud based system, will empower B2B clients to:
• Become a compliant TPSP in the eCall ecosystem,
• Offer UBI (Usage Based Insurance),
• Monitor driver's behavior.
• Access detailed accident reports,
• Gain Big Data analytics and insights from the continuous flow to a data lake,
• Perform remote car diagnostics, enabling preventive and predictive maintenance, and
• Improve Claim and the repair support providing to the insurer the First Notification of Loss (FNOL).
MT85 Challenges at the Edge: Dell Edge GatewaysDell EMC World
- Dell Technologies presented their IoT infrastructure portfolio, which spans from the edge to the core to the cloud. This includes embedded gateways, on-premise appliances, data center infrastructure, and cloud and application integration capabilities.
- Falling sensor costs, power efficiencies, ubiquity of mobility, growth of cloud computing, and other modern technologies are fueling more IoT solutions. However, enterprises face challenges like security, data volume/analytics complexity, and lack of standards.
- Dell's portfolio is designed to address these challenges and unlock IoT potential. Their edge gateways feature diverse connectivity, data protocol support, security, and manageability. This infrastructure combined with partners allows customers to gather and analyze data and
The document discusses trends in enterprise software recruiting. It notes that enterprise software is experiencing massive growth, with $5.7 billion invested in software companies in Q4 2014 alone. Key areas of focus in enterprise software include cloud services, data analytics, mobility, security, big data, storage, and cybersecurity. The document provides an overview of the enterprise technology landscape, including opportunities in infrastructure, data architecture, applications, and security layers. It also lists the top 100 cloud-based enterprise software startups by total funding.
The business alchemy of the IoT. The M2M/IoT community
is now carrying out a transformation, turning silicon, copper, rare earth elements and the airy ether of the radio spectrum into new products, services, business models and profits.
Securing Manufacturing: How we can improve speed and efficiency while protect...Conor Bronsdon
in 2019 Microsoft Services started a series of eBooks examining key opportunities in Cybersecurity & Identity transformation within different industries.
This paper (which I contributed to) examines industrial manufacturing security within the context of today's digital transformation.
Microsoft Telecommunications Newsletter | May 2021Rick Lievano
In almost every conversation, I’m astounded by the amount of folks who mention the recent disruption that’s occurred in this industry. As the old adage goes: “…the only constant has been change.” Digital disruption has fueled digital transformation, and with the proliferation of companies offering broader arrays of services, enterprises are scrambling to keep up and offer newer and better things.
There’s been major consolidation across Telco and Media, and the fight for audience and revenue is more fierce than ever. As we have seen in these last few weeks, there have been industry changing merger talks between Warner Media and Discovery, Bouygues and M6 Groupe from Bertelsmann, and even Amazon and MGM. While we’re proud and confident in our most recent acquisitions, it’s safe to say that the competition is heating up.
tw telecom is a leading provider of data and IP services to enterprises across the US. It operates one of the top 3 metro Ethernet networks and has a national IP backbone. The company focuses on exceptional customer service and offers a portfolio of connectivity, transport, security, and managed solutions. tw telecom has strategically expanded its network and services over 15 years to now serve medium and large enterprise customers.
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
The document provides predictions from various IT industry experts for trends in 2020. Key predictions include:
- Containers and hybrid cloud adoption will continue to grow.
- Ransomware attacks will remain a major issue, especially for managed service providers.
- Workplace technologies will transform how employees work, engage with technology, and the rise of augmented workers.
- Multi-cloud environments will drive the need for more diverse data protection capabilities.
- Automation and open source tools will fuel growth in network automation.
- Cloud adoption will continue but organizations need to carefully consider total costs and business needs.
- Desktops will increasingly move to the cloud through services like Windows Virtual Desktop.
- Privacy and the
WBS Connect is a global technology services company that experienced over 1000% revenue growth between 2005-2007, making it the fastest growing private company in Denver. It provides a full suite of data and networking solutions including IP transit, data center colocation, cloud computing, video conferencing, and engineering services. WBS Connect has a large global network with points of presence in over 60 data centers worldwide and partnerships with over 25 carriers and data center providers.
WBS Connect is a global technology services company that experienced over 1000% revenue growth between 2005-2007, making it the fastest growing private company in Denver. It provides a full suite of data and networking solutions including IP transit, data center colocation, cloud computing, video conferencing, and engineering services. With over 60 points of presence worldwide and partnerships with major carriers and data centers, WBS Connect offers scalable, reliable connectivity globally.
Microsoft Telecommunications Industry News | November 2020Rick Lievano
The Microsoft Worldwide Telecommunications Industry team is pleased to share with you the November 2020 Telecommunications Industry Newsletter, available to both internal and external audiences. We encourage you to share it with your colleagues and distribute it to your customers and partners as appropriate.
Transforming to a digital business is a key theme across global communications service providers and many industry leaders are pursuing a new paradigm by leveraging agile new technologies, systems, and services to enable this transformation. This newsletter showcases how the telecommunications industry leverages Microsoft and partner technologies like 5G, cloud, artificial intelligence, big data, virtual network functions, and blockchain to accelerate the transformation to digital services.
This document discusses data governance challenges that arise when organizations move to cloud computing. It notes that cloud impacts every aspect of a business's data governance by changing decision rights and accountabilities around information. It argues that some CIOs struggle with data governance because they think more like former CTOs focused on hardware rather than understanding business issues. Additionally, revelations about government surveillance have made some businesses nervous about putting data in multi-tenant cloud environments. However, experts say the risk to most companies is overstated, and the key is choosing a reputable cloud provider and understanding where data will be located and how it will be managed.
This document discusses the potential for next generation machine-to-machine (M2M) platforms to help companies leverage connected products and services. It notes that current M2M solutions still face complexity challenges. New platforms that embed automation and provide application development tools could help address these issues by reducing costs and time to market while unlocking the full value of connected devices. The white paper examines opportunities for product manufacturers and the role of M2M platforms and developers in driving further adoption of these technologies.
Interop 2006: Evolution of the Networking IndustryAbner Germanow
This was a presentation from 2006 where (starting on slide 30) I described how the way consumer networking vendors built their products would ultimately upend the way enterprise vendors built products. Today, the hype around SDN, commodity switching products, and linux based network operating systems is making much of this come true.
This presentation was first given in May 2006 at the Interop trade show.
Slide 30, is where I talked about how the networking market would split from vertically organized vendors to horizontally specialized vendors. I predicted this transition would take 10 years.
At the time, the use of merchant silicon in datacenter and enterprise switching products was a rarity. Today, it is common. Then linux derivative network OSes were limited to consumer products, today they are taking over large scale cloud datacenters.
The networking market hasn’t come as far as I expected in 10 years, but it’s pretty cool much of this either came true or is on the cusp of coming true. Much more change is under way.
Cloud computing is transforming the IT industry and software development. It allows resources to be provided on demand via the internet. Major trends include social/mobile applications, big data analytics and cloud services from providers like Amazon, Google, and Microsoft. Cloud computing provides benefits like reduced costs, scalability, and accessibility. It impacts software development through new business models, application architectures and markets. Many companies are now using cloud services and public clouds are growing.
Discussion paper: ”The coming obsolescence of the enterprise network” Ericsson
A new Ericsson discussion paper suggests the demand for accessibility and flexibility is changing enterprises attitude towards their networks, moving the focus from protecting the perimeter of the enterprise network to protecting the business-critical data and application environment. It opens up opportunities for telecom operators to provide as-a-service offering. Read the paper and talk to Ericsson to find more about, for example, how to address this transformation, what a winning strategy looks like for operators, what bundled offerings are like to gain most market traction.
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
Enterprise networks are increasingly required to support cloud applications, mobile users, and diverse devices seamlessly. This has heightened network requirements at the edge and driven demand for cloud-enabled campus networks that connect the network edge to cloud resources reliably. Modern networks must recognize a variety of wired and wireless devices, applications, users, and IoT things while optimizing for cloud apps and providing pervasive, reliable connectivity between remote offices, mobile users, and cloud/datacenter resources.
Anticipating a hostile reaction for Augmented RealityDavid Wood
Presentation by David Wood of Delta Wisdom and London Futurists, at Augmented Planet at Campus London on 17 Nov 2014. The goal of the slides is that, by anticipating a hostile reaction for Augmented Reality, we can actually ensure it has a rosy future instead.
The document summarizes the evolution of M2M platforms and the emergence of new M2M/IoT application platforms. Traditionally, M2M applications were developed as independent "stovepipes" but newer applications require integrating diverse data sources. This has driven the need for new platforms that can abstract across data sources and traditional M2M platforms. The document outlines the ideal functionality of these new platforms and profiles some leading providers that demonstrate aspects of best practice.
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
This document discusses how the emergence of IoT and AI impacts cloud computing vulnerability. It explains that while these technologies can improve user experience and business operations, they also create new security risks if not implemented properly. Specifically, the interconnected devices and sensors from IoT expand the attack surface, while AI and cloud computing aim to detect threats but have their own weaknesses. The author argues these technologies must be developed with strict data access protocols and focus on eliminating known vulnerabilities.
The document introduces the new IBM z13 mainframe. It was designed from the ground up for digital business to excel in three areas: as the world's premier data and transaction engine for mobile; to deliver in-transaction analytics for real-time insights; and to be the most efficient and trusted cloud system. The z13 is presented as helping organizations address trends in cloud, big data, mobile, devops, and security by taking mainframe technologies to a new level.
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...TFM&A
This document summarizes a presentation by Equinix on how their global data center platform can benefit e-commerce businesses and digital media companies. It discusses how Equinix provides access to 690+ networks, 275+ cloud providers, and 475+ IT services across 38 global markets. Case studies of companies like Facebook/Zynga and Gap show how using Equinix helped improve performance, drive growth, and expand globally. The document also summarizes a case study of how Equinix is helping digital marketing company Affiliate Window scale their business through strategic interconnections and access to Equinix's global ecosystem of partners.
The document discusses how hybrid IT, which combines mobile devices, cloud computing, and on-premises systems, is transforming enterprise productivity. It describes the "three-legged stool" model of hybrid IT, with mobility, cloud, and traditional IT as the three legs supporting today's knowledge workers. The rise of mobile devices, cloud computing adoption, and the need to access all types of applications and data from any location has led to widespread use of hybrid IT. However, managing security risks from the distributed hybrid IT environment poses challenges for organizations. With the right security tools, hybrid IT can be implemented securely to improve productivity while mitigating risks.
This document discusses the impact of cloud computing on the Asian IT industry. It outlines several key trends driving cloud adoption, including bring your own device (BYOD) policies, increased worker mobility, and the rise of mobile commerce. The cloud is changing how IT infrastructure is delivered and used. It also presents opportunities for small and medium enterprises to access technology through the subscription-based cloud model. While cloud computing provides benefits, issues around awareness, security, infrastructure limitations, and data protection must still be addressed for the technology to reach its full potential across Asia.
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the May Edition:
• Dell EMC takes open networking to the edge for next-generation access.
• Microsoft announces new intelligent security innovations
• Powering partners’ transformation - Pradeep Kumar, Principal Consultant, Security, Redington Value.
• Redington Value signs new vendor partnerships.
• Fortinet delivers integrated NOC-SOC solution.
• HPE to acquire Cape Networks.
• Malwarebytes introduces endpoint protection and response solution.
• Mimecast offers cyber resilience for email with new capabilities.
• SonicWall announces Capture Cloud Platform.
• Veritas revamps channel program to drive partner growth.
• Red Hat announces availability of Red Hat Storage One.
• AWS announces Amazon S3 One Zone-Infrequent Access(Z-IA).
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the December Edition:
• New Dell EMC Solutions Bring Machine and Deep Learning to Mainstream Enterprises
• Fortinet Expands Security Fabric Visibility and Protection to Industrial Internet of Things
• Profitable Partnerships - Rajesh Mathrani, General Manager -
Sales MENA & Director of Operations - Value Distribution
• Oracle: Moving to IaaS Fundamental to Remaining Competitive
• Huawei Launches VR OpenLab Industry Cooperation Plan
• Cambium Networks Announces New Wireless Broadbrand Solutions
• Malwarebytes Releases New Data on the Efficacy of Traditional AV Solutions
• Veeam Releases New Availability Console
• AWS Announces Availability of C5 Instances for Amazon EC2
• Check Point: Cryptocurrency Miming Presents New Threat to Business
Microsoft Telecommunications Newsletter | May 2021Rick Lievano
In almost every conversation, I’m astounded by the amount of folks who mention the recent disruption that’s occurred in this industry. As the old adage goes: “…the only constant has been change.” Digital disruption has fueled digital transformation, and with the proliferation of companies offering broader arrays of services, enterprises are scrambling to keep up and offer newer and better things.
There’s been major consolidation across Telco and Media, and the fight for audience and revenue is more fierce than ever. As we have seen in these last few weeks, there have been industry changing merger talks between Warner Media and Discovery, Bouygues and M6 Groupe from Bertelsmann, and even Amazon and MGM. While we’re proud and confident in our most recent acquisitions, it’s safe to say that the competition is heating up.
tw telecom is a leading provider of data and IP services to enterprises across the US. It operates one of the top 3 metro Ethernet networks and has a national IP backbone. The company focuses on exceptional customer service and offers a portfolio of connectivity, transport, security, and managed solutions. tw telecom has strategically expanded its network and services over 15 years to now serve medium and large enterprise customers.
VMblog - 2020 IT Predictions from 26 Industry Expertsvmblog
The document provides predictions from various IT industry experts for trends in 2020. Key predictions include:
- Containers and hybrid cloud adoption will continue to grow.
- Ransomware attacks will remain a major issue, especially for managed service providers.
- Workplace technologies will transform how employees work, engage with technology, and the rise of augmented workers.
- Multi-cloud environments will drive the need for more diverse data protection capabilities.
- Automation and open source tools will fuel growth in network automation.
- Cloud adoption will continue but organizations need to carefully consider total costs and business needs.
- Desktops will increasingly move to the cloud through services like Windows Virtual Desktop.
- Privacy and the
WBS Connect is a global technology services company that experienced over 1000% revenue growth between 2005-2007, making it the fastest growing private company in Denver. It provides a full suite of data and networking solutions including IP transit, data center colocation, cloud computing, video conferencing, and engineering services. WBS Connect has a large global network with points of presence in over 60 data centers worldwide and partnerships with over 25 carriers and data center providers.
WBS Connect is a global technology services company that experienced over 1000% revenue growth between 2005-2007, making it the fastest growing private company in Denver. It provides a full suite of data and networking solutions including IP transit, data center colocation, cloud computing, video conferencing, and engineering services. With over 60 points of presence worldwide and partnerships with major carriers and data centers, WBS Connect offers scalable, reliable connectivity globally.
Microsoft Telecommunications Industry News | November 2020Rick Lievano
The Microsoft Worldwide Telecommunications Industry team is pleased to share with you the November 2020 Telecommunications Industry Newsletter, available to both internal and external audiences. We encourage you to share it with your colleagues and distribute it to your customers and partners as appropriate.
Transforming to a digital business is a key theme across global communications service providers and many industry leaders are pursuing a new paradigm by leveraging agile new technologies, systems, and services to enable this transformation. This newsletter showcases how the telecommunications industry leverages Microsoft and partner technologies like 5G, cloud, artificial intelligence, big data, virtual network functions, and blockchain to accelerate the transformation to digital services.
This document discusses data governance challenges that arise when organizations move to cloud computing. It notes that cloud impacts every aspect of a business's data governance by changing decision rights and accountabilities around information. It argues that some CIOs struggle with data governance because they think more like former CTOs focused on hardware rather than understanding business issues. Additionally, revelations about government surveillance have made some businesses nervous about putting data in multi-tenant cloud environments. However, experts say the risk to most companies is overstated, and the key is choosing a reputable cloud provider and understanding where data will be located and how it will be managed.
This document discusses the potential for next generation machine-to-machine (M2M) platforms to help companies leverage connected products and services. It notes that current M2M solutions still face complexity challenges. New platforms that embed automation and provide application development tools could help address these issues by reducing costs and time to market while unlocking the full value of connected devices. The white paper examines opportunities for product manufacturers and the role of M2M platforms and developers in driving further adoption of these technologies.
Interop 2006: Evolution of the Networking IndustryAbner Germanow
This was a presentation from 2006 where (starting on slide 30) I described how the way consumer networking vendors built their products would ultimately upend the way enterprise vendors built products. Today, the hype around SDN, commodity switching products, and linux based network operating systems is making much of this come true.
This presentation was first given in May 2006 at the Interop trade show.
Slide 30, is where I talked about how the networking market would split from vertically organized vendors to horizontally specialized vendors. I predicted this transition would take 10 years.
At the time, the use of merchant silicon in datacenter and enterprise switching products was a rarity. Today, it is common. Then linux derivative network OSes were limited to consumer products, today they are taking over large scale cloud datacenters.
The networking market hasn’t come as far as I expected in 10 years, but it’s pretty cool much of this either came true or is on the cusp of coming true. Much more change is under way.
Cloud computing is transforming the IT industry and software development. It allows resources to be provided on demand via the internet. Major trends include social/mobile applications, big data analytics and cloud services from providers like Amazon, Google, and Microsoft. Cloud computing provides benefits like reduced costs, scalability, and accessibility. It impacts software development through new business models, application architectures and markets. Many companies are now using cloud services and public clouds are growing.
Discussion paper: ”The coming obsolescence of the enterprise network” Ericsson
A new Ericsson discussion paper suggests the demand for accessibility and flexibility is changing enterprises attitude towards their networks, moving the focus from protecting the perimeter of the enterprise network to protecting the business-critical data and application environment. It opens up opportunities for telecom operators to provide as-a-service offering. Read the paper and talk to Ericsson to find more about, for example, how to address this transformation, what a winning strategy looks like for operators, what bundled offerings are like to gain most market traction.
Building the Cloud-Enabled Enterprise Campus to Meet Today's Network NeedsJuniper Networks
Enterprise networks are increasingly required to support cloud applications, mobile users, and diverse devices seamlessly. This has heightened network requirements at the edge and driven demand for cloud-enabled campus networks that connect the network edge to cloud resources reliably. Modern networks must recognize a variety of wired and wireless devices, applications, users, and IoT things while optimizing for cloud apps and providing pervasive, reliable connectivity between remote offices, mobile users, and cloud/datacenter resources.
Anticipating a hostile reaction for Augmented RealityDavid Wood
Presentation by David Wood of Delta Wisdom and London Futurists, at Augmented Planet at Campus London on 17 Nov 2014. The goal of the slides is that, by anticipating a hostile reaction for Augmented Reality, we can actually ensure it has a rosy future instead.
The document summarizes the evolution of M2M platforms and the emergence of new M2M/IoT application platforms. Traditionally, M2M applications were developed as independent "stovepipes" but newer applications require integrating diverse data sources. This has driven the need for new platforms that can abstract across data sources and traditional M2M platforms. The document outlines the ideal functionality of these new platforms and profiles some leading providers that demonstrate aspects of best practice.
Revealing the Potential and Risks From the Coming Together of IoT, AI, and C...IndianAppDevelopers
This document discusses how the emergence of IoT and AI impacts cloud computing vulnerability. It explains that while these technologies can improve user experience and business operations, they also create new security risks if not implemented properly. Specifically, the interconnected devices and sensors from IoT expand the attack surface, while AI and cloud computing aim to detect threats but have their own weaknesses. The author argues these technologies must be developed with strict data access protocols and focus on eliminating known vulnerabilities.
The document introduces the new IBM z13 mainframe. It was designed from the ground up for digital business to excel in three areas: as the world's premier data and transaction engine for mobile; to deliver in-transaction analytics for real-time insights; and to be the most efficient and trusted cloud system. The z13 is presented as helping organizations address trends in cloud, big data, mobile, devops, and security by taking mainframe technologies to a new level.
Affiliate Marketing Theatre; Powering performance marketing: how key technolo...TFM&A
This document summarizes a presentation by Equinix on how their global data center platform can benefit e-commerce businesses and digital media companies. It discusses how Equinix provides access to 690+ networks, 275+ cloud providers, and 475+ IT services across 38 global markets. Case studies of companies like Facebook/Zynga and Gap show how using Equinix helped improve performance, drive growth, and expand globally. The document also summarizes a case study of how Equinix is helping digital marketing company Affiliate Window scale their business through strategic interconnections and access to Equinix's global ecosystem of partners.
The document discusses how hybrid IT, which combines mobile devices, cloud computing, and on-premises systems, is transforming enterprise productivity. It describes the "three-legged stool" model of hybrid IT, with mobility, cloud, and traditional IT as the three legs supporting today's knowledge workers. The rise of mobile devices, cloud computing adoption, and the need to access all types of applications and data from any location has led to widespread use of hybrid IT. However, managing security risks from the distributed hybrid IT environment poses challenges for organizations. With the right security tools, hybrid IT can be implemented securely to improve productivity while mitigating risks.
This document discusses the impact of cloud computing on the Asian IT industry. It outlines several key trends driving cloud adoption, including bring your own device (BYOD) policies, increased worker mobility, and the rise of mobile commerce. The cloud is changing how IT infrastructure is delivered and used. It also presents opportunities for small and medium enterprises to access technology through the subscription-based cloud model. While cloud computing provides benefits, issues around awareness, security, infrastructure limitations, and data protection must still be addressed for the technology to reach its full potential across Asia.
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the May Edition:
• Dell EMC takes open networking to the edge for next-generation access.
• Microsoft announces new intelligent security innovations
• Powering partners’ transformation - Pradeep Kumar, Principal Consultant, Security, Redington Value.
• Redington Value signs new vendor partnerships.
• Fortinet delivers integrated NOC-SOC solution.
• HPE to acquire Cape Networks.
• Malwarebytes introduces endpoint protection and response solution.
• Mimecast offers cyber resilience for email with new capabilities.
• SonicWall announces Capture Cloud Platform.
• Veritas revamps channel program to drive partner growth.
• Red Hat announces availability of Red Hat Storage One.
• AWS announces Amazon S3 One Zone-Infrequent Access(Z-IA).
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the December Edition:
• New Dell EMC Solutions Bring Machine and Deep Learning to Mainstream Enterprises
• Fortinet Expands Security Fabric Visibility and Protection to Industrial Internet of Things
• Profitable Partnerships - Rajesh Mathrani, General Manager -
Sales MENA & Director of Operations - Value Distribution
• Oracle: Moving to IaaS Fundamental to Remaining Competitive
• Huawei Launches VR OpenLab Industry Cooperation Plan
• Cambium Networks Announces New Wireless Broadbrand Solutions
• Malwarebytes Releases New Data on the Efficacy of Traditional AV Solutions
• Veeam Releases New Availability Console
• AWS Announces Availability of C5 Instances for Amazon EC2
• Check Point: Cryptocurrency Miming Presents New Threat to Business
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the June Edition:
• Microsoft, Dell Technologies collaborate to simplify IoT solutions delivery.
• Oracle delivers next set of autonomous cloud platform services.
• Partner profitability - Ramkumar Balakrishnan, President, Redington Value.
• Fortinet report reveals an evolution of malware to exploit cryptocurrencies.
• Dell Technologies Customer Solution Centre opens in Dubai.
• Redington Value partners with Nutanix to deliver enterprise cloud solutions.
• Huawei’s roadshow focuses on driving digital transformation.
• Veeam announces vision for the Hyper-Available Enterprise.
• Micro Focus announces agreement with Utimaco to divest Atalla portfolio.
• Red Hat launches latest version of Red Hat virtualization.
• Palo Alto Networks Announces Intent to Acquire Secdo.
• Nexthink announces integration with Splunk.
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the September Edition:
• Redington Value Joins Digital Guardian’s Synergy Partner Program
• Oracle Cloud VMware Solution Now Available
• Cybercriminals Exploiting Global Pandemic at Enormous Scale: Fortinet
• Nutanix Hybrid Cloud Infrastructure Now Available on Amazon Web Service.
• CyberArk Alero Enhances Remote User Security with New Authentication Options
• PTC Enhances Industrial IoT Platform
• Ivanti Announces New Service and Asset Management Releases
• Massive Gaps in Cybersecurity as Employees Work at Home: Malwarebytes
• Micro Focus Announces General Availability of ArcSight 2020
• Gigamon Attains New Validation to Deliver Security Solutions to Government Sector
• MobileIron Offers Complete Mobile Phishing Protection
• VMware Brings Kubernetes to Fusion 12 and Workstation 16 Releases
• Palo Alto Networks Introduces Marketplace for Cortex XSOAR
• Huawei Announces Next-Gen OceanStor Pacific Series
• Tableau 2020.3 Adds External Write to Database, Enhanced Administrator Tools
• Trend Micro Announces XDR Suite in the UAE
Cyberoam provides next-generation security solutions for enterprises, including network security appliances, virtual security appliances, centralized security management, and centralized visibility. Their solutions help enterprises secure their networks against emerging threats from trends like virtualization, cloud computing, mobile devices, and web applications. Cyberoam's key technology is their Layer 8 identity-based security that uniquely identifies users to enable granular security policies and reporting.
Cyberoam offers next-generation security solutions for enterprises, including network security appliances, virtual security appliances, and centralized security management. Their solutions help enterprises secure their networks against emerging threats from trends like virtualization, mobile devices, and web applications. Cyberoam's key technology is their Layer 8 identity-based security that uniquely identifies users to enable granular security policies and reporting.
Cyberoam provides next-generation security solutions for enterprises, including network security appliances, virtual security appliances, centralized security management, and centralized visibility. Their solutions help enterprises secure their networks against emerging threats from trends like virtualization, cloud computing, mobile devices, and web applications. Cyberoam's key technology is their Layer 8 identity-based security that uniquely identifies users to enable granular security policies and reporting.
Cyberoam provides next-generation security solutions for enterprises, including network security appliances, virtual security appliances, centralized security management, and centralized visibility. Their solutions help enterprises secure their networks against emerging threats from trends like virtualization, cloud computing, mobile devices, and web applications. Cyberoam's key technology is their Layer 8 identity-based security that uniquely identifies users to enable granular security policies and reporting.
Cyberoam offers next-generation security solutions for enterprises, including network security appliances, virtual security appliances, and centralized security management. Their solutions help enterprises secure their networks against emerging threats from trends like virtualization, mobile devices, and web applications. Cyberoam's key technology is their Layer 8 identity-based security that uniquely identifies users to enable granular security policies and reporting.
Cyberoam offers next-generation security solutions for enterprises, including network security appliances, virtual security appliances, and centralized security management. Their solutions help enterprises secure their networks against emerging threats from trends like virtualization, mobile devices, and web applications. Cyberoam's key technology is their Layer 8 identity-based security that uniquely identifies users to enable granular security policies and reporting.
Cyberoam offers next-generation security solutions for enterprises, including network security appliances, virtual security appliances, and centralized security management. Their solutions help enterprises secure their networks against emerging threats from trends like virtualization, mobile devices, and web applications. Cyberoam's key technology is their Layer 8 identity-based security that uniquely identifies users to enable granular security policies and reporting.
The document discusses trends in computer networking job roles. It describes several common networking roles including network administrator, network technician, network security specialist, and network manager. For each role it provides details on typical responsibilities and qualifications needed. It also discusses the increasing demand for networking professionals with security skills due to more organizations moving transactions and data online.
The document is an issue of the (IN)SECURE Magazine. It provides a summary of the issue which includes articles covering topics like the future of antivirus software, password management, and product reviews. It also announces several new security products including firewalls, VPN solutions, and a mobile security solution for laptops on 3G networks. The magazine wishes readers a successful end to 2008 and start to 2009.
Redington Value Distribution's ‘Value Journal’, a monthly news journal whose purpose is to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the March Edition:
• HPE Delivers Data-Centric IOT Security
• Dell EMC unveils new integrated partner programme
• Cisco releases Secure Internet Gateway in the cloud
• Redington Value partners with Nexthink as MEA VAD
• Symantec launches integrated partner programme
• Gemini appoints Redington Value as META distributor
• HPE Aruba introduces new capabilities for Niara
• Barracuda announces 'Cloud Ready' programme
• Gigamon to roll out channel enablement initiatives in 2017
• Trend Micro Launches Deep Security 10
Authentication And Authorization Issues In Mobile Cloud Computing A Case StudyAngie Miller
The document discusses authentication and authorization issues in mobile cloud computing. It presents the mobile cloud computing (MCC) security solution developed and applied by STMicroelectronics. The solution addresses issues like reducing the need to store multiple passwords/usernames for different services and simplifying security policy management. It takes into account the complexity of STMicroelectronics' geographical and organizational structure. The solution and the tools/technologies used are described. Conclusions on the solution are also discussed.
AI Chatbots and IoT infringements are frequent fraud today; many specialists forecast that these threats are quite impactful in the future as well. Companies these days want to pick the proper firewall answer vendors to shield their reputation, data, and backside line. IT managers set firewalls to positive machine needs, making sure no statistics vulnerability. Once implemented, firewall equipment warranty that protection is monitored.
Enterprise secure identity in the cloud with Single Sign On and Strong Authen...GARL
A presentation by Giuseppe "Gippa" Paternò", GARL Director, at Brighton event "Open Source, the Cloud and your business" on 18th November 2014
Enterprise secure identity in the cloud with Single Sign On and Strong Authentication
This document discusses enterprise identity and security in the cloud. It describes SecurePass, a product from GARL that provides single sign-on and strong authentication for cloud applications. SecurePass uses one-time passwords for authentication along with identity management and single sign-on capabilities. It integrates with various applications and networks in an open and compatible way. The document also discusses the security of SecurePass and GARL's datacenters and keys, and provides a case study of SecurePass being implemented for a financial institution.
Michael Dell predicts that by 2025, 75% of data will be processed outside traditional datacenters and clouds, pointing to huge growth in edge computing. Edge computing is being accelerated by advances in 5G technology and lower costs of intelligent devices. For edge computing to grow rapidly, various stakeholders like tower companies, network operators, manufacturers, and hyperscalers must collaborate and ensure technologies are integrated, consistent globally, and securely connect diverse edge devices using different protocols. Success at the edge will depend on 5G integration, open collaboration, global consistency, flexible connectivity, and strong security.
Similar to Redington Value Journal - August 2016 (20)
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from June Edition :
•Hewlett Packard Enterprise Expands HPE GreenLake
•Alibaba Cloud and Redington Boost MEA Technology
Ecosystem
•Cisco Announces New Service Enhancement For XDR And
SASE
•Dell Technologies Announces Planned VMware Spin-Off
•Microsoft-EIU Study Reveals Digital Preparedness Helped
Firms Adapt to COVID-19
•Huawei Releases CloudCampus 3.0 for Fully Wireless Networks
•Forcepoint Acquires Remote Browser Isolation Innovator
Cyberinc
•New Avaya OneCloud CCaaS Features to Enhance Customer
Experiences
•Citrix Research Uncovers New Approach to Security
•Fortinet Unveils New FortiEDR Capabilities
•Mimecast: 61% of Firms were Infected with Ransomware in 2020
•Palo Alto Networks Introduces Complete Zero Trust Network Security
•Software AG Delivers New webMethods Upgrades
•Veeam Accelerates Data Protection Strategies at VeeamON 2021
•Talend: Over a Third of Business Leaders Don’t Use Data for Critical Decisions
EmaxIT International helped Modern Architecture Contracting Company (MACC) take its business and security performance to new heights by migrating its hosting platform and applications to Amazon Web Services (AWS). This consolidated MACC's disparate applications onto a single, highly available and scalable cloud platform. It also automated backups, enhanced security through measures like web application firewalls, and reduced operational costs by 30% while increasing efficiency by 20%. EmaxIT provided fully managed AWS services with 24/7 support.
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from April-May Edition:
•Software AG Appoints Redington Value As Middle East Distributor
•Microsoft Announces Nuance Acquisition
•Dell Technologies: UAE and Saudi Arabia Lead in Digital Transformation
•Cisco Announces New Data Center to Serve Collaboration Customers
•Aruba Accelerates Digital Transformation on Microsoft Azure
•Tableau Business Science Brings Powerful Data Science Capabilities
•Oracle Announces Cloud Lift Services
•Okta Launches Customer Identity Risk Ecosystem and Workflow Integrations
•VMware Cloud Accelerates App Modernization Through Multi-Cloud Services
•Mimecast Publishes Report on Threat Actor Attacks During COVID-19
•Micro Focus Introduces OPTIC
•Ivanti: Remote Work is Sending IT Security Budgets Out of Control
•CyberArk Highlights Credential Theft Trends for New Types of Identities
•Gigamon Launches Hawk to Secure Cloud Adoption
•Check Point Software Announces Mobile Security Report 2021
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the March Edition:
•Oracle Expands Hybrid Cloud Portfolio with Roving Edge Infrastructure
•Huawei Unveils New Solutions to Stimulate Growth in the Digital Economy
•Fortinet Delivers Major Updates to FortiOS Operating System
•Cisco Completes Acquisition of IMImobile
•Palo Alto Networks Launches NextWave 3.0
•Cambium Networks Unveils Gigabit Outdoor Point to Point Solution
•Check Point Software Launches Unified Security Solution Harmony
•Citrix Tackles Employee Well-Being
•CrowdStrike Delivers Advanced Threat Protection for Cloud and Container Workloads
•Kaspersky: DDoS Attacks in Q4 2020 Dropped by a Third Compared to Q3
•Nutanix Extends Ransomware Protections to Help Secure Customers’ IT Environments
•New Veeam Backup & Replication v11 Now Available
•VMware Refreshes vRealize Cloud Management
•Veritas Introduces NetBackup 9
•Ivanti Wavelink Expands Velocity Platform
•CyberArk Delivers New Identity Security Offerings to Drive Customer Success
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the February Edition:
•Microsoft Unveils Employee Experience Platform to Help People Thrive at Work
•Cisco Reveals Top Tech Trends for 2021 and Beyond
•Aruba ClearPass Security Portfolio Receives Cyber CatalystSM Designation
•Oracle Powers New 5G, Fiber and Digital Services for Communications Industry
•Fortinet Announces AI-powered XDR for Fully Automated Threat Detection and Response
•Citrix to Acquire Project Management Platform Wrike
•Check Point Unveils New Quantum Spark Security Gateways for SMBs
•CyberArk Study: Poor Security Habits Raise Questions About the Future of Remote Work
•Fujitsu Amps up Behavior Recognition Tech with Deep Learning
•Hitachi Launches Industrial Edge Computer CE Series Embedded AI model
•High Private Cloud Usage Sets Path for UAE’s Hybrid Cloud Migration
•Veritas Extends Cloud Capabilities Across its Platform
•Lumen, VMware Expand Partnership to Drive Rapid Innovation at the Edge
•Malwarebytes Announces New Integrations in OneView
Management Dashboard
•Veeam Announces Availability of New Backup for Google Cloud Platform
•Palo Alto Networks Expands IoT Security to Healthcare
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the January Edition:
•Hewlett Packard Enterprise Empowers Channel Collaborations
•Saudi Railway Company Modernizes Railway Data Infrastructure with Oracle Cloud
•Emirates Group Security Selects Huawei to Build Digital Command and Control Centre
•Fortinet Announces Secure SD-WAN Appliances for OT Environments
•Aruba Automates Branch Office Connectivity to AWS
•Avaya Announces Solutions to Assist with COVID-19 Vaccine Rollout
•Check Point Survey Reveals Security Priorities for 2021 and Beyond
•WebSprix to Deploy Cisco Routed Optical Networking Solution with Cisco 8000
•Citrix Uncovers What Employees Really Want in 2021
•Cohesity Announces SaaS Offerings for Backup and Disaster Recovery
•Palo Alto Networks Completes Acquisition of Expanse
•Nutanix Extends Storage Services to its Hybrid Cloud Platform
•Tableau 2020.4 Simplifies Data Preparation with Browser-Based Tableau Prep
•New Veeam Backup for Microsoft Office 365 v5 Now Available
•Gigamon Channel-First Focus Provides Partners Unparalleled Support
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the December Edition:
•Redington Value Announces Strategic Partnerships and Service Offerings
•Microsoft Facilitates Compliance in the Hybrid Work Era
•Cisco Announces All New Webex
•Oracle’s Second-Generation Cloud Region in the UAE Goes Live
•Huawei Outlines New Growth Opportunities with 5G
•New Comcast Business Solution Powered by Aruba Brings Enterprise-Grade Office Connectivity from Home
•Barracuda Acquires Zero Trust Network Access Innovator Fyde
•Citrix Sets New Standard for Digital Workspace Security
•Check Point Software Launches New Cybersecurity Platform
•CrowdStrike Advances Threat Intelligence Offerings with Situational Awareness
•Gartner Recognises Fortinet as Leader in Network Firewalls
•Nutanix Signs Sponsorship Agreement of HPE Digital Life Garage
•Micro Focus Announces CISO Resource to Accelerate Enterprise Resilience
•VMware Unveils the Modern Network Framework for Data Center and Cloud Networking
•Palo Alto Networks Reimagines Data Security with Enterprise
Data Loss Prevention Service
•Freshworks unveils Freshworks CRM
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the October Edition:
•Redington Value Signs Agreement to Become FireEye Distributor
•Gigamon Announces Distribution Agreement with Redington Value
•Aruba ESP Unifies IoT, IT and OT Networks
•Nutanix Announces HCI Software Innovations
•Oracle Cloud Guard and Oracle Maximum Security Zones Now Available
•Gigamon Partners with Nokia to Deliver 5G Solution
•Huawei Launches Digital OptiX Network Solutions in the Middle East
•QR Codes Pose Significant Security Risks to Enterprises: MobileIron
•Soft Skills and Tech Critical to Maximize Value From AI: Microsoft
•Palo Alto Networks Introduces Next-Generation SD-WAN Solution
•Cisco’s Webex Enables Rapid Adoption of New Remote Learning Models for MEA
•Trend Micro Blocked 8.8 Million COVID-19 Threats
•Ooredoo Kuwait partners with Nutanix to launch VDI-as-a-Service for businesses
•Talend Introduces Measure of Data Health
•VMware Advances 5G Telco Cloud Portfolio
•Mimecast Announces Integration with Theta Lake
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the August Edition:
•AWS Announces General Availability of AWS IoT SiteWise
•Dell Technologies Explores VMware Spin-Off
•HPE To Drive Edge-to-Cloud Strategy With Acquisition Of Silver Peak
•Oracle Announces Oracle Dedicated Region Cloud@Customer
•Fortinet Acquires Cloud Security and Networking Innovator OPAQ Networks
•Nexthink Launches Experience Platform
•Nutanix Sheds Light On Smart City Development Expectations
•Palo Alto Networks Launches World’s First ML-Powered NGFW
•57% of UAE IT Heads See Challenge In Gaining Holistic Network Visibility: VMware
•Mimecast Acquires MessageControl
•Cybersecurity Top Priority In COVID-19 Recovery: CrowdStrike Report
•Cohesity Launches Consumption-Based Subscription Pricing for MSP Partner
•Kaspersky’s New VPN Secure Connection Ensures User Privacy
•Veeam Announces New Competencies To EMEA ProPartner Program
•82% of UAE Remote Workers Have Gained Cybersecurity Awareness: Trend Micro
•Imperva Unveils Cloud Data Security Solution
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the July Edition:
•Systancia Appoints Redington Value As Distributor For Middle East And Africa
•AWS Launches Marketplace And Data Exchange In UAE
•Dell Technologies Brings Cloud Capabilities To Edge Environments
•Redington Expands Imperva Partnership To Africa
•SAS And Microsoft To Shape The Future Of Analytics And AI
•Fortinet Achieves MEF 3.0 SD-WAN Certification
•Red Hat Announces Enhancements To Ansible Automation Portfolio
•A10 Networks Delivers Highest Performance DDoS Protection
•Regional SMEs To Leverage The Power Of Avaya IP Office Subscription
•Veeam Announces New Veeam Availability Orchestrator v3
•60% Of UAE Enterprises Anticipate An Email-Borne Attack: Mimecast
•Micro Focus Introduces New Family Of Software
•StorageCraft Unifies Business Continuity Stack With ShadowXafe 4.0
•CrowdStrike Falcon Expands Linux Protection With Enhanced Prevention Capabilities
•Nutanix Strengthens Desktop as a Service Solution
•HPE To Deliver New Return-To-Work Solutions To Help Firms Accelerate Recovery
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the June Edition:
•Redington Value On Navigating The New Normal Through Digital Innovations
•AWS Outposts Now Available In UAE And Saudi Arabia
•Dell Technologies Delivers The Power Of Open Source Networking
•HPE Announces General Availability Of GreenLake Central
•Oracle Announces Oracle Analytics For Fusion HCM
•Fortinet Announces Secure SD-WAN Innovations
•Aruba Unveils New Secure AI-Powered Solutions
•Tableau 2020.2 Introduces New Data Model For Powerful Multi-Source Analysis
•Huawei Announces White Paper On Future Network Architectures
•A10 Networks: Mobile Telecom Industry Advances Toward 5G
•Nutanix Simplifies Advanced Business Continuity With Automation
•Cohesity Unveils Mobile App For Enterprise Data Management Platform
•VMware Announces Next-Gen SOC Alliance
•New Veeam Backup For Microsoft Azure Now Available
Showcasing exemplary stories of success where channel partners have gone to great lengths to implement innovative solutions. Acclaiming those partners who have risen to the challenges of the digital era and transformed their business to a solutions offering. Inspiring channel businesses to become value-added providers and trusted allies to their customers. Stories that made a Difference.
Key stories of the edition are as below:
1. DATA DRIVEN Masterworks
2. ENHANCING PROFITABILITY Robosoft Soliutions
3. COMBINING INNOVATIONS Agile Cloud Solutions
4. UNLOCKING EFFICIENCIES Zero & One
5. ADAPTING TO CHANGE Paramount Computer Systems
6. POWERING THROUGH ICD Technologies
7. CUTTING COMPLEXITY Alpha Data
8. BRIDGING THE GAP Deltron
9. THE PERFECT MATCH Aerizo
10.INTEGRATING SKILLS Intertec Systems
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the March Edition:
•Veeam Availability Suite v10 unveiled
•P&O Maritime Logistics enables IoT with Aruba Solutions
•Avaya Spaces embraces a multiexperience approach
•Nutanix releases second Enterprise Cloud Index Report
•Huawei strengthens enterprise offerings
•Palo Alto Networks introduces Cortex XSOAR platform
•Mimecast announces new integration with IBM Security
•A10 Networks delivers virtual DDoS defense solution
•Fortinet introduces self-learning Artificial Intelligence appliance
•Veritas recognized by Gartner Peer Insights Customers’ Choice
•Kaspersky extends its partner network
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the February Edition:
• Insight Partners to acquire Veeam
• Mimecast acquires Segasec
• Nutanix and International Systems Engineering sign MoU
• Aruba advances digital retail experiences
• IDC MarketScape positions VMware as a Leader in three end-user computing vendor assessments
• Micro Focus introduces Voltage SmartCipher
• Microsoft commits to become Carbon negative by 2030
• Red Hat accelerates cloud-native development with unified hybrid cloud storage
• Kaspersky integrates with SolarWinds
• A10 Networks extends Thunder Convergent Firewall capabilities
• Fortinet to showcase digital innovations in security at Accelerate 2020
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the January Edition:
• Mashreq migrates to the Microsoft intelligent cloud
• Veeam launches new AWS-Native Backup and Recovery Solution in AWS Marketplace
• CrowdStrike partners with ElevenPaths to bring its platform to
customers worldwide
• Dell Technologies names Jeff Clarke as Chief Operating Officer
• GDPR compliance rate remains low according to new talend research
• Mobile Service providers preparing to fortify Security in anticipation of 5G deployments, according to survey
• New Mimecast research finds data loss is primary concern for
financial industry
• Barracuda MSP announces strong performance internationally
• Fortinet Secure SD-WAN chosen by over 21,000 global customers
• IT security budgets lower than average in 45% of SMBs and 50% of enterprises
• IDC MarketScape positions VMware as leader in three end-user computing vendor assessments
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the December Edition:
•Sage announces Redington as official distribution partner for GCC
•Enabling a data-driven future
•New Avaya partnership set to improve emergency response in MEA
•New Kaspersky Sandbox automates protection from advanced threats
•Huawei receives TSIA rated outstanding assisted support EMEA certification
•CrowdStrike introduces Falcon for AWS to simplify cloud workload protection
•Microsoft marks ADIPEC 2019 with intelligent cloud to empower regional energy sector
•Veeam unveils new backup solutions for Microsoft cloud platforms
•Aruba named leader in latest IDC MarketScape report
•Red Hat brings predictive models to business automation portfolio
•Fortinet chosen by Ooredoo Kuwait to deliver secure SD-WAN managed service
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the November Edition:
•Commercial Bank of Dubai adopts the Microsoft Cloud to accelerate digitization
•The next frontier of value
•Abu Dhabi Municipality chooses Aruba for digital workplace transformation project
•Nutanix announces new IT automation for private clouds
•Fortinet ranked high by Gartner for SDWAN equipment market share by revenue
•Okta launches Okta SecurityInsights to protect global workforces
•Automation Anywhere launches AI-Powered RPA-as-a-Service platform
•New Mimecast report finds staggering increase in BEC Attacks
•Huawei stresses on key pillars for digital economy in the region
•DU chooses Oracle to accelerate uptake of UAE FEDNet programme
•VMware ranked 1st in cloud systems, service management
Showcasing exemplary stories of success where channel partners have gone to great lengths to implement innovative solutions. Acclaiming those partners who have risen to the challenges of the digital era and transformed their business to a solutions offering. Inspiring channel businesses to become value-added providers and trusted allies to their customers. Stories that made a Difference.
Key stories of the edition are as below:
1. THE POWER OF DATA Cynosure
2. THE GAME PLAN Dataplus
3. BACK TO THE FUTURE FutureX
4. REAL SECURITY MDS DUBAI
5. LEARNING FROM ‘THE BLACKBOARD’ OCS Infotech
6. BACKED UP Seven Seas Computers
7. SMART BANKING Th ingLogix
8. FLYING HIGH Qatar Project Group International
9. SECURE UNION IE Network Solutions
10. GETMAX OF IT Getmax DMCC
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the October Edition:
•Freshworks, Redington Gulf partner to bring customer engagement products to MEA region
•Oracle and VMware partner to support customers’ hybrid cloud strategies
•AWS announces general availability of Amazon Quantum Ledger Database
•HPE announces market share, revenue growth in enterprise storage
•Seclore expands SDK platform
•Independent research firm names CrowdStrike a leader in endpoint security
•Barracuda Forensics and Incident Response now generally available
•Bahrain Credit drives digital transformation with Veeam
•Dell Technologies unveils ground-breaking servers, solutions
for Modern Data Centers
•SAS recognized as leader in enterprise marketing software suites
Value Journal, a monthly news journal from Redington Value Distribution, intends to update the channel on the latest vendor news and Redington Value’s Channel Initiatives.
Key stories from the September Edition:
•Aruba “leads the pack” in 2019 wireless solutions evaluation by Forrester Research
•Automation Anywhere acquires klevops to maximize collaboration between humans, Bots
•Dell Technologies cloud advancements deliver new Kubernetes Support, Hybrid Cloud Infrastructure options
•AWS announces general availability of Amazon Forecast
•SAS sees 105% growth in AI revenue, per analyst report
•Deloitte, Splunk provide automated security monitoring and response capabilities to organizations worldwide
•Veeam to drive Middle East businesses to adopt Cloud Data Management at GITEX 2019
•IDC MarketScape recognizes PTC as a Global Industrial IoT Platform Leader
•Apparel Group fuels amazing growth trajectory with Oracle
•Mimecast now delivers community-based, tailored Threat
Intelligence
•Red Hat launches OpenShift Service Mesh to accelerate adoption of Microservices and Cloud-Native Applications
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
Goodbye Windows 11: Make Way for Nitrux Linux 3.5.0!SOFTTECHHUB
As the digital landscape continually evolves, operating systems play a critical role in shaping user experiences and productivity. The launch of Nitrux Linux 3.5.0 marks a significant milestone, offering a robust alternative to traditional systems such as Windows 11. This article delves into the essence of Nitrux Linux 3.5.0, exploring its unique features, advantages, and how it stands as a compelling choice for both casual users and tech enthusiasts.
UiPath Test Automation using UiPath Test Suite series, part 6DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 6. In this session, we will cover Test Automation with generative AI and Open AI.
UiPath Test Automation with generative AI and Open AI webinar offers an in-depth exploration of leveraging cutting-edge technologies for test automation within the UiPath platform. Attendees will delve into the integration of generative AI, a test automation solution, with Open AI advanced natural language processing capabilities.
Throughout the session, participants will discover how this synergy empowers testers to automate repetitive tasks, enhance testing accuracy, and expedite the software testing life cycle. Topics covered include the seamless integration process, practical use cases, and the benefits of harnessing AI-driven automation for UiPath testing initiatives. By attending this webinar, testers, and automation professionals can gain valuable insights into harnessing the power of AI to optimize their test automation workflows within the UiPath ecosystem, ultimately driving efficiency and quality in software development processes.
What will you get from this session?
1. Insights into integrating generative AI.
2. Understanding how this integration enhances test automation within the UiPath platform
3. Practical demonstrations
4. Exploration of real-world use cases illustrating the benefits of AI-driven test automation for UiPath
Topics covered:
What is generative AI
Test Automation with generative AI and Open AI.
UiPath integration with generative AI
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
1. Klarich says enterprises require con-
sistent security regardless of where
their applications reside.
EMC Corporation recently announced the re-
sults of new research revealing that organisa-
tionsarefailingtoappreciatethegrowingchal-
lenges of protecting their data and, as a result,
are experiencing the economic impact of data
loss. New findings from the EMC Global Data
Protection Index 2016, an independent study
by Vanson Bourne of enterprise backup in 18
countriesaroundtheworld,revealedthat,while
businesseshavebeensuccessfulinreducingthe
impact of the four biggest traditional data loss
Cyberthreats’ impact
highlighted in the new
EMC Global Survey
Tripp Lite, a manufacturer
of power protection and con-
nectivity solutions, is now
featuring new lower prices
on their B070- and B072-
Series of Cat5 rack-mount
KVM switches.
The recent price drops al-
Tripp Lite slashes prices for
Cat5 KVM Switches
Palo Alto widens breach
prevention to the cloud
Palo Alto Networks, the next-
generation security company,
has announced advancements
to its Next-Generation Securi-
ty Platform that is designed to
extend the breach prevention
capabilities of the platform
and address the security needs
Issue 03// August 2016
Goulden says EMC continues to innovate to stay
ahead of both existing and new challenges.
Continue on page 2
Vendor’s new isolated recovery solutions protect data against
destructive cyberattacks and ransomware
PAN-OS Version 7.1 deliv-
ers Universal protection
across multi-cloud envi-
ronments and SaaS Apps
MovebringsITmanagers
thelowest-pricedrack-
mountKVMsolutions
risks, they are unprepared for new, emerging
threats,whicharetakingtheirtollinstead.When
compared to the EMC Global Data Protection
Index 2014, 13% more businesses experienced
data loss or disruption in the last 12 months,
costing them an average of $914,000.
EMCcommissionedtheupdatedresearchto
help organisations recognise and prepare for
therapidlychanginglandscapeofthreatstoen-
terprisedata.ThesurveyresultsfromtheEMC
Global Data Protection Index 2016 identified
thefollowingthreemajorchallengestomodern
data protection namely threats to protection
data, threats to data in the cloud and evolving
protection needs.
Continue on page 2 Continue on page 2
The new KVM solutions provide
innovative features and
exceptional quality.
Redington value is a value added distributor for the following brands in parts of Middle East & Africa:
2. 2
For more information, please write to sales.value@redingtongulf.com
EMC...
Palo Alto...
DavidGoulden,CEO,EMCInfor-
mation Infrastructure, said: “Our
customers are facing a rapidly
evolvingdataprotectionlandscape
onanumberoffronts,whetherit’s
toprotectmoderncloudcomputing
environments or to shield against
devastating cyberattacks. Our re-
searchshowsthatmanybusinesses
areunawareofthepotentialimpact
and are failing to plan for them,
which is a threat in itself.”
Goulden said as a leader in data
protection and cloud computing,
EMCcontinuestoinnovatetostay
ahead of both existing and new
challenges by providing modern
cloud-centric data protection so-
lutions. “In addition, today we are
introducing the first in a range of
new Isolated Recovery Solutions,
that are designed to help protect
customerdataagainstcyberattacks
such as ransomware and destruc-
tive hacking,” he said.
Nearly a quarter (23%) of busi-
nesses surveyed had experienced
datalossorunplannedsystemsdis-
ruptionduetoanexternalsecurity
breachandthatnumberincreased
to over one third (36%) when tak-
inginternalbreachesintoaccount,
the survey found. Businesses are
increasinglyfacingthreatsnotjust
to their primary data, but also to
their backup and protection data.
On the other hand, more than
80% of survey respondents indi-
cated that their organisations will
run at least part of eight key busi-
nessapplicationsinthepubliccloud
inthenexttwoyears;yetlessthan
half said they protect cloud data
against corruption and less than
half against deletion.
EMC said it is critical for or-
ganisations to include cloud ap-
plications in their overall data
protection strategies. EMC of-
fers a comprehensive portfolio
of solutions for cloud-to-cloud
and on-premise-to-cloud data
protection to facilitate this, the
company stated.
of businesses working with
cloud-based environments
and software-as-a-service
(SaaS) applications.
According to Palo Alto Net-
works, the demand for organ-
isations to become ever more
agile and competitive is driv-
ing a change in the way busi-
ness applications are devel-
oped, deployed, and adopted.
The company said work-
loads and data are increasingly
distributed across physical
and cloud computing envi-
ronments and this changes the
threat landscape and increases
the risk of exposure to cyber-
attacks, which is compounded
by the limitations of legacy se-
curity products that were not
designed for this distributed,
cloud-based infrastructure.
Palo Alto Networks said
it has addressed these chal-
lenges, and many more, in
PAN-OS 7.1. The vendor said
this version of the operating
system extends the breach
prevention capabilities of
the security platform to all
major clouds and provides
visibility, control, and threat
prevention designed to protect
customer data regardless of
where it resides.
In addition, among the new
features are certificate and
two-factor authentication ad-
vancements that help protect
user credentials or neutralise
them if they are stolen.
Lee Klarich, executive vice
president, product manage-
ment at Palo Alto Networks,
said: “Enterprises require
consistent security regardless
of where their applications
reside. The latest release of
PAN-OS addresses new chal-
lenges presented by the cloud,
enabling organisations to take
advantage of agile cloud-based
infrastructure and applica-
tions while maintaining a
consistent security posture.”
Vendorlaunchesitslatest
innovationstoadaptto
changingroleofdatacentres
‘Smart Choices for Digital
Infrastructure’ is a concept which
supports managers through the
decision process.
Cablingsystemsandopticalfibre
solutionsvendorNexans,recently
launched its data centre innova-
tions under the name of “Smart
ChoicesforDigitalInfrastructure”.
According to Nexans, the dif-
ferent data centre infrastructure
technologieswillhelpmanagersto
support the exponential increase
in data transmission.
The company said the digi-
tal transformation requires ag-
ile, carefully planned IT infra-
structure, efficient data access
and exchange.
Nexansaddedthateachofthese
factorsisvitaltosuccess,butnet-
work managers face difficult de-
cisions to provide the optimum
platform for their specific needs.
‘Smart Choices for Digital In-
frastructure’ is a concept which
supports managers through the
decisionprocessbyincorporating
cabling systems which support
severalconsecutivegenerationsof
activeequipmentandthatarero-
bust,flexibleandscalabletoadapt
to new requirements.
Nexans’ latest offering include
flexible,cost-effectivebandwidth
architectures,optimisedspaceus-
age, performance protection and
enhancement, faster modular
deployment and design through
to operation’ support services.
Nexans
introduces
‘Smart Choices
for Digital
Infrastructure’
low IT managers to choose
from several highly fea-
tured KVM switches and
consoles for controlling an
entire network while still
managing expenses.
According to Tripp Lite,
these KVM solutions pro-
vide innovative features
and exceptional quality,
along with the reliability for
which Tripp Lite has long
been known.
The company said key fea-
tures of Tripp Lite’s KVM
switches include connection
of up to 32 servers with inex-
pensive Cat5 cabling, sleek,
compact design that helps
reduce cable clutter and im-
prove airflow and console
switches that include built-
in LCD, keyboard and mouse.
Other features according
to Tripp Lite include models
with IP access that add flex-
ibility of remote monitoring
from virtually anywhere in
the world, multi-user capa-
bilities, password protection
and advanced encryption to
simplify IT tasks while keep-
ing server access secure.
“With these price reduc-
tions, IT departments of
all sizes can now centralise
device management easily
and affordably,” said David
Posner, Tripp Lite’s Direc-
tor of Marketing for Cables
and Connectivity. “Our
KVM solutions are simply
the best value available
in the market.”
Tripp Lite is a leading
manufacturer of products
that power, connect and
protect computers and IT
equipment in any envi-
ronment, from desktops
to data centres.
The company’s innova-
tions include the world’s
first UPS system designed
specifically for personal
computers and the world’s
most trusted premium surge
suppressor–the Isobar, with
more than 19 million in use.
Tripp Lite...
3. 3
For more information, please write to sales.value@redingtongulf.com
Redington Value Distribu-
tion, a value-added distributor
across MEA, has announced
that it has partnered with
Pivot3 to bring the vendor’s
dynamic hyper converged in-
frastructure (HCI) solutions
to enterprise customers across
the region.
Under the agreement,
Redington Value Distribu-
tion with its vast network of
channel partners, will offer
Pivot3 products and solutions
in the enterprise data cen-
tre domain across technolo-
gies ranging from compute,
Redington Value
Distribution partners
with Pivot3
Distributor to offer the vendor’s hyper con-
verged infrastructure solutions across MEA
Mathrani says HCI solutions are only
just beginning to penetrate the enter-
prise data centre.
storage, network, software,
security, virtualisation, high
availability, business conti-
nuity and cloud. In addition,
the distributor will also have
offerings in voice and unified
communications space.
The vendor’s acquisition
of NexGen Storage makes
Pivot3 the only company in
the industry to offer custom-
ers solutions that allow IT
to prioritise application per-
formance based on business
priority along with complete
implementation flexibility and
QoS management.
“While the HCI market has
been growing exponentially
for years, this innovative tech-
nology is only just beginning to
penetrate the enterprise data
centre,” added Rajesh Math-
rani, General Manager, Sales,
Middle East at Redington
Value Distribution.
Mathrani said with Pivot3’s
dynamic offerings to cus-
tomers in industries such
as hospitality, surveillance,
healthcare, transportation,
entertainment, education,
insurance and retail, Red-
ington Value and its channel
partners now have a unique
solution which can address
the needs of these industries
while providing customers
complete control over their
deployments helping them
move from legacy data cen-
tre storage environments to
software defined storage.
Redington said together
with Pivot3, it will empower
its channel partners to ad-
dress the requirements of
mid-market and enterprise
customers offering a practi-
cal and proven path to the
software-defined data centres
of the future without com-
promising on simplicity and
economics of easy-to-manage
HCI platform.
“This is a great opportunity
for both our organisations to
expand our footprint in the
MEA markets,” said Anand
Chakravarthi, area vice presi-
dent, Pivot3 Dubai. “Red-
ington Value and its large
network of partners gain a
competitive advantage with
the technology offerings from
Pivot3 and we gain access to
markets across MEA with this
association,” he said.
Chakravarthi explained that
being a very channel oriented
organisation, Pivot3 recognise
the strength in addressing the
needs of enterprise customers
through channel partners and
Redington’s partners are a key
element in the joint growth
strategy. “Over the last few
years we have built quite a
good set of enterprise cus-
tomer references within this
region and the partnership
will help us scale higher with
the help of Redington’s elab-
orate partner network,” he
pointed out.
This partnership between
Redington and Pivot3 will
also be an opportunity for
channel partners to address
the enterprise data centre
space and will help many to
penetrate deeper into their
clients’ accounts while cre-
ating much closer alliances
with customers.
Distribution industry honours Veeam Software
VeeamSoftware,theinnovativepro-
viderofsolutionsthatdeliveravail-
ability for the “Always-On Enter-
prise”,hasannouncedthatitrecently
receiveda“GoldEMEARisingStar”
award from the Global Technology
DistributionCouncil(GTDC).
The Rising Star Awards recog-
nise technology companies with
exceptional sales growth through
European, Middle East and Africa
distributorsoverthepastyear.
This year’s awards were pre-
sented during an evening dinner
event at the 2016 GTDC Sum-
mit EMEA conference at the
Vendor recognised for outstanding sales growth in the EMEA region
Pommier says Veeam’s business
depends on the channel and the
excellent work of partners.
Grand Hotel Huis ter Duin.
Veeamwasamongonly15overall
winners chosen from hundreds of
manufacturersandpublisherswho
rely on distributors to meet the
product and service requirements
of technology solution providers in
theEMEAmarket.
Gold, Silver and Bronze Rising
Star Award winners were selected
infourrevenuecategoriesandover-
all software business, respectively,
witheachcategorywinnerbasedon
sales growth over the past year, as
tracked by the Context SalesWatch
DistributionPanel.
“We’veenjoyedgreatsuccessinthe
‘Rising Star’ award in the past – it’s
anhonourforus–andtowinitagain
is testament to Veeam’s hard work,
impressive growth and foresight,”
saidGillesPommier,VicePresident,
ChannelandCloudEMEAatVeeam
Software.“Ourbusinessdependson
thechannelandtheexcellentworkof
ourpartnercommunity.LikeVeeam,
theyhaveacknowledgedtheneedfor
theAlways-OnEnterprise,andrec-
ognisethatproductssuchasVeeam
AvailabilitySuitecanhelptheircus-
tomersmakethisareality.”
To be eligible for a Rising Star
award,vendorsmusthavesoldcor-
respondingproductsthroughGTDC
members for at least one year. Se-
lectionsforGold,SilverandBronze
winners in each revenue category
are based on Context SalesWatch
datafromApril2015–March2016.
“Thisyear’swinnersspanabroad
range of product categories – our
most diverse yet - representing to-
day’smostprogressiveandinnovative
marketsegments,”commentedTim
Curran,GTDCCEO.“It’simpressive
toseesomanywinnersfocusedonthe
hottesttrends,fromcloud,mobility
andbigdatatosecurity,virtualisation
andhyper-convergedinfrastructure,
forexample.”
Curran said the growth of these
companiesshowcasesthevalueand
impactofdistributionpartnerships
throughouttheEMEAregion.
4. 4
For more information, please write to sales.value@redingtongulf.com
VendorusesGoogleCloud
Platformandaddssoftware-
definednetworking
Fitzgerald says CloudForms 4.1 is the
most comprehensive, hybrid cloud
management solution.
OpensourcesolutionsmakerRedHat
Inc, has announced the general avail-
abilityofRedHatCloudForms4.1,the
latestversionofitsopenhybridcloud
managementsolution.
WithsupportforGoogleCloudPlat-
form, Red Hat CloudForms 4.1 now
supports greater choice and flexibil-
ity for customers who want to run
hybrid cloud workloads on Google
Cloud Platform, Microsoft Azure or
AmazonWebServices.
Inaddition,RedHatCloudForms4.1
expandsthescopeofitsmanagement
capabilities with software-defined
networking (SDN), providing a more
unified management experience for
software-defineddatacentres.
AccordingtoRedHat,CloudForms
4.1 makes it easier to automate com-
plexITprocessesthroughintegration
withAnsibleTower,andprovidescus-
tomerswithasimpler,cloud-friendly
subscriptionmodel.
JoeFitzgerald,vicepresident,Man-
agement at Red Hat, said: “We hear
constant customer demands focus-
ing on rapidly advancing their hybrid
cloud strategies and the need for one,
consistent management view across
theirphysical,virtual,andcloudenvi-
ronments.CloudFormsoffersthat,and
webelieveCloudForms4.1istheindus-
try’smostcomprehensive,hybridcloud
management solution on the market.
CloudFormsnownotonlysupportsthe
world’slargestpublicclouds,butalso
integrateswithAnsibletodramatically
simplifyautomation.”
Red Hat
CloudForms
expands public
cloud management
Networking giant Cisco has an-
nounced it will help engineers, de-
velopers, partners and customers
embrace a monumental change in
how networks are built and man-
aged—preparingtheindustryforthe
transitiontodigital-readynetworks.
Cisco is also building on the in-
tersection between security and
networking with new technologies
designed to simplify branch office
securityandmakeitmoreeffective.
InMarchthisyear,Ciscolaunched
the Digital Network Architecture
(Cisco DNA)—a radical new ap-
proach to networking designed for
thedigitalera.
The vendor said as customers
embrace mobility, cloud, analytics
and the Internet of Things (IoT) to
digitisetheirbusiness,ITteamsare
Cisco prepares digital-ready
networks
Networking giant improves threat visibility and enforcement
capabilities with new embedded security technology
Reed says organisations need to ad-
dress the expanding threat landscape
across mobility and cloud.
strugglingtokeepupwiththeever-
increasingcomplexityofthenetwork,
sophisticationofsecurityattacksand
growingcustomerexpectations.
Ciscosaiditrealisedthattradition-
alnetworkssimplycouldnotscaleto
meettheincreasingdemandsofthe
digital business and a new network
wasneededforthedigitalera.
The company added that Cisco
DNA helps IT address these de-
mandsbymovingnetworkingfrom
hardware-centrictosoftware-driven,
frommanualtoautomated,andfrom
reactivetoadaptive.
“Organisationsneedtoaddressthe
expanding threat landscape across
mobility and cloud, while facing
increasingly sophisticated security
attacks,” said Jeff Reed, senior vice
president, Networking Infrastruc-
CyberArk unveils cloud-based privileged
account for endpoint
CyberArk, the company that
protects organisations from
cyberattacks that have made
their way inside the network
perimeter, has announced new
capabilities for CyberArk View-
finity that deliver privileged ac-
count security to the endpoint.
With CyberArk Viewfin-
ity version 5.5, customers can
benefit from an enhanced,
single privilege management
and application control solu-
tion to reduce the attack sur-
face while being able to block
CyberArk Viewfinity integrates privilege management with
app control to protect against malware-based attacks
With CyberArk Viewfinity version 5.5
customers can benefit from an en-
hanced, single privilege management.
the progression of malware-
based attacks, and balance
business user productivity and
enterprise security.
Following the acquisition of
Viewfinity in Q4 2015, CyberArk
Viewfinity is now available as
part of the CyberArk Privileged
Account Security Solution.
The company said with the
latest release, customers can
gain greater privilege manage-
ment and application control
features in an on-premises or
software-as-a-service (SaaS)-
based offering.
“As malware continues to be a
frequently-used and successful
means for hijacking credentials,
organisations must realise that
the endpoint problem is a privi-
lege problem,” said Roy Adar,
Senior Vice President, Product
Management, CyberArk. “The
fact is, motivated attackers will
eventually get inside your net-
work – it’s what happens next
that matters.”
Adar added that establishing a
footholdonendpointsandescalat-
ing privileges enables attackers to
jumpfromendpoints,toservers,to
domaincontrollersuntiltheyown
thenetwork.“CyberArkViewfinity
extends privilege security to the
endpoint to mitigate these risks
without excessively restrictive
controls on users,” Adar said.
NewintegrationwiththeCyber-
Ark Shared Technology Platform
enablesallprivilegedauditlogsto
bestoredandreviewedcentrally,as
wellasnewflexible,customisable
reporting capabilities.
According to the security solu-
tions vendor, evidence shows that
advanced attacks often start with
phishing emails sent to non-privi-
legedbusinessusers,andacampaign
ofjust10emailswilltypicallyyield
a greater than 90% chance that at
least one person will become the
criminal’sprey.
ture and Solutions at Cisco. “With
DNA, Cisco is reinventing how we
secure networks for the digital era
by embedding advanced security
capabilities into a single network
architecture. But technology alone
isn’tenough.WearealsopreparingIT
professionalswithnewskills,training
network-savvydevelopersandhelp-
ing customers navigate the journey
todigital-readynetworks.”
5. 5
For more information, please write to sales.value@redingtongulf.com
TechnologymajorHewlettPackard
Enterprise (HPE) has announced
a new high-performance comput-
ing (HPC) solutions that includes
acomprehensivesoftware-defined
platform, enhancements to its
Apollo servers, as well as, a new
ANSYS computer-aided engineer-
ing (CAE) software based solution
designedtohelpmanufacturingor-
ganisations optimise their design
simulationdeployments.
Once the domain of academics
and research institutions, HPC is
rapidlymakingitswayintoindustries
like energy, life sciences, financial
servicesandmanufacturing.While
organisations in these industries
recognise the technology’s strate-
gicimportance,perceivedcomplex-
ity and diversity of HPC environ-
ments may appear to outweigh the
businessbenefits.
HPE Unveils Software Defined
HPC platform
New software platform delivers Simplicity,
Speed and Flexibility
Mannel says HPC is rapidly becoming
one of the essential ingredients for
the digital economy.
HPE’s announcement dramati-
callysimplifiesthedeploymentand
managementofHPCsolutions,en-
suringcompaniesofallsizescannow
accelerate their HPC projects and
create competitive differentiation
fortheirbusiness.
“HPCisrapidlybecomingoneof
theessentialingredientsforthedigi-
taleconomyacrossorganisationsof
alltypesandsizes,”saidBillMannel,
vicepresidentandgeneralmanager,
HPC, Big Data and IoT Servers at
HPE. “Today we are excited to un-
veil new additions to our recently
announced portfolio capabilities
designedtoaccelerateaccessibility
and time to value for HPC by sig-
nificantlysimplifyingdeployments,
streamlining management and
boostingperformance.”
“As the global HPC market
leader with 35.9% market share
HPE is upping the ante with new
additions to its already-large HPE
Apollo portfolio of purpose-built
solutions,” said Steve Conway,
Research Vice President in IDC’s
High Performance Computing
group. “These innovative solu-
tions aim to accelerate HPC adop-
tion by organisations of all sizes
and segments by enabling faster
time to value and increased com-
petitive differentiation through
better parallel processing perfor-
mance, along with reduced com-
plexity and deployment time.”
Gigamon to Offer First Visibility Solution for Public Cloud
GigamonInc,aprovideroftrafficvis-
ibilitysolutions,hasstartedtrialsfor
the world’s first solution that allows
enterprisestoseeinformationtravers-
ingpublicclouds.
Gigamon’s visibility solutions
for public cloud kicks off with field
trials of its Amazon Web Services
(AWS) Elastic Compute Cloud
(EC2)offering.
Thepercentageofworkloadshosted
in the public cloud is set to explode
from16toalmost40%overthenext
fiveyears,accordingtoJPMorgan.
Innovative solution to enable enterprises monitor and
secure workloads hosted by Amazon Web Services
Hooper says Gigamon is a market pio-
neer that has transformed the world
of IT through the power of visibility.
NewFirewallenables
organisationstooperatesecure,
distributed,cloud-basednetwork
environments
Gheri says as threats became more
targeted, traditional port blocking
firewalls are no longer enough.
With this rapid growth comes in-
creasing concern for network secu-
rityvulnerability,complianceriskand
compromisedperformance.
Gigamonsaidseamlesspubliccloud
adoptionhingesonenterprisesbeing
able to take advantage of the agility
offeredbyon-demandcomputeand
confidencethathostingbusinesscriti-
calapplicationsonsharedinfrastruc-
turedoesnotmeancompromisesin
securityoravailability.
Inaddition,thevendorsaidthean-
nouncement takes a significant step
forwardfortheindustrybyallowing
enterprises to for the first time ever,
gain visibility into previously un-
available public cloud applications
andinformation.
“Gigamon is a market pioneer
that has transformed the world of
IT through the power of visibility.
Whether it’s delivering more effec-
tive and efficient security, bringing
unprecedentedsubscriberawareness
toserviceprovidersorscalingperfor-
mance management, our Visibility
Fabrichasbeenatthecenterofhelp-
ingourcustomersnavigatedisruptive
changesaroundtheirnext-generation
infrastructure,” said Paul Hooper,
CEO,Gigamon.“Withthismilestone,
Gigamon enters a new phase in ex-
ecutingourcompanyvision.Weare
expandingourmarketyetagaintothe
thousandsofbusinessesthatwantto
confidently and securely host their
ITinfrastructureonpublicclouds.”
According to Gigamon, this in-
dustry-leading capability is key to
accelerating public cloud adoption
andreducingitsassociatedmigration
disruptionandrisks.WithGigamon’s
visibility solution, enterprises gain
unprecedented flexibility to design
andprovisionthepubliccloudmoni-
toringinfrastructurethatmeetstheir
business needs with the freedom to
choose the most appropriate public
cloudprovidertoaddresstheirspecific
requirements,thecompanysaid.
NetworksecuritysolutionsvendorBar-
racudahasannouncedtheavailabilityof
Barracuda,NextGenFirewallF-Series
version 7.0, which is designed for or-
ganisations adopting cloud-based ap-
plications,operatingdispersednetwork
environments and leveraging public
cloudplatforms.
Thenvendor’sNextGenFirewallVer-
sion7.0providessecurityandreliability
in these environments, especially for
organisations leveraging public cloud
platformslikeMicrosoftAzureandAm-
azonAWS.Barracudasaidorganisations
areincreasinglyadoptingvirtualisation,
software defined networks and cloud
applications such as Office 365, Sales-
forceandvideoconferencing.Assuch,
the vendor stated that the role of the
firewallhasevolvedfromaperimeter-
based security device to a distributed
securitysolutionthatmustintelligently
optimise traffic to improve network
performanceandprovidereliableaccess
tothesemissioncriticalapplicationsfor
allusersacrossalllocations.
AccordingtothecompanytheBarra-
cudaNextGenFirewallisdesignedfrom
the ground-up for the cloud era and
enablesintelligentnetworkperimeters
at headquarters, remote and branch
offices,andsatellitelocationstodeliver
secure,direct,businessqualityaccessto
applicationshostedinprivateandpublic
cloudenvironmentswhileminimizing
theneedtobackhaultraffic.
Barracuda Expands
Cloud-Ready Next-
Generation Firewall
Technology
6. 6
For more information, please write to sales.value@redingtongulf.com
Amazon Web Services Inc (AWS),
an Amazon.com company, has an-
nounced that Amazon Elastic File
System(AmazonEFS),anew,fully
managedservicethatmakesiteasy
to set up and scale file storage in
the AWS Cloud, is now available
to all customers.
With a few clicks in the AWS
Management Console, custom-
ers can use Amazon EFS to create
file systems that are accessible to
multipleAmazonElasticCompute
AWS launches Elastic File System
Newelasticfilestorageservicemakesiteasytodeploy
andscalefilesystemsintheAWSCloud
Cloud (Amazon EC2) instances
via the Network File System
(NFS) protocol.
According to the company,
Amazon EFS can automatically
scale without needing to provi-
sion storage or throughput, en-
abling file systems to grow seam-
lessly to petabyte scale, while
supporting thousands of con-
current client connections with
consistent performance.
“Ascustomerscontinuetomove
more and more of their IT infra-
structuretoAWS,they’veaskedfor
a shared file storage service with
theelasticity,simplicity,scalability
andon-demandpricingtheyenjoy
with our existing object (Amazon
S3), block (Amazon EBS) and ar-
chive (Amazon Glacier) storage
services,” said Peter DeSantis,
Vice President, Compute Servic-
es, AWS. “Initially, our custom-
ers most passionately asking for
a file system were trying to solve
for throughput-heavy use cases
like data analytics applications,
large-scale processing workloads,
andmanyformsofcontentandweb
serving. Customers were excited
aboutAmazonEFS’sperformance
for those workloads, and pretty
soon they were asking if we could
expandAmazonEFStoworkexcel-
lently for more latency-sensitive
and metadata-heavy workloads
like highly dynamic web appli-
cations. That’s what we’ve been
workingonforthelastfewmonths
and we’re excited to release it to
customers today.”
AmazonEFSisdesignedtosup-
portabroadrangeoffileworkloads
– from big data analytics, media
processing,andgenomicsanalysis
thataremassivelyparallelisedand
require high levels of throughput,
tolatency-sensitiveusecasessuch
as content management, home di-
rectory storage, and web serving.
AmazonEFSishighlyavailableand
durable, redundantly storing each
file system object across multiple
availability zones.
Amazon EFS can automatically scale
without needing to provision storage
or throughput.
Fidelis
Cybersecurity
unveils threat
intelligence
database
Fidelis Cybersecurity says the new
security resources are available at no cost.
Fidelis Cybersecurity, a provider
of products and services for de-
tecting and stopping advanced
cyberattacks, has announced the
availability of a new threat intel-
ligence database and freeware
tools designed to help the secu-
rity community stop attacks and
prevent data theft.
The company said the new re-
sourcesareavailableatnocostand
includetheBarncatThreatIntelli-
genceDatabase,theThreatScanner
toolforfindingmalwareresidingon
anendpoint,andCCNumberFinder
to support PCI DSS compliance.
Hardik Modi, Vice President,
ThreatResearchatFidelisCyberse-
curity,said:“Afteryearsofongoing
researchandthousandsofhoursof
incidentresponseengagements,we
areeagertogivebacktothesecurity
communitybysharingsomeofthe
threatintelligencewehavecurated
andfreetoolswehavedeveloped.”
Modi said by making these tools
and intelligence available to re-
searchers and security analysts,
Fidelis Cybersecurity is hop-
ing organisations will be able to
find and stop attackers faster and
more efficiently.
According to the company, the
Fidelis Barncat Intelligence Data-
base includes more than 100,000
recordswithconfigurationsettings
extracted from malware samples
gathered during Fidelis’ incident
response investigations and other
intelligence gathering operations
over the past decade.
New tools to help security
practitioners find attack-
ers faster
Check Point’s new security appliances
for SMBs
SecurityvendorCheckPointSoft-
ware Technologies Ltd, recently
announced two new additions to
the Check Point 700 Series appli-
ances,bothaddressingtheunique
securityneedsofsmallbusinesses.
The new Check Point 770 and
790 appliances, together with the
730 and 750, provide advanced
threatpreventionfeaturessuchas
New770and790appliancesextendtheCheckPoint700seriesfamily
The 770 and 790 extend the capa-
bilities of Check Point’s 700 Series
appliance array.
firewall, VPN, antivirus, anti-bot,
application control, URL filtering
and email security.
In addition, the appliances de-
liver optimised network perfor-
mance of up to 4 Gbps of firewall
throughput and up to 330 Mbps
whenthreatpreventionfunctions
are activated.
According to the 2016 Verizon
Data Breach Investigations Re-
port, cyber criminals use several
avenues to infiltrate small busi-
nesses – such as phishing, ran-
somware and denial-of-service
attacks. With the cost of these
attacks on a small business av-
eraging more than $35,000 (ac-
cording to First Data Market
Insight), the impact of today’s
cyber threats can have a devas-
tating effect in an increasingly
competitive marketplace.
“With small businesses playing
such a big role in the economic
growth and innovation across the
globe, there is a need for a simple
solution that helps keep these
small, often resource-strapped
organisations a step ahead of to-
day’s cybersecurity challenges,”
said Gabi Reish, Vice President
of product management, Check
Point. “The 770 and 790 extend
the capabilities of our 700 Series
appliance family, providing the
advanced protection necessary to
protect small business customer
networks from threats and un-
necessary exposure.”
CheckPointsaidthenew770and
790 deliver security optimised for
smallbusinesses.Thesecompactap-
pliancesaresimpletoconfigureand
manage,providingadvancedthreat
preventionagainstcyber-attacks.
7. 7
For more information, please write to sales.value@redingtongulf.com
Fortinet touts Security
Fabric solution in Middle
East
Commercial espionage key
reason for cyberattacks;
report
Vendormovestoaddresstheenterprisenetworkand
challengesCIOsface
TrendMicrorevealsadvancedtechnologiesinthemining
industrycouldleadtoadvancedthreats
Zakhour says the Fortinet Security
Fabric has traits that allow organisa-
tions to adapt and avoid becoming
obsolete.
Trend Micro says data stolen through
corporate espionage can have devas-
tating effects on the targeted firm.
TechnologypowerhouseDellMiddle
Easthasurgedtheregionalsystems
integration(SI)channeltoembrace
businessprocessandsolutionslife-
Dell urges systems integrators to embrace
business process selling
Understandingbusinessprocessandsolutionslifecyclecrucialforpartnersuccess
Hasan says there’s a big gap and
demand for SIs in the market who
understand solutions lifecycle.
cyclewhenintegrationsolutionsin
acustomer’senvironment.
Thecallcomesatatimewhenthe
Middle East IT industry is trans-
formingandthegrowingemphasis
intheregiononbusinessprocessand
specificallysolutionslifecyclewhen
itcomestosolutionsintegration.
Shams Hasan, Enterprise Prod-
uctManager,DellMiddleEast,said
whiletheneedforbusinessprocess
andsolutionslifecycleisgrowingin
thechannel,theemphasisseemsto
bemorefromthegrowingconcerns
of customers rather than solution
integrators. Hasan observed that
there’s still a big gap in the market
between the demand for SIs who
understand, speak and bring a so-
lutions lifecycle commitment and
supply. “SIs who take heed of this
supply gap would be big winners
tomorrow,”Hasansaid.
HecontinuedthatDellisalready
well-positionedforcustomers,solu-
tion integrators, and partners look-
ing for technology strategies and
solutions that are future ready for
digitaltransformation.
“Dell’s Future-Ready Enterprise
strategygivesorganisationsawayto
buildITcertaintyinuncertaintimes,
with the speed, scale and savings
businessdemands,”headded.When
wetalktoourbusinesspartners,we
emphasize our ability to serve as a
partnerwhocanprovideacomplete
solution–onecreatedwithaholistic
viewthattakesadvantageofthefull
spectrumofITtodeliversuccessful
businessoutcomes.Wetalkaboutour
uniquepositionastheonlytechnol-
ogy company that actually delivers
onthepromiseofintegrated,end-to-
endsolutions–fromthedatacentre
tothefarthestendpointandallalong
thecloudsandnetworksinbetween.”
HasansaidwithDell’send-to-end
solutions,organisationscanbecome
nimbleandcompetitiveeverywhere
intheenterprise,inthemannerthat
bestfitstheirbudget,staffingandtim-
ingrequirements—whetherdeploy-
ing pre-configured systems, using
validatedreferencearchitecturesfor
guidanceorbuilding“do-it-yourself”
withbest-of-breedplatforms.
Security vendor Fortinet Middle
East, has revealed that it is push-
ing the Fortinet Security Fabric,
launched earlier this year, as a re-
sponse to the current state of the
enterprise network and the chal-
lenges that CIOs face today.
According to the manufacturer
of fast and secure cyber security
solutions,whichoffersenterprise-
levelnextgenerationfirewallsand
a vast array of network security
products, the Fortinet Security
ITsecurityvendorTrendMicrohas
revealed that the UAE is among 22
victimsofcyberattacksreportedglob-
allyintheminingsector,accordingto
thevendor’slatestreport.
The report stated that with Saudi
Arabia’s mining sector to represent
10%ofitsnon-oilrevenueby2030,and
withothercountrieslikeOmanandthe
UAEinvestinginnewertechnologies,
theoutlookforintegratedITplatforms
and cloud operations in the mining
sectorissettogrowintheregion.
Fabricprovidesorganisationswith
a framework for meeting today’s
andtomorrow’ssecuritychalleng-
es, bringing the power of threat
intelligence to all four corners
of a network.
Maya Zakhour, Channel Direc-
tor, Middle East at Fortinet, said:
“The Fortinet Security Fabric has
characteristics that allow organ-
isations to adapt as necessary and
avoidbecomingobsoletewiththe
next wave of new trends that will
hit the market.”
Zakhoursaidthecompanyiswit-
nessingagrowingtrendofspeciali-
sations,whichworkstotheadvan-
tageofchannelpartners,especially
inthenetworksecuritymarket.She
addedthatsinceFortinethasprod-
uctsthatcatertoeverylayerofthe
network, the company is pushing
Fortinet Security Fabric by edu-
cating partners on the solutions
bestsuitedforthem,basedontheir
specialisations and the industry
vertical they are targeting.
With this, stated Trend Micro,
companiesinthesectorwillhavetobe
preparedforthesecuritychallenges
thesetechnologyadvancesbring.
According to the Trend Micro
report, the mining industry is be-
ing targeted by cybercriminals
and is now investigating 17 inci-
dents involving cyberattacks on
22 entities operating in the sector
since 2010. The most recent at-
tack was recorded in April 2016,
when hackers leaked 14.8GB of
data from the Canadian mining
corporationGoldcorp.
Thoughthereportdoesnothave
majorcasesfromtheMiddleEast
andAfrica,companiesintheregion
are not immune to these attacks.
TheUAEbasedfirmMineralsand
MarineAssetsCorporation(MAC)
and Canadian company Nautilus
were the victims of a targeted cy-
ber scam, wherein Nautilus paid
a$10mdepositintendedforMAC
into an unknown bank account.