SlideShare a Scribd company logo
valueplusthe
q u a r t e r ly
EMC: Product Watch
HP: Preparing for SDN wave
Cisco: Transforming businesses
RSA: Game changer
Honeywell: Highlights
HP: Secure Access & Continuity in
virtualized & BYOD
04
06
08
14
18
20
April 2014
presents
A special publication from Redington Gulf Value Division
Redington Value offers solutions to equip the market in
the wake of trends such as BYOD and virtualisation.
Seizing
opportunities
stands the test
WANT TO LEARN MORE?
CONTACT US ON WWW.HONEYWELLAIDC.COM
OR CALL +31 40 7110 041
© 2013 Honeywell International Inc. All rights reserved.
For more information or to place an order on Honeywell,
please write to sales.value@redingtongulf.com
At Honeywell, we believe that the measure of durability over
the lifetime of an industrial barcode scanner is the tumble test.
The Granit 1910i has been tested to endure 5,000 drops from
a height of 1 meter. Drops from this height are most common
in industrial use cases making Granit 1910i the industry’s most
rugged 2D Area-Imaging Device. For your next 2D industrial
scanner, demand nothing less.
resolve security risks, creating cyber
security strategy and policies and
finally regularly reviewing and
updating these strategies are the steps
to a secure business.
This edition of The Value Plus
talks about the security issues that
come with trends such as BYOD and
data centers. We look forward to
your feedback and suggestions, and
wish you all a great year ahead.
Yours sincerely,
Raj Shankar,
Managing Director, Redington Gulf
04		EMC: Product watch
06		HP: Preparing for SDN wave
08		Cisco: Transforming businesses
14		RSA: Game changer
18		Honeywell: Highlights
20		HP: Secure access &
continuity in virtualisation,
BYOD
24		Channel events
contents04 06
08 14
Dear Partners,
S
ecurity solutions are no longer
an after-thought. Today,
organizations are having a
tougher time mitigating
security breaches, and the average
financial impact of each breach is
increasing. Security was once under
the domain of the IT department but
now there is an urgent need for it to be
viewed strategically rather than
operationally. There are various
reasons why this transition needs to
happen. Companies have more data as
compared to a decade ago and it is
now also recorded and stored for
analysis. Earlier, the data was confined
from the director:
in the company’s data center facility
but with the rise of hybrid cloud
services and organizations leveraging
infrastructure as a service, software as
a service and security as a service, the
data now resides in the cloud too.
Employees accessing this information
through the explosion of new devices
and environment complicates the
process further. In such a scenario,
regulatory compliance makes it
mandatory to ensure security is in
place. Companies must prepare to face
advanced threats as technology evolves
and becomes pervasive. Identifying
organizations’ key data asset and
potential risk associated with it,
engaging with security specialist to
Product Watch
Preparing for
SDN wave
Transforming
businesses
Game changer
April 2014 The ValuePlus Quarterly 1
For more information, please write to sales.value@redingtongulf.com
For more information or to place an order on Barracuda Networks,
please write to sales.value@redingtongulf.com
Dear Readers
It gives us immense pleasure to announce
our partnership with Oracle to offer their
solutions for the ME market. This gives
us an opportunity to provide our channel
with one of the ‘best of breed’ solution sets
across the entire stack – from applications
to hardware – all from a single company.
We, at Redington Value, will focus on the
development of the Oracle channel in
the Middle East region, driving deeper
adoption of Oracle’s technology and
application products within the Middle
East IT channel. We will offer our partners
pricing and deal support for Oracle
solutions, as well as support in terms of
enablement and demand generation. We
will also be responsible for identifying a
strategic network of specialist partners for
driving deeper adoption of Oracle products
within the ISV community in the region.
And, we will invest in Oracle Authorized
Solution Centers for the benefit of partners
and customers across the region.
2014 has begun on a positive note and
we expect that this trend will continue
during the rest of the year. In the
Middle East, majority of the growth is
expected to come from the governments
in Saudi Arabia, UAE and Qatar. Iraq
and Libya will see an overall increase in
IT spending as per the recent research
reports. In Africa, the IT market is
growing despite the limitation in
infrastructure. VoIP and Mobility have
taken off exponentially across all the
countries in the African continent and
will provide immense opportunities in
this market. Another growing market
in Africa for this year is IT security;
there is a growing concern among
large organizations and government
departments to protect their network.
Our focus for this year will be to promote
technological solutions broadly in the
following areas: virtualisation, converged
infrastructure, storage and security (with
focus on virtualized environments) along
with BYOD and cloud computing.
In other developments, we have now moved
into Angola and are hoping to achieve
a strong presence in the region by the
end of this year. 2013 saw us making very
important partnerships with key vendors
such as VMware, Eaton, Honeywell, RSA
and the most recent one being, Oracle. For
the remaining part of the year, we will be
strengthening our partner and customer
base for these vendors’ technological
solutions.
Redington Value Marketing is offering
demand generation tools to vendors
and partners to grow their end-user
customer base. We now conduct many
end user workshops to educate the
customer base using Redington Value
proof of concept centers and generate
leads for our partners and vendors. With
our existing strong partner intelligence
and growing end customer knowledge,
we look to provide easier go-to-market
strategy not only for vendors but also for
our channel partners.
Wish you a prosperous quarter ahead.
Thanks and best regards,
Ramkumar B
Senior Vice-president, Redington Gulf
Value Division
Viewpoint by Ramkumar
Bright outlook
April 2014 The ValuePlus Quarterly 3
For more information, please write to sales.value@redingtongulf.com
Product watch
O
rganizations of all sizes
around the globe are
dealing with a deluge of
digital content and
unstructured data that is driving
massive increases in storage
needs. As these enterprise datasets
continue to expand to
unprecedented sizes, data
protection has never been more
crucial. A new approach is needed
to meet the availability, protection
and performance requirements of
this era of ‘big data’.
EMC Isilon enables
organizations to linearly scale
capacity and performance to
over twenty petabytes, 106GB
per second and 1.6 million
SPECsfs2008 CIFS file operations
per second. Moreover, they
can do this within a single
file system—one which is both
simple to manage and highly
available and redundant, as we
have seen. Built on commodity
hardware and powered by the
revolutionary OneFS distributed
file system, Isilon scale-out NAS
solutions deliver key tenets such
as unparalleled levels of data
protection, no single point of
failure, fully distributed single
file system, industry leading
tolerance for multi-failure
scenarios, pro-active failure
detection and pre-emptive, fast
drive rebuilds, flexible, file-
level data protection and fully
journalled file system along with
extreme transient availability.
Isilon scale-out architecture
An Isilon cluster is built on a
highly redundant and scalable
architecture, based upon the
hardware premise of shared
nothing. The fundamental
building blocks are platform
nodes, of which there are
anywhere from three to one
hundred and forty four nodes
in a cluster. Each of these
platform nodes contain CPU,
memory, disk and I/O controllers
in an efficient 2U or 4U rack-
mountable chassis. Redundant
InfiniBand (IB) adapters provide
a high speed back-end cluster
interconnect—essentially a
distributed system bus - and
each node houses a fast, battery-
backed file system journal device.
With the exception of the IB
High availability and data protection are the two
benefits with EMC Isilon scale-out NAS.
4 The ValuePlus Quarterly April 2014
For more information, please write to sales.value@redingtongulf.com
focus | emc
“EMC Isilon OneFS takes a holistic
approach to ensuring that data is
consistent and intact - both within
the file system, and when exiting the
cluster via a network interface.”
controller, journal card and an
LCD control front panel, all of a
node’s components are standard
enterprise commodity hardware.
These Isilon nodes contain a
variety of storage media types
and densities, including SAS and
SATA hard disk drives (HDDs),
solid-state drives (SSDs), and a
configurable quantity of memory.
This allows customers to
granularly select an appropriate
price, performance and
protection point to accommodate
the requirements of specific
workflows or storage tiers.
Highly available storage client
access is provided via multiple
1 or 10Gb/s Ethernet interface
controllers within each node, and
across a variety of file- and block-
based protocols including NFS
and SMB/CIFS.
OneFS architectural overview
OneFS collapses the traditional
elements of the storage
stack—data protection, volume
manager, file system, etc.—
into a single, unified software
layer. This allows for a highly
extensible file system that affords
unparalleled levels of protection
and availability.
Built atop FreeBSD’s UNIX
implementation, availability and
resilience are integral to OneFS
from the lowest level on up. For
example, unlike BSD, OneFS
provides mirrored volumes for
the root and /var file systems via
the Isilon Mirrored Device Driver
(IMDD), stored on flash drives.
OneFS also automatically saves
last known good boot partitions
for further resilience.
On the network side, the
Isilon logical network interface
(LNI) framework provides a
robust, dynamic abstraction for
easily combining and managing
differing interfaces, enabling
network resilience. Multiple
network interfaces can be
trunked together with Link
Aggregation Control Protocol
(LACP) and Link Aggregation and
Link Failover (LAGG) to provide
bandwidth aggregation in
addition to client session failover
and general network resilience.
Within the cluster, every disk
within each node is assigned
both a Globally Unique Identifier
(GUID) and logical drive number
and is subdivided into 32MB
cylinder groups comprised of
8KB blocks. Each cylinder group
is responsible for tracking, via
a bitmap, whether its blocks
are used for data, inodes or
other metadata constructs. The
combination of node number,
logical drive number and block
offset comprise a block or inode
address and fall under the
control of the aptly named Block
Allocation Manager (BAM).
In addition to block and
inode allocation, the BAM also
handles file layout and locking
and abstracts the details of OneFS
distributed file system from the
kernel and userspace. The BAM
never actually touches the disk
itself, instead delegating tasks
to the local and remote block
manager elements respectively
on the appropriate nodes. The
Remote Block Manager (RBM) is
essentially a Remote Procedure
Call (RPC) protocol that utilizes
the Socket Direct Protocol (SDP)
over redundant InfiniBand for
reliable, ultra low-latency back-
end cluster communication.
These RBM messages— everything
from cluster heartbeat pings
to distributed locking control -
are then processed by a node’s
Local Block Manager via the
Device Worker Thread (DWT)
framework code.
EMC Isilon OneFS takes a holistic
approach to ensuring that data is
consistent and intact - both within
the file system, and when exiting
the cluster via a network interface.
Furthermore, the Isilon clustering
technology is uncompromisingly
designed to simplify the
management and protection of
multi-petabyte datasets.
On the network side, the Isilon logical network interface (LNI) framework provides a robust, dynamic
abstraction for easily combining and managing differing interfaces, enabling network resilience.
April 2014 The ValuePlus Quarterly 5
For more information, please write to sales.value@redingtongulf.com
6 The ValuePlus Quarterly April 2014
For more information, please write to sales.value@redingtongulf.com
Preparing for
SDN wave
M
any enterprises are
unable to achieve
business innovation
because of aging
networking environments.
Enterprise network design and
architectures have remained
largely unchanged for more than a
decade. While applications and
systems have evolved to meet the
demands of a world where real-
time communications, rich-media,
and mobility are the norm, the
underlying network infrastructure
has not kept pace.
A new paradigm in networking,
SDN represents an evolution of
networking that holds the promise
of eliminating legacy human
middleware and paves the way
for business innovation. With
SDN, IT can orchestrate network
services and automate control of
the network according to high-
level policies, rather than low-level
network device configurations.
By eliminating manual device-by-
device configuration, IT resources
can be optimized to lower costs
and increase competitiveness.
The desire for automated and
dynamic control over network
resources is not new. However, with
the emergence of technologies
such as OpenFlow, the ability to
implement SDN to increase agility
has never been simpler.
HPisaleaderinenterprise
networkingandaspartofits
commitmenttodeliverinnovative
solutionsithasdevelopedthe
HPVirtualApplicationNetworks
frameworkfordeliveringSDN
solutions.OpenFlowisakeyenabling
technologyforthesesolutions.
SDN architecture
TheSDNarchitecturedepartsfrom
legacysolutionsbybuildingnetworks
fromthreeabstractionsorlayers.
First,theinfrastructurelayer
actsasthefoundationforanSDN
architecture.Theinfrastructure
consistsofbothphysicalandvirtual
networkdevicessuchasswitchesand
routers.Thesedevicesimplementthe
OpenFlowprotocolasastandards-
basedmethodofimplementing
trafficforwardingrules.
Second, the control layer
consists of a centralized control
plane for the entire network. The
control plane is decoupled from
the underlying infrastructure
to provide a single centralized
view of the entire network. The
control layer utilizes OpenFlow
to communicate with the
infrastructure layer.
Third, the application layer
consists of network services,
orchestration tools, and business
applications that interact
with the control layer. These
applications leverage open
interfaces to communicate
with the control layer and the
network state.
SDN simplifies campus and data
center networks
SDN solutions have applicability
across many environments from
the data center to the enterprise
campus. One of the key
solutions that SDN can deliver is
network virtualization.
Network virtualization can be
used to support multi-tenancy in
large data centers, while individual
enterprises retain control.
Network virtualization can also be
used to span multiple data centers.
Many organizations have
found that their networks cannot
accommodate the demands of
server virtualization and workload
mobility. Virtualized networks,
enabled by OpenFlow, simplify
the challenge of moving virtual
workloads across data centers.
IT managers can define network
policies that support the massive
amounts of traffic that are moved
for workload automation, “Big Data”
HP helps build the foundation for SDN with OpenFlow.
focus | HP
April 2014 The ValuePlus Quarterly 7
For more information, please write to sales.value@redingtongulf.com
“As part of HP’s commitment to deliver
innovative solutions it has developed
the HP Virtual Application Networks
framework for delivering SDN solutions.”
applications, and business continuity
objectives. Network bandwidth can
be automatically expanded to meet
dynamically changing application
and service requirements.
Network virtualization can also
facilitate IT experimentation on
the network. Few organizations
want to risk experimenting on a
production network. Laboratory
test beds are too small to represent
real-world networks. Now, IT can
use an OpenFlow-enabled network
to run more realistic tests in
virtualized slices of the network. IT
architects can have a practical way
to experiment and explore new
network technologies and protocols.
The ability to virtualize networks
creates benefits for organizations
from the smallest businesses to the
largest enterprises.
Virtualized networks, enabled
by the OpenFlow protocol, will
make it easier for organizations
to configure and manage their
applications and resources across
campus networks. For instance,
a retailer can ensure regulatory
compliance using virtualized
networks to provision payment
devices. This helps retailers comply
with Payment Card Industry (PCI)
security regulations in a way that is
simpler and easier than ever before.
IT can create virtual networks
to handle the real-time demands
of video or voice applications,
ensuring that users have the
quality experience they demand.
IT can gain unified control over
wireless and wired LANs, making
it easier for mobile users to stay
seamlessly connected to their
applications and services, no
matter where they are.
SDN enabled by OpenFlow
At the foundation of enabling SDN
is an emerging open standard
called OpenFlow, which ultimately
allows the network to be more
responsive to business needs. It
has been in development since
2007, led by Stanford University
and the University of California
at Berkeley. It became a standard
that is now defined by the Open
Networking Foundation (ONF)
since 2011.
OpenFlow hides the complexity
of the individual pieces of network
devices. It centralizes the control
of those devices in a virtualized
manner, simplifying network
management for network managers.
The OpenFlow protocol uses
a standardized instruction set,
which means that any OpenFlow
controller can send a common set
of instructions to any OpenFlow-
enabled switch, regardless of vendor.
OpenFlow is an open-standards
way of virtualizing the network.
Network managers can specify
different policy rules for different
groups of devices and users,
which create multiple virtualized
networks regardless of the
physical network connections.
This allows network managers to
easily customize and manage these
virtualized networks to ensure
proper policies such as forwarding
path, QoS and security.
OpenFlow is designed to be
programmable. The OpenFlow
instruction set allows network
managers to try new ideas or
create new protocols to solve
problems specific to their
organizations’ network needs.
This allows network architects to
experiment with new services and
protocols on a real-world network
that cannot be simulated in a test
lab—or is too risky to undertake in
a production network today.
In building SDN-ready network
architecture, it is important to
prepare the infrastructure layer for
standards-based programmability.
It is recommended that
businesses ensure that all network
infrastructure devices support the
OpenFlow standard. OpenFlow
support will future proof the
network for SDN and provide
investment protection without
requiring a forklift upgrade.
When business are ready, they
can easily build out an SDN
solution on top of the OpenFlow-
enabled infrastructure.
HP OpenFlow leadership
The OpenFlow protocol is emerging
from its roots in the research and
educationcommunityandexpanding
to the enterprise. HP OpenFlow-
enabled solutions have been a top
choice for academic and commercial
researchers. HP demonstrated
the first commercial, hardware-
based switch implementation of
OpenFlow at ACM SIGCOMM in
2008. HP also participated in a public
demonstration of OpenFlow at
InteropNet Lab in May 2011.
HP has been an active
contributor to the OpenFlow
standards effort and is a founding
member of the Open Networking
Foundation. HP continues to
work closely with partners such
as Indiana Center for Network
Transactional Research and
Education (InCNTRE) to drive
research in SDN and enable
multivendor interoperability for
OpenFlow-enabled solutions.
HP is a leader in implementing
OpenFlow across its FlexNetwork
portfolio with the broadest portfolio
support of any tier-1 networking
vendor and the largest install base of
OpenFlow enabled ports.
HP Virtual Application Networks
Virtualization has redefined how
applications, servers, and storage
are deployed, and the same
unstoppable force is heading
toward the network. Once a brittle
bottleneck standing in the way of
dynamic IT, the network’s future
is one of greater agility, scalability,
and security. Now is the time to
make that future a reality.
HP Virtual Application
Network is a complete, end-to-end
framework for delivering SDN
solutions to enable businesses
to create a scalable, agile, and
secure network that empowers
IT staff and streamline business
operations. With Virtual
Application Networks, businesses
can focus on connecting users to
business applications and on the
quality of experience—rather than
on the details of configuring the
network, device by device.
Together, HP FlexNetwork
architecture and Virtual Application
Networks create a unified platform
through a programmable end-to-
end control plane for dynamic and
rapid deployment of applications
and services giving the agility
businesses need.
Virtual Application Networks
are built on the tenets of
application characterization,
network abstraction, and
automated orchestration to
ensure consistent provisioning of
resources to meet the service level
expected by users.
With Virtual Application
Networks you can spend more
time connecting users to
applications and less time on
managing complex infrastructure.
B
ring Your Own Device
(BYOD) has become one of
the most influential trends
that has or will touch each
and every IT organisation. The term
has come to define a megatrend
occurring in IT that requires
sweeping changes to the way
devices are used in the workplace.
What is BYOD? Does it mean
employees pay for their own
devices they use for work? Possibly,
but the BYOD trend means much
more. It is about end users being
able to use the compute and
communication devices they
choose to increase productivity and
mobility. These can be devices
purchased by the employer,
purchased by the employee, or
both. BYOD means any device, with
any ownership, used anywhere.
To understand the challenges
BYOD poses, it is helpful to
understand the business trends
that are driving BYOD adoption.
Consumer devices
In the last year, the persistence of
end-users demanding to leverage
their tablet computers and
smartphones to extend their
productivity, even if they had to
purchase the devices themselves,
has led many IT departments to
adopt less restrictive policies,
allowing employees basic
connectivity or, increasingly, full
access to the IT network and
corporate applications. This
trend is likely irreversible and
every IT organisation will need to
quickly adapt to the consumer
device phenomenon.
Multiple needs and multiple devices
There is speculation that in the
future a single device will be used
for all needs: computing,
communications, and applications.
However today most believe
there will continue to be
different devices best suited to
Transforming businesses
With BYOD becoming the norm rapidly in most organisations, Cisco provides insights into
the trend and discusses advantages of the company’s solution.
8 The ValuePlus Quarterly April 2014
For more information, please write to sales.value@redingtongulf.com
Highlights | CISCO
Start Preparing Your Network Today
Networking trends are affecting IT efficiency. Over seven billion enterprise mobile
devices are expected by 2015, and video and other rich-media tools are expected to
consume more than 90 percent of bandwidth by 2014. IT is being asked to improve
efficiency and save money, while still fully supporting these new trends.
Cisco® Borderless Networks built with Cisco Catalyst switches can help you reduce
implementation and deployment costs, network downtime, and operational expenses.
Enable IT to increase operational efficiency and lower total cost of ownership, solving
the challenges your staff face in supporting today’s networking trends.
Contact us to discuss potential areas for network improvement, review Cisco’s latest
offers, and look at our joint professional and technical services that help you take
advantage of new investments more quickly and easily.
For more information please write to
sales.value@redingtongulf.com
Get Your Network Ready
for Operational Efficiency
particular uses. For example, a
laptop is not as portable as a
smartphone, so people are likely
to carry their smartphone for
mobile communications. Tablets
are powerful devices as well, but
it is likely laptops and PCs will
still be used for document
creation and publishing. This
means people will more likely
carry and use multiple devices
and less likely that a single, all-
purpose device will emerge.
The impact of this trend is
that many more devices will be
connected to the network by the
same employee or person, often
simultaneously, and likely lead to
a large increase in overall
connected devices.
Work and personal overlap
Increasingly, work is an activity
that people do, not a place to
which they go. Extended
connectivity through mobile and
remote access to the corporate
network gives employees
tremendous flexibility and
increased productivity. It also
leads to a blurring of the line
between work time and personal
time, with employees trading set
work schedules for the flexibility
of working when and where they
want to, often interweaving work
and personal tasks.
A side effect of this flexibility
is that most employees want to
be able to use a single
smartphone, tablet, or laptop for
both work and personal tasks
and not also carry around
corporate devices.
Device ownership is not clear
cut. Many employees are willing
to use their personal tablet or
smartphone, for example, to
access work applications. Many
employers are considering or
have implemented subsidy
programs, whereby an employee
is provided with money for
devices, but it is up to the
employee to purchase the devices
they want. The effect of this time
and device overlap is that
corporate and personal data will
be increasingly co-mingled on
devices, leading to security and
privacy issues.
Anywhere, anytime mobility
It is estimated that mobile
devices and the traffic they
create on networks will increase
by 26X between 2010 and 2015,
driven by more powerful
smartphones and tablets, with
users demanding Internet access
and access to applications
wherever and whenever they
want. Enabling this is an
explosive build-out of WiFi
networks by employers, 3G and
4G networks by mobile
providers, as well as public WiFi
by retailers and municipalities.
The more employees can
easily access work using WiFi
and mobile networks, the more
widespread these networks will
become, thereby further
enabling access. The end result is
pervasive connectivity anywhere
and anytime, which means
corporate networks will have
more devices connected more
frequently, leading to an even
broader need for the 24/7
availability of applications.
CHALLENGES FOR IT ORGANISATIONS
Adopting BYOD comes with a set
of challenges for the IT
organisation . Many of the
benefits of BYOD, such as having
the choice of any device and
anywhere, anytime access, are
somewhat antithetical to
traditional IT requirements for
security and support.
Providing device choice and support
Traditionally, IT pre-determined a
list of approved workplace
devices, typically a standardized
desktop, laptop, and perhaps
even a small, standardized set of
mobile phones and smartphones.
Employees could choose among
these devices, but generally were
not permitted to stray from the
approved devices list.
With BYOD, IT must approach
the problem differently. Devices
are evolving so rapidly that it is
impractical to pre-approve each
and every device brand and form-
factor. It is also somewhat
impractical to expect IT
organisation s to have the same
level of support for each and
every device that employees may
bring to the workplace.
Hence most IT organisation s
have to establish, at a macro
level, what types of devices they
will permit to access the
network, perhaps excluding a
category or brand due to
unacceptable security readiness
or other factors. Support must
also be considered, such as
adopting more IT-assisted and
self-support models.
Maintaining secure access to the
corporate network
Device choice does not mean
sacrificing security. IT must
establish the minimum security
baseline that any device must
meet to be used on the corporate
“On-boarding of new devices should
be simple and, ideally, self-service with
minimal IT intervention, especially for
employee bought devices.”
10 The ValuePlus Quarterly April 2014
For more information, please write to sales.value@redingtongulf.com
Highlights | CISCO
network, including WiFi
security, VPN access, and
perhaps add-on software to
protect against malware.
In addition, due to the wide
range of devices, it is critical to
be able to identify each device
connecting to the network and
authenticate both the device and
the person using it.
On-boarding of new devices
Most BYOD implementations will
have a wide-range of devices
including desktop PCs, laptops,
netbooks, smartphones, tablets,
e-readers, and collaboration
devices. It is likely some devices
will be corporate owned and
managed, while other devices
may be employee purchased and
self-supported.
On-boarding of new devices—
bringing a new device onto the
network for the first time—
should be simple and, ideally,
self-service with minimal IT
intervention, especially for
employee bought devices. IT
also needs the ability to push
updates to on-boarded devices
as required.
Ideally on-boarding should be
clientless, meaning no pre-
installed software is required.
This has an added benefit: if a
self-service on-boarding model is
successfully implemented, it can
be easily extended to provide
access to guests as well.
Enforcing company usage policies
Businesses have a wide range of
policies they need to implement,
depending upon their industry
and its regulations and the
company’s own explicit policies.
Adoption of BYOD must provide
a way to enforce policies, which
can be more challenging on
consumer devices like tablets
and smartphones.
Another complication results
from the mixing of personal and
work tasks on the same device.
Smartphones are likely used for
business and personal calls and
tablets have both personal and
business applications installed.
Access to the Internet, peer-to-
peer file sharing, and
application use may be subject
to different policies when a user
is on their personal time and
network and when they are
accessing the corporate network
during work hours
KEY ADVANTAGES OF THE CISCO
BYOD SOLUTION
The Cisco BYOD solution
integrates the Cisco products,
third-party products, and other
devices into a comprehensive
BYOD approach, which is tightly
integrated across the network
infrastructure. This offers a
unique set of advantages over
other solutions.
Secure access for any device
Through a combination of X.509
digital certificates, two-factor
authentication, Cisco
AnyConnect client, and 802.1x, a
wide variety of devices can be
supported with secure access to
the network.
Self-service on-boarding
The integrated approach allows for
devices to be self-enrolled the first
time they connect to the network.
Each device is fingerprinted so it
can be identified upon
returning for subsequent
network access attempts.
Centralised enforcement of
company usage policies
Cisco Identity Services Engine
(ISE) provides a centralised single
source of policy across the
organisation that can be
enforced across different
network access types.
Differentiated access and services
The Cisco BYOD solution provides a
means to identify devices and users
and provides differentiated services
based on custom policy options.
For example, employees using
corporate-owned and managed
devices can be treated differently
than employees using their own
unmanaged devices at work.
Similarly, contract employees,
partners, guests, customers,
students, and other classifications
that are important to the
business or entity can be
identified and treated according
to the business policies,
restricting access to only the set
of services and access to which
they are entitled.
High performance and reliable
wireless LAN
The Cisco BYOD solution includes
industry leading WLAN
technologies to enable the best
possible performance and
reliability for wireless clients.
Technologies including Cisco
CleanAir, ClientLink, and 4x4
antenna design fundamentally
improve RF performance. Secure
Fast Roaming, VideoStream, and
Wireless QoS improve application
experience. No other industry
solution offers the depth and
breadth of the Cisco WLAN
product family.
Unified approach for wired,
wireless, remote, and mobile access
The Cisco BYOD solution strategy
is to provide a common approach
anywhere devices connect to the
network, including wired, WiFi,
public WiFi, and 3G/4G mobile
and also regardless of whether
the connectivity occurs in the
main campus, branch office,
home office, or mobile
Teleworker location.
Unified experience for end users
The unified approach across
network access types and
locations, as well as the use of
the Cisco AnyConnect client,
provides a unified experience
for users, which is consistent
whether they are connecting
at the corporate office over
WiFi or remotely over 3G/4G
mobile providers.
Unified visibility and device
management
Cisco ISE and Cisco Prime
provide a single source and
visibility for users and devices,
simplifying troubleshooting
and auditing.
“Cisco BYOD solution integrates the Cisco
products, third-party products, and other
devices into a comprehensive BYOD
approach, which is tightly integrated
across the network infrastructure.”
April 2014 The ValuePlus Quarterly 11
For more information, please write to sales.value@redingtongulf.com
Coming together today, to create
better opportunities for tomorrow
Redington Value is now an authorized distributor for Oracle in
the Middle East. Oracle is the leading provider of the most
complete, open, and integrated business software and
hardware systems. Redington, with its diverse reach and
excellent strength across the region, will now offer the entire
stack of Oracle products and value added support services
including pre sales, credit, local billing and concept centers
spread across its locations in the Middle East.
To place an order, please write to sales.oracle@redingtongulf.com or call 971 55 2286236
For mo
please
Game changer
Ahmed El Sabbagh, Regional Distribution Manager -
Turkey, Emerging Africa & Middle East, RSA on the
changing threat landscape and how this affects
the channel.
W
hat has been the
business focus for RSA?
It’s not surprisingly,
that many leading
organizations find it extremely
difficult, without spending
prohibitively large sums of
money, to answer key challenges,
such as Am I secure? Am I
compliant? Where do I have
gaps? How do I prioritize? Can I
do this affordably? Am I aligned
to the business?
Accompanying our customers
as a trusted advisor through their
security journey to ensure that
intrusion and compromise do not
result in business damage or loss
for them and assuring they have
definite answers to these
questions has been always our
business focus and priority from
which our research and
development teams are always
working on adopting a more
intelligence-driven approach to
help our customers increase
their security maturity level
taking into consideration their
ongoing business transformation
and the advanced threat
landscape and evolution.
What’s important for RSA is
not only where our customers are
today, but what steps are we
taking to improve their security
practice and take them to the
next level within their security
maturity journey.
How has the perception of security
solutions changed over the years?
Just a few years ago, a typical
scenario might have been remote
access offered to a limited set of
employees, using a laptop that
was provided by the company,
over a VPN connection that
allowed access to a limited set of
key internal applications like
email and sales force automation.
Now, we have almost our entire
workforce, using their own
tablets and smartphones for
business purposes, accessing
applications that live in the
cloud, over untrusted wireless
networks and the internet. We
used to describe the disappearing
perimeter as a security concern –
today we have almost no
boundaries or a perimeter that
has effectively been turned
inside-out. And the expectations
for securing this environment are
the same or more strict.
On top of that, the threat
landscape and attacker tactics
have fundamentally changed,
resulting in adversaries that are
more formidable than ever
before, and who can’t be stopped
effectively using yesterday’s tools
and methods. It’s not just that
they are more sophisticated, but
attack methods have
fundamentally changed.
First they are targeted, with a
specific objective. Previously, we
may have seen threats such as
mass malware that can infect PCs
or random attacks on unnecessary
services running on external-
facing servers. Advanced threats
typically use custom malware that
targets an individual or group of
employees at a specific
organization. The attackers are
seeking specific information –
intellectual property or
confidential documents. And
their entry point to the
organization is the compromise
of an individual user’s credentials
that they can use to establish an
non-suspicious initial foothold in
their target organization.
Second, once their initial
intrusion is successful, advanced
attackers are much more stealthy.
IN DEPTH | RSA
14 The ValuePlus Quarterly April 2014
For more information, please write to sales.value@redingtongulf.com
RSA | IN DEPTH
Unlike a “smash and grab”
password theft or website
defacement, advanced attackers
seek to remain hidden inside the
organization, establishing
multiple footholds in case their
initial access is shut down, and
keeping suspicious activity that
might alert security operations
teams to a minimum as they seek
their target. They cover their
tracks by erasing logs and other
evidence of their activity.
We need to acknowledge that
a model that defends a static
perimeter and static
infrastructure, that relies on
fixed controls based on
signatures derived from
knowledge of prior attacks, will
be increasingly ineffective in
maintaining trust in our IT
systems and digital businesses.
Against these fundamentally
different and advanced attacks,
we need a fundamentally
different response. We need to
spend less time trying to keep
attackers out, but focus instead
on accelerating our ability to
detect and respond to intrusions,
and reducing the amount of time
they are in the network.
In response to all of this, RSA
Intelligence Driven Security
Approach focus on people,
identities, and their behavior,
the flow of data and
transactions to ensure that
intrusion and compromise do
not result in business damage or
loss for our customers.
What is RSA’s market differentiator?
The security market is obviously
one that RSA has been in for
some time. In fact, it is one that
we pioneered with the invention
of the public key cryptography 25
years ago. A capability which is
now deployed in over a billion
applications worldwide and is the
foundation of network and
internet security.
Our solution set is made up of
leading, best of breed products
and we have obviously long been
recognized as the market leader
in one-time password
authentication with the broadest
set of authentication options
available. But now our solution
set includes leading solutions in
Data Loss Prevention, Web Fraud
Prevention, Security Information
and Event Management, Network
Analysis & Forensics as well as
Governance, Risk and
Compliance where Gartner
considers us to be in the ‘leaders’
quadrant in all categories.
And because of this breadth of
capability, we are also ‘complete’.
Not because we provide solutions
in every aspect of security but
because no other company shares
our strategy of integrating these
products so that they work
together and with third-party
products and solutions – allowing
our customers to build a business
holistic approach to security, risk
and compliance.
Another dimension that
makes us ‘complete’ is the out-of-
the-box expertise about
regulations, threats and best
practices built-in to our solutions,
saving customers significant time
and resources. Expertise created
by teams of experts, shared
across our customers.
Also being the security
division of the giant EMC gives us
financial strength that has and
continues to enable us to make
strategic acquisitions and
investments that add tremendous
value to our customers. As such
our solution portfolio and
offerings has been exponentially
expanded over the last few years.
EMC also has strong corporate
partnerships with the likes of
Cisco, Microsoft, and, of course,
VMware, which gives us better
opportunity to work more closely
with these technology partners to
ensure that security, visibility and
control is built into their IT
infrastructure – both physical
and virtual.
Finally, a strong security
pedigree and one where our
primary go to-market model is via
partners, again something that we
have done for the last 25 years.
I believe that all this puts RSA
in a unique position to deliver an
integrated and holistic security
solution which lowers the overall
cost of safeguarding an
organization while handling
advanced persistent threats.
What does this mean for the channel?
The threat landscape and
attacking community has
changed. Advanced persistent
threats are the norm, data and
information levels are exploding
and we are being put under ever
more legislative and regulatory
pressure and it’s not surprising
that security is now a big issue
for most CIOs and the security
market for both products and
supporting services is vast and
growing rapidly however
different organizations
depending on their
characteristics, exhibit different
security postures from Threat
Defense based companies who do
‘just enough’ through to Business
Risk oriented businesses that
want to sow security into the
fabric of their organization, and
therefore have different needs.
RSA early realized that and
translates it into opportunities for
our channel by leveraging our
leading, complete and integrated
security solutions that play a part
at every stage of the market
maturity model whatever your
target market and its security
posture which leads to potential
new clients and increase account
penetration with a richer set of
solutions, services and consultancy
leading to increased revenue and
more business to the channel.
In this fast growing region, I
have noticed that a lot of VARs
want to be everything to
everybody, then you’re a
commodity and you’re not any
different than ‘that guy’ down
the street. We give our channel
the opportunity to be unique and
focused through the RSA
“SecurWorld” program which
reflect RSA’s broader solution
portfolio and the different needs
of partners taking different
products to market. As a result
partners can specialize in certain
areas and our channel education
framework “SecurAcademy” has
been specifically designed to
support the needs of all partners
that is role based and more
solution-centric.
Finally, we are always looking
to align our channel, depending
on their skills, characteristics and
aspirations, with our solutions
and the end user market where
their capabilities can be best
deployed and there is always an
opportunity to partner with RSA
across the complete security
spectrum whatever the stance of
their business or target market.
Ahmed El Sabbagh, Regional
Distribution Manager -
Turkey, Emerging Africa &
Middle East, RSA
April 2014 The ValuePlus Quarterly 15
For more information, please write to sales.value@redingtongulf.com
• Cut threat analysis from days to minutes
• See the issues and where they originated
• Advance your security team to the next level
Defend with confidence.
RSA SECURITY
ANALYTICS
For more information or to place an order on RSA,
please write to sales.value@redingtongulf.com
Smart Video goes mobile
with LifeSize®
UVC ClearSea™
.
Stop settling for inadequate video conferencing.
Packed with powerful collaboration tools,
LifeSize UVC ClearSea allows you to connect
securely with multiple people*
, share documents,
and more – anywhere, on any device. Make the
most of BYOD (Bring Your Own Device) through
a smarter, more collaborative, true-to-life HD
mobile video conferencing experience.
Delivering the Ultimate Communication Experience
www.lifesize.com/mobility
©2013 Logitech. All rights reserved. Information contained in this document is subject to change without notice. LifeSize is the registered trademark or trademark of Logitech.
All other trademarks are the property of their respective owners. *When configured with LifeSize UVC Multipoint.
Don’t compromise.
That’s Smart Video™
.
Make anywhere
your video
conferencing room
For more information or to place an order on LifeSize,
please write to sales.value@redingtongulf.com
Redington Value signs distributor
agreement with Honeywell
Scanning and Mobility
Redington Value is now an authorised Honeywell distributor for Scanning and Mobility solutions in the Middle East.
R
edington Value will work
together with Honeywell
to provide end-users with
value-added scanning and
mobility solutions across a
variety of IT, infrastructure and
commercial projects in the region.
“As a Honeywell Scanning and
Mobility distributor, Redington
Value’s Data Capture/POS Business
Unit (BU) will immediately begin
offering the complete line of
Honeywell Scanning and Mobility
solutions across the Middle
East and Africa to fulfill customer
needs and requirements for
solutions that support supply chain
operations and business processes.
The addition of Honeywell’s proven
supply chain products will give our
channel partners another way to go
after new market segments and
generate even stronger sales and
profits,” said Ramkumar, Senior
Vice-President of Redington Gulf.
“We are excited to partner with
Honeywell and add products that
complement our portfolio.”
“We’re pleased to have
Redington distributing our
products and services in the
region. Redington is a high-value
added distributor with
significant experience in the IT/
AIDC market, delivering
fulfillment services to their
resellers,” said Tony Nasr,
Regional Director, Middle East,
Africa & India Honeywell
Scanning and Mobility.
Honeywell Scanning &
Mobility (HSM) is part of the
Automation and Control
Solutions (ACS) business group
of Honeywell. HSM is a leading
manufacturer of high-
performance image- and laser-
based data collection hardware,
including rugged mobile
computers and bar code
scanners. With one of the
broadest product portfolios in
the automatic identification and
data collection industry, HSM
provides data collection
hardware for retail, healthcare,
and transportation and logistics
companies seeking to improve
operations and enhance
customer service. Additionally,
HSM provides advanced
software, service and
professional solutions that help
customers effectively manage
data and assets. HSM products
are sold worldwide through a
network of distributor and
reseller partners
Highlights | Honeywell
18 The ValuePlus Quarterly April 2014
For more information, please write to sales.value@redingtongulf.com
Secure access and
continuity in a virtualized
and BYOD world
How HP’s solutions can help in implementing affordable solutions for midsize business
T
oday’s IT challenge is
ensuring applications and
data are always available.
Data is the lifeblood of
your business. To compete in
today’s global information
economy, you need to keep your
IT systems up and running and
provide consistent and reliable
access to business-critical
applications at all times.
Application downtime or slow
performance can mean
diminished employee
productivity, dissatisfied
customers, and lost revenue. But
keeping pace with change and
managing growth can be a real
challenge. Increasing numbers of
applications, evolving technology,
and rapid data growth are
pushing older IT infrastructure to
the limit—demanding more
storage and bandwidth, greater
security and agility, and higher
availability than ever before.
HP Just Right IT—technology made
easy for your growing business
HP Just Right IT features
technology products and
solutions—from servers, storage,
and networking, to client devices,
printers, services and support
options—made easy for a growing
business. With HP Just Right IT
technology, you can save time
with single vendor solutions that
streamline the evaluation
process, save money with plug-
and-play products that contain
integration and deployment
costs, boost efficiency by getting
things done faster and easier
with automation and unified
management, and act with
confidence by leveraging proven
IT solutions.
When you’re launching a
business, you need to get the
basics right. HP Just Right IT
features technology products and
solutions made easy so you can
start strong, support worker
mobility, and effectively market
your products and services.
HP Secure Access and Continuity
scenarios and solutions
Here are three scenarios that
many midsize businesses are
grappling with today to keep
data and applications protected
and available.
Keeping staff effective at all times
Midsize businesses depend on
effective, highly-productive staff
to manage the business and
engage customers—from any
place, at any time. The business
need can sound like this: “My
people need to be effective
wherever they are, and with
whatever device they have.” From
the IT side, that means supporting
tablets and smartphones,
ensuring secure, wireless access to
business data stored inside the
firewall, and deploying reliable
systems. The BYOD phenomenon
is fundamentally transforming
the workplace.
That goes for your customers
and partners, too, as they expect
access when on-premise with
you. Opening your internal
network is not an option.
BYOD creates capacity
planning and networking
engineering challenges and
introduces new security and
IN DEPTH | HP
20 The ValuePlus Quarterly April 2014
For more information, please write to sales.value@redingtongulf.com
management requirements. A
comprehensive BYOD strategy
and solution set are critical to
realizing the full potential of
mobility, while maintaining the
security and integrity of your
network and data. A
comprehensive BYOD strategy
should address:
• Onboarding users: Use tools
for bringing new devices and
users onto the network for the
first time—solutions that enable
users to get up and running
quickly and easily, with minimal
IT intervention.
• Ensuring high service quality
and availability: Ensure your
wireless LAN (WLAN) infrastructure
can support increasing numbers of
mobile devices and delay-sensitive
applications, while delivering
predictable connectivity and
service levels.
• Maintaining security and
mitigating risk: Personal devices
and guest users present unique
security challenges. These require
stringent authentication and
authorization controls and
security solutions to protect your
IT systems, prevent data leakage,
safeguard privacy, and ensure
compliance. And systems are
required for revoking access
privileges when employees leave
the company or when mobile
devices are lost or stolen.
• Supporting diverse users
and devices: Maintain visibility
and network access control over
an array of company-issued and
personal devices running various
operating systems and revision
levels. Manage a variety of users
with varying privileges.
Enhancing data access and
application availability
After ensuring secure and reliable
access, a common second step is
to protect data and ensure
applications are always available.
This step often comes during the
“building momentum” stage,
where additional applications are
being deployed to improve
business capability. It can sound
like this: “The number of
applications we have are growing,
as is the amount of data we have.
We need to ensure our data is
always protected and our
applications are always available.”
IT organizations are
expanding the use of server and
client virtualization solutions to
address these requirements.
As you extend the use of
virtualization across the business,
you’ll need to take a fresh look at
storage management and data
protection. A complete strategy
should address:
• Primary storage: Primary
storage requirements differ for
virtualized environments.
Virtualization can lead to an
influx of data. You’ll need a
highly extensible storage solution
that cost-effectively scales to
support rapid data growth. And
to ensure business continuity,
you’ll need a storage architecture
that provides multiple layers of
data availability with flexible
component redundancy, RAID,
and replication options.
• Backup and recovery:
Conventional backup solutions
designed for dedicated server
environments can’t meet the
scalability or performance
requirements that accompany
virtualization. Many require
software agents that can be
complex and expensive to
implement in a virtual
environment; individual backup
agents must be licensed and
installed for each VM. In addition,
traditional agent-based backup
methods place a significant
burden on physical host servers
by consuming CPU cycles and I/O
bandwidth during the backup
process. You can overcome these
limitations with agentless backup
solutions that reduce licensing
costs and minimize host
performance implications.
• Disk-to-disk backup storage:
With the demand for faster,
higher availability backup and
recovery, disk is becoming the
media of choice for primary
backup storage, and the role of
tape is shifting to long-term
archiving. Disk-based systems
address the faster backup and
restore requirements of today’s
virtualized environments, while
tape provides a reliable and cost-
efficient media for archiving data
for months or years.
• Client Virtualization: HP
offers customizable client
virtualization solutions for
midsize businesses, which are
tightly integrated with Citrix
XenDesktop, Citrix VDI-in-a-Box,
Microsoft Windows Server 2012,
and VMware View.
HP simplifies the entire data
protection and retention
environment, from disk to tape,
from data center to remote offices,
all supported by a single vendor.
Business protection and continuity
across multiple sites
As you enter the “business
expansion” phase, you need to
ensure your data is protected and
your applications are always
available throughout your entire
extended business. Yet when it
comes to business continuity,
remote offices and branch offices
are often left out in the cold.
Many distributed enterprises are
islands of technology—with
disjointed management systems,
little or no remote IT resources,
and bandwidth-constrained
connectivity.
With restricted, centralized
management capabilities and
limited on-site support staff, IT
resources usually have to be
dispatched to remote offices to
troubleshoot problems and
restore services—an expensive
and time-consuming proposition.
The problem is often summed
up like this: “We have multiple
sites and distributed data. How
do I efficiently backup and
protect our data?” A
comprehensive remote office/
branch office business continuity
strategy should include:
• Flexible data backup and
recovery solutions: You need
automated backup and recovery
tools that obviate the need for
on-site support staff and
manually intensive backup and
restore procedures. Look for
flexible solutions that support
centralized, distributed, or
hybrid backup approaches so you
can make optimal use of all your
storage resources.
• Unified management systems:
You need unified management
solutions that let you centrally
administer systems and identify,
isolate, and repair problems—
without on-site assistance.
• Comprehensive traffic
management solutions: You need
advanced traffic management
tools that let you prioritize
traffic and work around
bandwidth constraints.
HP offers the industry’s most
comprehensive data protection
portfolio for midsize businesses.
With HP you can roll out
virtualization solutions,
implement BYOD programs, and
take control over remote sites and
distributed IT environments in a
secure and reliable fashion. You
can boost business results and
optimize productivity by
minimizing interruptions,
improve communications and
collaboration by delivering
predictable user experiences across
devices and locations, and mitigate
risks by protecting business-critical
data and maintaining compliance
and governance.
April 2014 The ValuePlus Quarterly 21
For more information, please write to sales.value@redingtongulf.com
Make your
network
cloud-ready
HP Cloud-Ready Data
Center Networking
Solutions
Simplify your migration to the
cloud and drive innovation with a
cloud-enabled data center. It’s never been
HP Cloud-Ready Data Center Networking
Solutions designed to help you:
• Improve business agility
• Reduce costs
• Simplify networking
• Unleash innovation
© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to
change without notice. The only warranties for HP products and services are set forth in the express warranty
statements accompanying such products and services. Nothing herein should be construed as constituting an
additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.
For more information or to place an order on HP,
please write to sales.value@redingtongulf.com
Re-Invent Your Business
With a Next-Generation Firewall
Legacy firewalls classify traffic by network ports and protocols. They were created back
when applications played by the rules. The world has changed. Enterprise 2.0 applications
skip any rules that slow them down or try to block them.
Next-generation firewalls like those offered by Palo Alto Networks™
safely enable
applications regardless of network ports. They continuously track all applications and
also who’s using them—and use this information to return control to the IT department
without slowing down the business. For example, you can:
■ Allow Facebook, but limit to only marketing and sales users.
■ Allow Google Chat, but disable attachments.
■ Allow WebEx, but disable the remote desktop control feature.
■ Allow SharePoint, but scan for threats.
salesturkey@paloaltonetworks.com
For more information or to place an order on Paloalto Networks,
please write to sales.value@redingtongulf.com
4
5
1
6
3
2
Redington value Channel Events
1. VMware Event in Muscat, Oman – Mar 2014
2. Avaya Partner Event in Nairobi, Kenya – Feb 2014
3. HP Networking Partner Event in Nairobi, Kenya - Jan 2014
4. HP Networking Partner Event in Addis Ababa, Ethiopia - Jan 2014
5. HP ESS Event in Jeddah, Saudi Arabia – Jan 2014
6. EMC Partner Event in Abuja, Nigeria – Dec 2013
40G
www.nexans.com/LANsystems info.ncs@nexans.com
LANmark-OF : Competitive Fibre Optic Solutions
Global expert in cables
and cabling systems
Does your fibre system
tick all the boxes?
100G Accelerate business
at the speed of light
LANmark-OF brings the best fibre
technologies together to ensure
maximum reliability and lowest
operational cost.
• Micro-Bundle cables save up to
50% trunk space
• Slimflex cords offer 7,5mm bend
radius saving 30% space in
patching areas
• Pre-terminated assemblies
reduce installation time
• MPO connectivity enables cost
efficient migration to 40/100G
OF brochure40G
www.nexans.com/LANsystems info.ncs@nexans.com
LANmark-OF : Competitive Fibre Optic Solutions
Global expert in cables
and cabling systems
Does your fibre system
tick all the boxes?
100G Accelerate business
at the speed of light
LANmark-OF brings the best fibre
technologies together to ensure
maximum reliability and lowest
operational cost.
• Micro-Bundle cables save up to
50% trunk space
• Slimflex cords offer 7,5mm bend
radius saving 30% space in
patching areas
• Pre-terminated assemblies
reduce installation time
• MPO connectivity enables cost
efficient migration to 40/100G
OF brochure
For more information or to place an order on Nexans,
please write to sales.value@redingtongulf.com
For more information or to place an order on Eaton,
please write to sales.value@redingtongulf.com

More Related Content

What's hot

Value Journal - April-May 2021
Value Journal - April-May 2021 Value Journal - April-May 2021
Value Journal - April-May 2021
Redington Value Distribution
 
Value Plus July Edition - 2015
Value Plus July Edition - 2015Value Plus July Edition - 2015
Value Plus July Edition - 2015
Redington Value Distribution
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Polestar IIoT
 
QuickView #4 - Enterprise Software
QuickView #4 - Enterprise SoftwareQuickView #4 - Enterprise Software
QuickView #4 - Enterprise Software
Sonovate
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
cummins1
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
scharter
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09meyersb1
 
Data Management The Next Level
 Data Management The Next Level Data Management The Next Level
Data Management The Next Level
CTRLS
 
Sariya it 2019
Sariya it 2019Sariya it 2019
Sariya it 2019
Sariya IT
 
E-Magazine September Issue 2021
E-Magazine September Issue 2021E-Magazine September Issue 2021
E-Magazine September Issue 2021
VARINDIA
 
Value journal - August 2021
Value journal - August 2021Value journal - August 2021
Value journal - August 2021
Juned Parvez Attar
 
Are containers the future of it
Are containers the future of itAre containers the future of it
Are containers the future of it
Daniel Chiossi
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
Redington Value Distribution
 
Disaster Recovery Trends In India - Future Outlook
Disaster Recovery Trends In India - Future OutlookDisaster Recovery Trends In India - Future Outlook
Disaster Recovery Trends In India - Future Outlook
CTRLS
 
TELUS_Excerpt_EN_IDC_MarketScape-Canadian_Hybrid_Cloud_Services_2015_Ven
TELUS_Excerpt_EN_IDC_MarketScape-Canadian_Hybrid_Cloud_Services_2015_VenTELUS_Excerpt_EN_IDC_MarketScape-Canadian_Hybrid_Cloud_Services_2015_Ven
TELUS_Excerpt_EN_IDC_MarketScape-Canadian_Hybrid_Cloud_Services_2015_VenJulija Noskova
 
Fusion Cloud Data Centers: a new high tech frontier
Fusion Cloud Data Centers: a new high tech frontierFusion Cloud Data Centers: a new high tech frontier
Fusion Cloud Data Centers: a new high tech frontier
festival ICT 2016
 
The Cloud and RFID
The Cloud and RFID The Cloud and RFID
The Cloud and RFID
Terso Solutions
 
Industry edge communications edition spring 2013
Industry edge communications edition spring 2013Industry edge communications edition spring 2013
Industry edge communications edition spring 2013
Jeff Edlund
 
Case Study: Oil & Gas
Case Study: Oil & GasCase Study: Oil & Gas

What's hot (20)

Value Journal - April-May 2021
Value Journal - April-May 2021 Value Journal - April-May 2021
Value Journal - April-May 2021
 
Value Plus July Edition - 2015
Value Plus July Edition - 2015Value Plus July Edition - 2015
Value Plus July Edition - 2015
 
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case StudyIndustrial Networking Systems Secure Integration | Cisco & Polestar Case Study
Industrial Networking Systems Secure Integration | Cisco & Polestar Case Study
 
SSBS_Brochure_2017
SSBS_Brochure_2017SSBS_Brochure_2017
SSBS_Brochure_2017
 
QuickView #4 - Enterprise Software
QuickView #4 - Enterprise SoftwareQuickView #4 - Enterprise Software
QuickView #4 - Enterprise Software
 
WBS Connect Company Presentation
WBS Connect Company PresentationWBS Connect Company Presentation
WBS Connect Company Presentation
 
New Company Presentation 9 18 09
New Company Presentation 9 18 09New Company Presentation 9 18 09
New Company Presentation 9 18 09
 
Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09Twtelecom Exec Overview3 Q09
Twtelecom Exec Overview3 Q09
 
Data Management The Next Level
 Data Management The Next Level Data Management The Next Level
Data Management The Next Level
 
Sariya it 2019
Sariya it 2019Sariya it 2019
Sariya it 2019
 
E-Magazine September Issue 2021
E-Magazine September Issue 2021E-Magazine September Issue 2021
E-Magazine September Issue 2021
 
Value journal - August 2021
Value journal - August 2021Value journal - August 2021
Value journal - August 2021
 
Are containers the future of it
Are containers the future of itAre containers the future of it
Are containers the future of it
 
Value Journal February 2020
Value Journal February 2020Value Journal February 2020
Value Journal February 2020
 
Disaster Recovery Trends In India - Future Outlook
Disaster Recovery Trends In India - Future OutlookDisaster Recovery Trends In India - Future Outlook
Disaster Recovery Trends In India - Future Outlook
 
TELUS_Excerpt_EN_IDC_MarketScape-Canadian_Hybrid_Cloud_Services_2015_Ven
TELUS_Excerpt_EN_IDC_MarketScape-Canadian_Hybrid_Cloud_Services_2015_VenTELUS_Excerpt_EN_IDC_MarketScape-Canadian_Hybrid_Cloud_Services_2015_Ven
TELUS_Excerpt_EN_IDC_MarketScape-Canadian_Hybrid_Cloud_Services_2015_Ven
 
Fusion Cloud Data Centers: a new high tech frontier
Fusion Cloud Data Centers: a new high tech frontierFusion Cloud Data Centers: a new high tech frontier
Fusion Cloud Data Centers: a new high tech frontier
 
The Cloud and RFID
The Cloud and RFID The Cloud and RFID
The Cloud and RFID
 
Industry edge communications edition spring 2013
Industry edge communications edition spring 2013Industry edge communications edition spring 2013
Industry edge communications edition spring 2013
 
Case Study: Oil & Gas
Case Study: Oil & GasCase Study: Oil & Gas
Case Study: Oil & Gas
 

Viewers also liked

Mobile version of web site or native mobile application what to choose
Mobile version of web site or native mobile application what to chooseMobile version of web site or native mobile application what to choose
Mobile version of web site or native mobile application what to chooseKaterina Selezneva
 
Green Park Residence in Gurgaon For Nature Lovers
Green Park Residence in Gurgaon For Nature LoversGreen Park Residence in Gurgaon For Nature Lovers
Green Park Residence in Gurgaon For Nature Loverssarehomesdeveloper
 
2014 Hardware Based IEEE Projects in VLSI
2014 Hardware Based IEEE Projects in VLSI2014 Hardware Based IEEE Projects in VLSI
2014 Hardware Based IEEE Projects in VLSI
Chinnasamy C
 
IEEE 2014 Dotnet Projects
IEEE 2014 Dotnet ProjectsIEEE 2014 Dotnet Projects
IEEE 2014 Dotnet Projects
Chinnasamy C
 
Food processing.
Food processing.Food processing.
Food processing.
Md.Reaz Mahamud
 

Viewers also liked (6)

Mobile version of web site or native mobile application what to choose
Mobile version of web site or native mobile application what to chooseMobile version of web site or native mobile application what to choose
Mobile version of web site or native mobile application what to choose
 
Android 4.0. Part 1
Android 4.0. Part 1Android 4.0. Part 1
Android 4.0. Part 1
 
Green Park Residence in Gurgaon For Nature Lovers
Green Park Residence in Gurgaon For Nature LoversGreen Park Residence in Gurgaon For Nature Lovers
Green Park Residence in Gurgaon For Nature Lovers
 
2014 Hardware Based IEEE Projects in VLSI
2014 Hardware Based IEEE Projects in VLSI2014 Hardware Based IEEE Projects in VLSI
2014 Hardware Based IEEE Projects in VLSI
 
IEEE 2014 Dotnet Projects
IEEE 2014 Dotnet ProjectsIEEE 2014 Dotnet Projects
IEEE 2014 Dotnet Projects
 
Food processing.
Food processing.Food processing.
Food processing.
 

Similar to Value Plus April014

Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
Redington Value Distribution
 
Redington Value Journal - December 2017
Redington Value Journal - December 2017Redington Value Journal - December 2017
Redington Value Journal - December 2017
Redington Value Distribution
 
Redington Value Journal - June 2016
Redington Value Journal - June 2016Redington Value Journal - June 2016
Redington Value Journal - June 2016
Redington Value Distribution
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson Latin America
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
myehuman
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
Redington Value Distribution
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
Redington Value Distribution
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Hewlett Packard Enterprise Business Value Exchange
 
Redington Value Plus - May 2016
Redington Value Plus - May 2016Redington Value Plus - May 2016
Redington Value Plus - May 2016
Redington Value Distribution
 
Redington Value Journal - July 2018
Redington Value Journal - July 2018Redington Value Journal - July 2018
Redington Value Journal - July 2018
Redington Value Distribution
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the Cloud
Cognizant
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
Rafael Maranon
 
Redington Value Journal - February 2018
Redington Value Journal - February 2018Redington Value Journal - February 2018
Redington Value Journal - February 2018
Redington Value Distribution
 
Cloud Managed Mobility
Cloud Managed MobilityCloud Managed Mobility
Cloud Managed Mobility
Coranet Corp
 
Redington Value Journal - June 2017
Redington Value Journal - June 2017Redington Value Journal - June 2017
Redington Value Journal - June 2017
Redington Value Distribution
 
Tata Comm whitepaper
Tata Comm whitepaperTata Comm whitepaper
Tata Comm whitepaperAbhishek Iyer
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Canada
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
Redington Value Distribution
 
BIg Data Trends in 2016
BIg Data Trends in 2016BIg Data Trends in 2016
BIg Data Trends in 2016
Stig-Arne Kristoffersen
 

Similar to Value Plus April014 (20)

Value Journal - October 2020
Value Journal - October 2020Value Journal - October 2020
Value Journal - October 2020
 
Redington Value Journal - December 2017
Redington Value Journal - December 2017Redington Value Journal - December 2017
Redington Value Journal - December 2017
 
Redington Value Journal - June 2016
Redington Value Journal - June 2016Redington Value Journal - June 2016
Redington Value Journal - June 2016
 
Ericsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-MakersEricsson: Latam Insights - We Enable Change-Makers
Ericsson: Latam Insights - We Enable Change-Makers
 
Abi research over the edge
Abi research over the edgeAbi research over the edge
Abi research over the edge
 
Value Stories - 7th Issue
Value Stories - 7th Issue Value Stories - 7th Issue
Value Stories - 7th Issue
 
Redington Value Journal - March 2017
Redington Value Journal - March 2017Redington Value Journal - March 2017
Redington Value Journal - March 2017
 
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
Cloud Industry Forum Report: Cloud for Business, Why Security is No Longer a ...
 
Redington Value Plus - May 2016
Redington Value Plus - May 2016Redington Value Plus - May 2016
Redington Value Plus - May 2016
 
Investor Presentation
Investor PresentationInvestor Presentation
Investor Presentation
 
Redington Value Journal - July 2018
Redington Value Journal - July 2018Redington Value Journal - July 2018
Redington Value Journal - July 2018
 
Driving Digital Experience through the Cloud
Driving Digital Experience through the CloudDriving Digital Experience through the Cloud
Driving Digital Experience through the Cloud
 
Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)Steps to Scale Internet of Things (IoT)
Steps to Scale Internet of Things (IoT)
 
Redington Value Journal - February 2018
Redington Value Journal - February 2018Redington Value Journal - February 2018
Redington Value Journal - February 2018
 
Cloud Managed Mobility
Cloud Managed MobilityCloud Managed Mobility
Cloud Managed Mobility
 
Redington Value Journal - June 2017
Redington Value Journal - June 2017Redington Value Journal - June 2017
Redington Value Journal - June 2017
 
Tata Comm whitepaper
Tata Comm whitepaperTata Comm whitepaper
Tata Comm whitepaper
 
Cisco Connect Halifax 2018 Cisco dna - network intuitive
Cisco Connect Halifax 2018   Cisco dna - network intuitiveCisco Connect Halifax 2018   Cisco dna - network intuitive
Cisco Connect Halifax 2018 Cisco dna - network intuitive
 
Redington Value Journal - May 2018
Redington Value Journal - May 2018Redington Value Journal - May 2018
Redington Value Journal - May 2018
 
BIg Data Trends in 2016
BIg Data Trends in 2016BIg Data Trends in 2016
BIg Data Trends in 2016
 

Recently uploaded

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
Vlad Stirbu
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 

Recently uploaded (20)

Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 

Value Plus April014

  • 1. valueplusthe q u a r t e r ly EMC: Product Watch HP: Preparing for SDN wave Cisco: Transforming businesses RSA: Game changer Honeywell: Highlights HP: Secure Access & Continuity in virtualized & BYOD 04 06 08 14 18 20 April 2014 presents A special publication from Redington Gulf Value Division Redington Value offers solutions to equip the market in the wake of trends such as BYOD and virtualisation. Seizing opportunities
  • 2. stands the test WANT TO LEARN MORE? CONTACT US ON WWW.HONEYWELLAIDC.COM OR CALL +31 40 7110 041 © 2013 Honeywell International Inc. All rights reserved. For more information or to place an order on Honeywell, please write to sales.value@redingtongulf.com At Honeywell, we believe that the measure of durability over the lifetime of an industrial barcode scanner is the tumble test. The Granit 1910i has been tested to endure 5,000 drops from a height of 1 meter. Drops from this height are most common in industrial use cases making Granit 1910i the industry’s most rugged 2D Area-Imaging Device. For your next 2D industrial scanner, demand nothing less.
  • 3. resolve security risks, creating cyber security strategy and policies and finally regularly reviewing and updating these strategies are the steps to a secure business. This edition of The Value Plus talks about the security issues that come with trends such as BYOD and data centers. We look forward to your feedback and suggestions, and wish you all a great year ahead. Yours sincerely, Raj Shankar, Managing Director, Redington Gulf 04 EMC: Product watch 06 HP: Preparing for SDN wave 08 Cisco: Transforming businesses 14 RSA: Game changer 18 Honeywell: Highlights 20 HP: Secure access & continuity in virtualisation, BYOD 24 Channel events contents04 06 08 14 Dear Partners, S ecurity solutions are no longer an after-thought. Today, organizations are having a tougher time mitigating security breaches, and the average financial impact of each breach is increasing. Security was once under the domain of the IT department but now there is an urgent need for it to be viewed strategically rather than operationally. There are various reasons why this transition needs to happen. Companies have more data as compared to a decade ago and it is now also recorded and stored for analysis. Earlier, the data was confined from the director: in the company’s data center facility but with the rise of hybrid cloud services and organizations leveraging infrastructure as a service, software as a service and security as a service, the data now resides in the cloud too. Employees accessing this information through the explosion of new devices and environment complicates the process further. In such a scenario, regulatory compliance makes it mandatory to ensure security is in place. Companies must prepare to face advanced threats as technology evolves and becomes pervasive. Identifying organizations’ key data asset and potential risk associated with it, engaging with security specialist to Product Watch Preparing for SDN wave Transforming businesses Game changer April 2014 The ValuePlus Quarterly 1 For more information, please write to sales.value@redingtongulf.com
  • 4. For more information or to place an order on Barracuda Networks, please write to sales.value@redingtongulf.com
  • 5. Dear Readers It gives us immense pleasure to announce our partnership with Oracle to offer their solutions for the ME market. This gives us an opportunity to provide our channel with one of the ‘best of breed’ solution sets across the entire stack – from applications to hardware – all from a single company. We, at Redington Value, will focus on the development of the Oracle channel in the Middle East region, driving deeper adoption of Oracle’s technology and application products within the Middle East IT channel. We will offer our partners pricing and deal support for Oracle solutions, as well as support in terms of enablement and demand generation. We will also be responsible for identifying a strategic network of specialist partners for driving deeper adoption of Oracle products within the ISV community in the region. And, we will invest in Oracle Authorized Solution Centers for the benefit of partners and customers across the region. 2014 has begun on a positive note and we expect that this trend will continue during the rest of the year. In the Middle East, majority of the growth is expected to come from the governments in Saudi Arabia, UAE and Qatar. Iraq and Libya will see an overall increase in IT spending as per the recent research reports. In Africa, the IT market is growing despite the limitation in infrastructure. VoIP and Mobility have taken off exponentially across all the countries in the African continent and will provide immense opportunities in this market. Another growing market in Africa for this year is IT security; there is a growing concern among large organizations and government departments to protect their network. Our focus for this year will be to promote technological solutions broadly in the following areas: virtualisation, converged infrastructure, storage and security (with focus on virtualized environments) along with BYOD and cloud computing. In other developments, we have now moved into Angola and are hoping to achieve a strong presence in the region by the end of this year. 2013 saw us making very important partnerships with key vendors such as VMware, Eaton, Honeywell, RSA and the most recent one being, Oracle. For the remaining part of the year, we will be strengthening our partner and customer base for these vendors’ technological solutions. Redington Value Marketing is offering demand generation tools to vendors and partners to grow their end-user customer base. We now conduct many end user workshops to educate the customer base using Redington Value proof of concept centers and generate leads for our partners and vendors. With our existing strong partner intelligence and growing end customer knowledge, we look to provide easier go-to-market strategy not only for vendors but also for our channel partners. Wish you a prosperous quarter ahead. Thanks and best regards, Ramkumar B Senior Vice-president, Redington Gulf Value Division Viewpoint by Ramkumar Bright outlook April 2014 The ValuePlus Quarterly 3 For more information, please write to sales.value@redingtongulf.com
  • 6. Product watch O rganizations of all sizes around the globe are dealing with a deluge of digital content and unstructured data that is driving massive increases in storage needs. As these enterprise datasets continue to expand to unprecedented sizes, data protection has never been more crucial. A new approach is needed to meet the availability, protection and performance requirements of this era of ‘big data’. EMC Isilon enables organizations to linearly scale capacity and performance to over twenty petabytes, 106GB per second and 1.6 million SPECsfs2008 CIFS file operations per second. Moreover, they can do this within a single file system—one which is both simple to manage and highly available and redundant, as we have seen. Built on commodity hardware and powered by the revolutionary OneFS distributed file system, Isilon scale-out NAS solutions deliver key tenets such as unparalleled levels of data protection, no single point of failure, fully distributed single file system, industry leading tolerance for multi-failure scenarios, pro-active failure detection and pre-emptive, fast drive rebuilds, flexible, file- level data protection and fully journalled file system along with extreme transient availability. Isilon scale-out architecture An Isilon cluster is built on a highly redundant and scalable architecture, based upon the hardware premise of shared nothing. The fundamental building blocks are platform nodes, of which there are anywhere from three to one hundred and forty four nodes in a cluster. Each of these platform nodes contain CPU, memory, disk and I/O controllers in an efficient 2U or 4U rack- mountable chassis. Redundant InfiniBand (IB) adapters provide a high speed back-end cluster interconnect—essentially a distributed system bus - and each node houses a fast, battery- backed file system journal device. With the exception of the IB High availability and data protection are the two benefits with EMC Isilon scale-out NAS. 4 The ValuePlus Quarterly April 2014 For more information, please write to sales.value@redingtongulf.com focus | emc
  • 7. “EMC Isilon OneFS takes a holistic approach to ensuring that data is consistent and intact - both within the file system, and when exiting the cluster via a network interface.” controller, journal card and an LCD control front panel, all of a node’s components are standard enterprise commodity hardware. These Isilon nodes contain a variety of storage media types and densities, including SAS and SATA hard disk drives (HDDs), solid-state drives (SSDs), and a configurable quantity of memory. This allows customers to granularly select an appropriate price, performance and protection point to accommodate the requirements of specific workflows or storage tiers. Highly available storage client access is provided via multiple 1 or 10Gb/s Ethernet interface controllers within each node, and across a variety of file- and block- based protocols including NFS and SMB/CIFS. OneFS architectural overview OneFS collapses the traditional elements of the storage stack—data protection, volume manager, file system, etc.— into a single, unified software layer. This allows for a highly extensible file system that affords unparalleled levels of protection and availability. Built atop FreeBSD’s UNIX implementation, availability and resilience are integral to OneFS from the lowest level on up. For example, unlike BSD, OneFS provides mirrored volumes for the root and /var file systems via the Isilon Mirrored Device Driver (IMDD), stored on flash drives. OneFS also automatically saves last known good boot partitions for further resilience. On the network side, the Isilon logical network interface (LNI) framework provides a robust, dynamic abstraction for easily combining and managing differing interfaces, enabling network resilience. Multiple network interfaces can be trunked together with Link Aggregation Control Protocol (LACP) and Link Aggregation and Link Failover (LAGG) to provide bandwidth aggregation in addition to client session failover and general network resilience. Within the cluster, every disk within each node is assigned both a Globally Unique Identifier (GUID) and logical drive number and is subdivided into 32MB cylinder groups comprised of 8KB blocks. Each cylinder group is responsible for tracking, via a bitmap, whether its blocks are used for data, inodes or other metadata constructs. The combination of node number, logical drive number and block offset comprise a block or inode address and fall under the control of the aptly named Block Allocation Manager (BAM). In addition to block and inode allocation, the BAM also handles file layout and locking and abstracts the details of OneFS distributed file system from the kernel and userspace. The BAM never actually touches the disk itself, instead delegating tasks to the local and remote block manager elements respectively on the appropriate nodes. The Remote Block Manager (RBM) is essentially a Remote Procedure Call (RPC) protocol that utilizes the Socket Direct Protocol (SDP) over redundant InfiniBand for reliable, ultra low-latency back- end cluster communication. These RBM messages— everything from cluster heartbeat pings to distributed locking control - are then processed by a node’s Local Block Manager via the Device Worker Thread (DWT) framework code. EMC Isilon OneFS takes a holistic approach to ensuring that data is consistent and intact - both within the file system, and when exiting the cluster via a network interface. Furthermore, the Isilon clustering technology is uncompromisingly designed to simplify the management and protection of multi-petabyte datasets. On the network side, the Isilon logical network interface (LNI) framework provides a robust, dynamic abstraction for easily combining and managing differing interfaces, enabling network resilience. April 2014 The ValuePlus Quarterly 5 For more information, please write to sales.value@redingtongulf.com
  • 8. 6 The ValuePlus Quarterly April 2014 For more information, please write to sales.value@redingtongulf.com Preparing for SDN wave M any enterprises are unable to achieve business innovation because of aging networking environments. Enterprise network design and architectures have remained largely unchanged for more than a decade. While applications and systems have evolved to meet the demands of a world where real- time communications, rich-media, and mobility are the norm, the underlying network infrastructure has not kept pace. A new paradigm in networking, SDN represents an evolution of networking that holds the promise of eliminating legacy human middleware and paves the way for business innovation. With SDN, IT can orchestrate network services and automate control of the network according to high- level policies, rather than low-level network device configurations. By eliminating manual device-by- device configuration, IT resources can be optimized to lower costs and increase competitiveness. The desire for automated and dynamic control over network resources is not new. However, with the emergence of technologies such as OpenFlow, the ability to implement SDN to increase agility has never been simpler. HPisaleaderinenterprise networkingandaspartofits commitmenttodeliverinnovative solutionsithasdevelopedthe HPVirtualApplicationNetworks frameworkfordeliveringSDN solutions.OpenFlowisakeyenabling technologyforthesesolutions. SDN architecture TheSDNarchitecturedepartsfrom legacysolutionsbybuildingnetworks fromthreeabstractionsorlayers. First,theinfrastructurelayer actsasthefoundationforanSDN architecture.Theinfrastructure consistsofbothphysicalandvirtual networkdevicessuchasswitchesand routers.Thesedevicesimplementthe OpenFlowprotocolasastandards- basedmethodofimplementing trafficforwardingrules. Second, the control layer consists of a centralized control plane for the entire network. The control plane is decoupled from the underlying infrastructure to provide a single centralized view of the entire network. The control layer utilizes OpenFlow to communicate with the infrastructure layer. Third, the application layer consists of network services, orchestration tools, and business applications that interact with the control layer. These applications leverage open interfaces to communicate with the control layer and the network state. SDN simplifies campus and data center networks SDN solutions have applicability across many environments from the data center to the enterprise campus. One of the key solutions that SDN can deliver is network virtualization. Network virtualization can be used to support multi-tenancy in large data centers, while individual enterprises retain control. Network virtualization can also be used to span multiple data centers. Many organizations have found that their networks cannot accommodate the demands of server virtualization and workload mobility. Virtualized networks, enabled by OpenFlow, simplify the challenge of moving virtual workloads across data centers. IT managers can define network policies that support the massive amounts of traffic that are moved for workload automation, “Big Data” HP helps build the foundation for SDN with OpenFlow. focus | HP
  • 9. April 2014 The ValuePlus Quarterly 7 For more information, please write to sales.value@redingtongulf.com “As part of HP’s commitment to deliver innovative solutions it has developed the HP Virtual Application Networks framework for delivering SDN solutions.” applications, and business continuity objectives. Network bandwidth can be automatically expanded to meet dynamically changing application and service requirements. Network virtualization can also facilitate IT experimentation on the network. Few organizations want to risk experimenting on a production network. Laboratory test beds are too small to represent real-world networks. Now, IT can use an OpenFlow-enabled network to run more realistic tests in virtualized slices of the network. IT architects can have a practical way to experiment and explore new network technologies and protocols. The ability to virtualize networks creates benefits for organizations from the smallest businesses to the largest enterprises. Virtualized networks, enabled by the OpenFlow protocol, will make it easier for organizations to configure and manage their applications and resources across campus networks. For instance, a retailer can ensure regulatory compliance using virtualized networks to provision payment devices. This helps retailers comply with Payment Card Industry (PCI) security regulations in a way that is simpler and easier than ever before. IT can create virtual networks to handle the real-time demands of video or voice applications, ensuring that users have the quality experience they demand. IT can gain unified control over wireless and wired LANs, making it easier for mobile users to stay seamlessly connected to their applications and services, no matter where they are. SDN enabled by OpenFlow At the foundation of enabling SDN is an emerging open standard called OpenFlow, which ultimately allows the network to be more responsive to business needs. It has been in development since 2007, led by Stanford University and the University of California at Berkeley. It became a standard that is now defined by the Open Networking Foundation (ONF) since 2011. OpenFlow hides the complexity of the individual pieces of network devices. It centralizes the control of those devices in a virtualized manner, simplifying network management for network managers. The OpenFlow protocol uses a standardized instruction set, which means that any OpenFlow controller can send a common set of instructions to any OpenFlow- enabled switch, regardless of vendor. OpenFlow is an open-standards way of virtualizing the network. Network managers can specify different policy rules for different groups of devices and users, which create multiple virtualized networks regardless of the physical network connections. This allows network managers to easily customize and manage these virtualized networks to ensure proper policies such as forwarding path, QoS and security. OpenFlow is designed to be programmable. The OpenFlow instruction set allows network managers to try new ideas or create new protocols to solve problems specific to their organizations’ network needs. This allows network architects to experiment with new services and protocols on a real-world network that cannot be simulated in a test lab—or is too risky to undertake in a production network today. In building SDN-ready network architecture, it is important to prepare the infrastructure layer for standards-based programmability. It is recommended that businesses ensure that all network infrastructure devices support the OpenFlow standard. OpenFlow support will future proof the network for SDN and provide investment protection without requiring a forklift upgrade. When business are ready, they can easily build out an SDN solution on top of the OpenFlow- enabled infrastructure. HP OpenFlow leadership The OpenFlow protocol is emerging from its roots in the research and educationcommunityandexpanding to the enterprise. HP OpenFlow- enabled solutions have been a top choice for academic and commercial researchers. HP demonstrated the first commercial, hardware- based switch implementation of OpenFlow at ACM SIGCOMM in 2008. HP also participated in a public demonstration of OpenFlow at InteropNet Lab in May 2011. HP has been an active contributor to the OpenFlow standards effort and is a founding member of the Open Networking Foundation. HP continues to work closely with partners such as Indiana Center for Network Transactional Research and Education (InCNTRE) to drive research in SDN and enable multivendor interoperability for OpenFlow-enabled solutions. HP is a leader in implementing OpenFlow across its FlexNetwork portfolio with the broadest portfolio support of any tier-1 networking vendor and the largest install base of OpenFlow enabled ports. HP Virtual Application Networks Virtualization has redefined how applications, servers, and storage are deployed, and the same unstoppable force is heading toward the network. Once a brittle bottleneck standing in the way of dynamic IT, the network’s future is one of greater agility, scalability, and security. Now is the time to make that future a reality. HP Virtual Application Network is a complete, end-to-end framework for delivering SDN solutions to enable businesses to create a scalable, agile, and secure network that empowers IT staff and streamline business operations. With Virtual Application Networks, businesses can focus on connecting users to business applications and on the quality of experience—rather than on the details of configuring the network, device by device. Together, HP FlexNetwork architecture and Virtual Application Networks create a unified platform through a programmable end-to- end control plane for dynamic and rapid deployment of applications and services giving the agility businesses need. Virtual Application Networks are built on the tenets of application characterization, network abstraction, and automated orchestration to ensure consistent provisioning of resources to meet the service level expected by users. With Virtual Application Networks you can spend more time connecting users to applications and less time on managing complex infrastructure.
  • 10. B ring Your Own Device (BYOD) has become one of the most influential trends that has or will touch each and every IT organisation. The term has come to define a megatrend occurring in IT that requires sweeping changes to the way devices are used in the workplace. What is BYOD? Does it mean employees pay for their own devices they use for work? Possibly, but the BYOD trend means much more. It is about end users being able to use the compute and communication devices they choose to increase productivity and mobility. These can be devices purchased by the employer, purchased by the employee, or both. BYOD means any device, with any ownership, used anywhere. To understand the challenges BYOD poses, it is helpful to understand the business trends that are driving BYOD adoption. Consumer devices In the last year, the persistence of end-users demanding to leverage their tablet computers and smartphones to extend their productivity, even if they had to purchase the devices themselves, has led many IT departments to adopt less restrictive policies, allowing employees basic connectivity or, increasingly, full access to the IT network and corporate applications. This trend is likely irreversible and every IT organisation will need to quickly adapt to the consumer device phenomenon. Multiple needs and multiple devices There is speculation that in the future a single device will be used for all needs: computing, communications, and applications. However today most believe there will continue to be different devices best suited to Transforming businesses With BYOD becoming the norm rapidly in most organisations, Cisco provides insights into the trend and discusses advantages of the company’s solution. 8 The ValuePlus Quarterly April 2014 For more information, please write to sales.value@redingtongulf.com Highlights | CISCO
  • 11. Start Preparing Your Network Today Networking trends are affecting IT efficiency. Over seven billion enterprise mobile devices are expected by 2015, and video and other rich-media tools are expected to consume more than 90 percent of bandwidth by 2014. IT is being asked to improve efficiency and save money, while still fully supporting these new trends. Cisco® Borderless Networks built with Cisco Catalyst switches can help you reduce implementation and deployment costs, network downtime, and operational expenses. Enable IT to increase operational efficiency and lower total cost of ownership, solving the challenges your staff face in supporting today’s networking trends. Contact us to discuss potential areas for network improvement, review Cisco’s latest offers, and look at our joint professional and technical services that help you take advantage of new investments more quickly and easily. For more information please write to sales.value@redingtongulf.com Get Your Network Ready for Operational Efficiency
  • 12. particular uses. For example, a laptop is not as portable as a smartphone, so people are likely to carry their smartphone for mobile communications. Tablets are powerful devices as well, but it is likely laptops and PCs will still be used for document creation and publishing. This means people will more likely carry and use multiple devices and less likely that a single, all- purpose device will emerge. The impact of this trend is that many more devices will be connected to the network by the same employee or person, often simultaneously, and likely lead to a large increase in overall connected devices. Work and personal overlap Increasingly, work is an activity that people do, not a place to which they go. Extended connectivity through mobile and remote access to the corporate network gives employees tremendous flexibility and increased productivity. It also leads to a blurring of the line between work time and personal time, with employees trading set work schedules for the flexibility of working when and where they want to, often interweaving work and personal tasks. A side effect of this flexibility is that most employees want to be able to use a single smartphone, tablet, or laptop for both work and personal tasks and not also carry around corporate devices. Device ownership is not clear cut. Many employees are willing to use their personal tablet or smartphone, for example, to access work applications. Many employers are considering or have implemented subsidy programs, whereby an employee is provided with money for devices, but it is up to the employee to purchase the devices they want. The effect of this time and device overlap is that corporate and personal data will be increasingly co-mingled on devices, leading to security and privacy issues. Anywhere, anytime mobility It is estimated that mobile devices and the traffic they create on networks will increase by 26X between 2010 and 2015, driven by more powerful smartphones and tablets, with users demanding Internet access and access to applications wherever and whenever they want. Enabling this is an explosive build-out of WiFi networks by employers, 3G and 4G networks by mobile providers, as well as public WiFi by retailers and municipalities. The more employees can easily access work using WiFi and mobile networks, the more widespread these networks will become, thereby further enabling access. The end result is pervasive connectivity anywhere and anytime, which means corporate networks will have more devices connected more frequently, leading to an even broader need for the 24/7 availability of applications. CHALLENGES FOR IT ORGANISATIONS Adopting BYOD comes with a set of challenges for the IT organisation . Many of the benefits of BYOD, such as having the choice of any device and anywhere, anytime access, are somewhat antithetical to traditional IT requirements for security and support. Providing device choice and support Traditionally, IT pre-determined a list of approved workplace devices, typically a standardized desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list. With BYOD, IT must approach the problem differently. Devices are evolving so rapidly that it is impractical to pre-approve each and every device brand and form- factor. It is also somewhat impractical to expect IT organisation s to have the same level of support for each and every device that employees may bring to the workplace. Hence most IT organisation s have to establish, at a macro level, what types of devices they will permit to access the network, perhaps excluding a category or brand due to unacceptable security readiness or other factors. Support must also be considered, such as adopting more IT-assisted and self-support models. Maintaining secure access to the corporate network Device choice does not mean sacrificing security. IT must establish the minimum security baseline that any device must meet to be used on the corporate “On-boarding of new devices should be simple and, ideally, self-service with minimal IT intervention, especially for employee bought devices.” 10 The ValuePlus Quarterly April 2014 For more information, please write to sales.value@redingtongulf.com Highlights | CISCO
  • 13. network, including WiFi security, VPN access, and perhaps add-on software to protect against malware. In addition, due to the wide range of devices, it is critical to be able to identify each device connecting to the network and authenticate both the device and the person using it. On-boarding of new devices Most BYOD implementations will have a wide-range of devices including desktop PCs, laptops, netbooks, smartphones, tablets, e-readers, and collaboration devices. It is likely some devices will be corporate owned and managed, while other devices may be employee purchased and self-supported. On-boarding of new devices— bringing a new device onto the network for the first time— should be simple and, ideally, self-service with minimal IT intervention, especially for employee bought devices. IT also needs the ability to push updates to on-boarded devices as required. Ideally on-boarding should be clientless, meaning no pre- installed software is required. This has an added benefit: if a self-service on-boarding model is successfully implemented, it can be easily extended to provide access to guests as well. Enforcing company usage policies Businesses have a wide range of policies they need to implement, depending upon their industry and its regulations and the company’s own explicit policies. Adoption of BYOD must provide a way to enforce policies, which can be more challenging on consumer devices like tablets and smartphones. Another complication results from the mixing of personal and work tasks on the same device. Smartphones are likely used for business and personal calls and tablets have both personal and business applications installed. Access to the Internet, peer-to- peer file sharing, and application use may be subject to different policies when a user is on their personal time and network and when they are accessing the corporate network during work hours KEY ADVANTAGES OF THE CISCO BYOD SOLUTION The Cisco BYOD solution integrates the Cisco products, third-party products, and other devices into a comprehensive BYOD approach, which is tightly integrated across the network infrastructure. This offers a unique set of advantages over other solutions. Secure access for any device Through a combination of X.509 digital certificates, two-factor authentication, Cisco AnyConnect client, and 802.1x, a wide variety of devices can be supported with secure access to the network. Self-service on-boarding The integrated approach allows for devices to be self-enrolled the first time they connect to the network. Each device is fingerprinted so it can be identified upon returning for subsequent network access attempts. Centralised enforcement of company usage policies Cisco Identity Services Engine (ISE) provides a centralised single source of policy across the organisation that can be enforced across different network access types. Differentiated access and services The Cisco BYOD solution provides a means to identify devices and users and provides differentiated services based on custom policy options. For example, employees using corporate-owned and managed devices can be treated differently than employees using their own unmanaged devices at work. Similarly, contract employees, partners, guests, customers, students, and other classifications that are important to the business or entity can be identified and treated according to the business policies, restricting access to only the set of services and access to which they are entitled. High performance and reliable wireless LAN The Cisco BYOD solution includes industry leading WLAN technologies to enable the best possible performance and reliability for wireless clients. Technologies including Cisco CleanAir, ClientLink, and 4x4 antenna design fundamentally improve RF performance. Secure Fast Roaming, VideoStream, and Wireless QoS improve application experience. No other industry solution offers the depth and breadth of the Cisco WLAN product family. Unified approach for wired, wireless, remote, and mobile access The Cisco BYOD solution strategy is to provide a common approach anywhere devices connect to the network, including wired, WiFi, public WiFi, and 3G/4G mobile and also regardless of whether the connectivity occurs in the main campus, branch office, home office, or mobile Teleworker location. Unified experience for end users The unified approach across network access types and locations, as well as the use of the Cisco AnyConnect client, provides a unified experience for users, which is consistent whether they are connecting at the corporate office over WiFi or remotely over 3G/4G mobile providers. Unified visibility and device management Cisco ISE and Cisco Prime provide a single source and visibility for users and devices, simplifying troubleshooting and auditing. “Cisco BYOD solution integrates the Cisco products, third-party products, and other devices into a comprehensive BYOD approach, which is tightly integrated across the network infrastructure.” April 2014 The ValuePlus Quarterly 11 For more information, please write to sales.value@redingtongulf.com
  • 14.
  • 15. Coming together today, to create better opportunities for tomorrow Redington Value is now an authorized distributor for Oracle in the Middle East. Oracle is the leading provider of the most complete, open, and integrated business software and hardware systems. Redington, with its diverse reach and excellent strength across the region, will now offer the entire stack of Oracle products and value added support services including pre sales, credit, local billing and concept centers spread across its locations in the Middle East. To place an order, please write to sales.oracle@redingtongulf.com or call 971 55 2286236 For mo please
  • 16. Game changer Ahmed El Sabbagh, Regional Distribution Manager - Turkey, Emerging Africa & Middle East, RSA on the changing threat landscape and how this affects the channel. W hat has been the business focus for RSA? It’s not surprisingly, that many leading organizations find it extremely difficult, without spending prohibitively large sums of money, to answer key challenges, such as Am I secure? Am I compliant? Where do I have gaps? How do I prioritize? Can I do this affordably? Am I aligned to the business? Accompanying our customers as a trusted advisor through their security journey to ensure that intrusion and compromise do not result in business damage or loss for them and assuring they have definite answers to these questions has been always our business focus and priority from which our research and development teams are always working on adopting a more intelligence-driven approach to help our customers increase their security maturity level taking into consideration their ongoing business transformation and the advanced threat landscape and evolution. What’s important for RSA is not only where our customers are today, but what steps are we taking to improve their security practice and take them to the next level within their security maturity journey. How has the perception of security solutions changed over the years? Just a few years ago, a typical scenario might have been remote access offered to a limited set of employees, using a laptop that was provided by the company, over a VPN connection that allowed access to a limited set of key internal applications like email and sales force automation. Now, we have almost our entire workforce, using their own tablets and smartphones for business purposes, accessing applications that live in the cloud, over untrusted wireless networks and the internet. We used to describe the disappearing perimeter as a security concern – today we have almost no boundaries or a perimeter that has effectively been turned inside-out. And the expectations for securing this environment are the same or more strict. On top of that, the threat landscape and attacker tactics have fundamentally changed, resulting in adversaries that are more formidable than ever before, and who can’t be stopped effectively using yesterday’s tools and methods. It’s not just that they are more sophisticated, but attack methods have fundamentally changed. First they are targeted, with a specific objective. Previously, we may have seen threats such as mass malware that can infect PCs or random attacks on unnecessary services running on external- facing servers. Advanced threats typically use custom malware that targets an individual or group of employees at a specific organization. The attackers are seeking specific information – intellectual property or confidential documents. And their entry point to the organization is the compromise of an individual user’s credentials that they can use to establish an non-suspicious initial foothold in their target organization. Second, once their initial intrusion is successful, advanced attackers are much more stealthy. IN DEPTH | RSA 14 The ValuePlus Quarterly April 2014 For more information, please write to sales.value@redingtongulf.com
  • 17. RSA | IN DEPTH Unlike a “smash and grab” password theft or website defacement, advanced attackers seek to remain hidden inside the organization, establishing multiple footholds in case their initial access is shut down, and keeping suspicious activity that might alert security operations teams to a minimum as they seek their target. They cover their tracks by erasing logs and other evidence of their activity. We need to acknowledge that a model that defends a static perimeter and static infrastructure, that relies on fixed controls based on signatures derived from knowledge of prior attacks, will be increasingly ineffective in maintaining trust in our IT systems and digital businesses. Against these fundamentally different and advanced attacks, we need a fundamentally different response. We need to spend less time trying to keep attackers out, but focus instead on accelerating our ability to detect and respond to intrusions, and reducing the amount of time they are in the network. In response to all of this, RSA Intelligence Driven Security Approach focus on people, identities, and their behavior, the flow of data and transactions to ensure that intrusion and compromise do not result in business damage or loss for our customers. What is RSA’s market differentiator? The security market is obviously one that RSA has been in for some time. In fact, it is one that we pioneered with the invention of the public key cryptography 25 years ago. A capability which is now deployed in over a billion applications worldwide and is the foundation of network and internet security. Our solution set is made up of leading, best of breed products and we have obviously long been recognized as the market leader in one-time password authentication with the broadest set of authentication options available. But now our solution set includes leading solutions in Data Loss Prevention, Web Fraud Prevention, Security Information and Event Management, Network Analysis & Forensics as well as Governance, Risk and Compliance where Gartner considers us to be in the ‘leaders’ quadrant in all categories. And because of this breadth of capability, we are also ‘complete’. Not because we provide solutions in every aspect of security but because no other company shares our strategy of integrating these products so that they work together and with third-party products and solutions – allowing our customers to build a business holistic approach to security, risk and compliance. Another dimension that makes us ‘complete’ is the out-of- the-box expertise about regulations, threats and best practices built-in to our solutions, saving customers significant time and resources. Expertise created by teams of experts, shared across our customers. Also being the security division of the giant EMC gives us financial strength that has and continues to enable us to make strategic acquisitions and investments that add tremendous value to our customers. As such our solution portfolio and offerings has been exponentially expanded over the last few years. EMC also has strong corporate partnerships with the likes of Cisco, Microsoft, and, of course, VMware, which gives us better opportunity to work more closely with these technology partners to ensure that security, visibility and control is built into their IT infrastructure – both physical and virtual. Finally, a strong security pedigree and one where our primary go to-market model is via partners, again something that we have done for the last 25 years. I believe that all this puts RSA in a unique position to deliver an integrated and holistic security solution which lowers the overall cost of safeguarding an organization while handling advanced persistent threats. What does this mean for the channel? The threat landscape and attacking community has changed. Advanced persistent threats are the norm, data and information levels are exploding and we are being put under ever more legislative and regulatory pressure and it’s not surprising that security is now a big issue for most CIOs and the security market for both products and supporting services is vast and growing rapidly however different organizations depending on their characteristics, exhibit different security postures from Threat Defense based companies who do ‘just enough’ through to Business Risk oriented businesses that want to sow security into the fabric of their organization, and therefore have different needs. RSA early realized that and translates it into opportunities for our channel by leveraging our leading, complete and integrated security solutions that play a part at every stage of the market maturity model whatever your target market and its security posture which leads to potential new clients and increase account penetration with a richer set of solutions, services and consultancy leading to increased revenue and more business to the channel. In this fast growing region, I have noticed that a lot of VARs want to be everything to everybody, then you’re a commodity and you’re not any different than ‘that guy’ down the street. We give our channel the opportunity to be unique and focused through the RSA “SecurWorld” program which reflect RSA’s broader solution portfolio and the different needs of partners taking different products to market. As a result partners can specialize in certain areas and our channel education framework “SecurAcademy” has been specifically designed to support the needs of all partners that is role based and more solution-centric. Finally, we are always looking to align our channel, depending on their skills, characteristics and aspirations, with our solutions and the end user market where their capabilities can be best deployed and there is always an opportunity to partner with RSA across the complete security spectrum whatever the stance of their business or target market. Ahmed El Sabbagh, Regional Distribution Manager - Turkey, Emerging Africa & Middle East, RSA April 2014 The ValuePlus Quarterly 15 For more information, please write to sales.value@redingtongulf.com
  • 18. • Cut threat analysis from days to minutes • See the issues and where they originated • Advance your security team to the next level Defend with confidence. RSA SECURITY ANALYTICS For more information or to place an order on RSA, please write to sales.value@redingtongulf.com
  • 19. Smart Video goes mobile with LifeSize® UVC ClearSea™ . Stop settling for inadequate video conferencing. Packed with powerful collaboration tools, LifeSize UVC ClearSea allows you to connect securely with multiple people* , share documents, and more – anywhere, on any device. Make the most of BYOD (Bring Your Own Device) through a smarter, more collaborative, true-to-life HD mobile video conferencing experience. Delivering the Ultimate Communication Experience www.lifesize.com/mobility ©2013 Logitech. All rights reserved. Information contained in this document is subject to change without notice. LifeSize is the registered trademark or trademark of Logitech. All other trademarks are the property of their respective owners. *When configured with LifeSize UVC Multipoint. Don’t compromise. That’s Smart Video™ . Make anywhere your video conferencing room For more information or to place an order on LifeSize, please write to sales.value@redingtongulf.com
  • 20. Redington Value signs distributor agreement with Honeywell Scanning and Mobility Redington Value is now an authorised Honeywell distributor for Scanning and Mobility solutions in the Middle East. R edington Value will work together with Honeywell to provide end-users with value-added scanning and mobility solutions across a variety of IT, infrastructure and commercial projects in the region. “As a Honeywell Scanning and Mobility distributor, Redington Value’s Data Capture/POS Business Unit (BU) will immediately begin offering the complete line of Honeywell Scanning and Mobility solutions across the Middle East and Africa to fulfill customer needs and requirements for solutions that support supply chain operations and business processes. The addition of Honeywell’s proven supply chain products will give our channel partners another way to go after new market segments and generate even stronger sales and profits,” said Ramkumar, Senior Vice-President of Redington Gulf. “We are excited to partner with Honeywell and add products that complement our portfolio.” “We’re pleased to have Redington distributing our products and services in the region. Redington is a high-value added distributor with significant experience in the IT/ AIDC market, delivering fulfillment services to their resellers,” said Tony Nasr, Regional Director, Middle East, Africa & India Honeywell Scanning and Mobility. Honeywell Scanning & Mobility (HSM) is part of the Automation and Control Solutions (ACS) business group of Honeywell. HSM is a leading manufacturer of high- performance image- and laser- based data collection hardware, including rugged mobile computers and bar code scanners. With one of the broadest product portfolios in the automatic identification and data collection industry, HSM provides data collection hardware for retail, healthcare, and transportation and logistics companies seeking to improve operations and enhance customer service. Additionally, HSM provides advanced software, service and professional solutions that help customers effectively manage data and assets. HSM products are sold worldwide through a network of distributor and reseller partners Highlights | Honeywell 18 The ValuePlus Quarterly April 2014 For more information, please write to sales.value@redingtongulf.com
  • 21.
  • 22. Secure access and continuity in a virtualized and BYOD world How HP’s solutions can help in implementing affordable solutions for midsize business T oday’s IT challenge is ensuring applications and data are always available. Data is the lifeblood of your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more storage and bandwidth, greater security and agility, and higher availability than ever before. HP Just Right IT—technology made easy for your growing business HP Just Right IT features technology products and solutions—from servers, storage, and networking, to client devices, printers, services and support options—made easy for a growing business. With HP Just Right IT technology, you can save time with single vendor solutions that streamline the evaluation process, save money with plug- and-play products that contain integration and deployment costs, boost efficiency by getting things done faster and easier with automation and unified management, and act with confidence by leveraging proven IT solutions. When you’re launching a business, you need to get the basics right. HP Just Right IT features technology products and solutions made easy so you can start strong, support worker mobility, and effectively market your products and services. HP Secure Access and Continuity scenarios and solutions Here are three scenarios that many midsize businesses are grappling with today to keep data and applications protected and available. Keeping staff effective at all times Midsize businesses depend on effective, highly-productive staff to manage the business and engage customers—from any place, at any time. The business need can sound like this: “My people need to be effective wherever they are, and with whatever device they have.” From the IT side, that means supporting tablets and smartphones, ensuring secure, wireless access to business data stored inside the firewall, and deploying reliable systems. The BYOD phenomenon is fundamentally transforming the workplace. That goes for your customers and partners, too, as they expect access when on-premise with you. Opening your internal network is not an option. BYOD creates capacity planning and networking engineering challenges and introduces new security and IN DEPTH | HP 20 The ValuePlus Quarterly April 2014 For more information, please write to sales.value@redingtongulf.com
  • 23. management requirements. A comprehensive BYOD strategy and solution set are critical to realizing the full potential of mobility, while maintaining the security and integrity of your network and data. A comprehensive BYOD strategy should address: • Onboarding users: Use tools for bringing new devices and users onto the network for the first time—solutions that enable users to get up and running quickly and easily, with minimal IT intervention. • Ensuring high service quality and availability: Ensure your wireless LAN (WLAN) infrastructure can support increasing numbers of mobile devices and delay-sensitive applications, while delivering predictable connectivity and service levels. • Maintaining security and mitigating risk: Personal devices and guest users present unique security challenges. These require stringent authentication and authorization controls and security solutions to protect your IT systems, prevent data leakage, safeguard privacy, and ensure compliance. And systems are required for revoking access privileges when employees leave the company or when mobile devices are lost or stolen. • Supporting diverse users and devices: Maintain visibility and network access control over an array of company-issued and personal devices running various operating systems and revision levels. Manage a variety of users with varying privileges. Enhancing data access and application availability After ensuring secure and reliable access, a common second step is to protect data and ensure applications are always available. This step often comes during the “building momentum” stage, where additional applications are being deployed to improve business capability. It can sound like this: “The number of applications we have are growing, as is the amount of data we have. We need to ensure our data is always protected and our applications are always available.” IT organizations are expanding the use of server and client virtualization solutions to address these requirements. As you extend the use of virtualization across the business, you’ll need to take a fresh look at storage management and data protection. A complete strategy should address: • Primary storage: Primary storage requirements differ for virtualized environments. Virtualization can lead to an influx of data. You’ll need a highly extensible storage solution that cost-effectively scales to support rapid data growth. And to ensure business continuity, you’ll need a storage architecture that provides multiple layers of data availability with flexible component redundancy, RAID, and replication options. • Backup and recovery: Conventional backup solutions designed for dedicated server environments can’t meet the scalability or performance requirements that accompany virtualization. Many require software agents that can be complex and expensive to implement in a virtual environment; individual backup agents must be licensed and installed for each VM. In addition, traditional agent-based backup methods place a significant burden on physical host servers by consuming CPU cycles and I/O bandwidth during the backup process. You can overcome these limitations with agentless backup solutions that reduce licensing costs and minimize host performance implications. • Disk-to-disk backup storage: With the demand for faster, higher availability backup and recovery, disk is becoming the media of choice for primary backup storage, and the role of tape is shifting to long-term archiving. Disk-based systems address the faster backup and restore requirements of today’s virtualized environments, while tape provides a reliable and cost- efficient media for archiving data for months or years. • Client Virtualization: HP offers customizable client virtualization solutions for midsize businesses, which are tightly integrated with Citrix XenDesktop, Citrix VDI-in-a-Box, Microsoft Windows Server 2012, and VMware View. HP simplifies the entire data protection and retention environment, from disk to tape, from data center to remote offices, all supported by a single vendor. Business protection and continuity across multiple sites As you enter the “business expansion” phase, you need to ensure your data is protected and your applications are always available throughout your entire extended business. Yet when it comes to business continuity, remote offices and branch offices are often left out in the cold. Many distributed enterprises are islands of technology—with disjointed management systems, little or no remote IT resources, and bandwidth-constrained connectivity. With restricted, centralized management capabilities and limited on-site support staff, IT resources usually have to be dispatched to remote offices to troubleshoot problems and restore services—an expensive and time-consuming proposition. The problem is often summed up like this: “We have multiple sites and distributed data. How do I efficiently backup and protect our data?” A comprehensive remote office/ branch office business continuity strategy should include: • Flexible data backup and recovery solutions: You need automated backup and recovery tools that obviate the need for on-site support staff and manually intensive backup and restore procedures. Look for flexible solutions that support centralized, distributed, or hybrid backup approaches so you can make optimal use of all your storage resources. • Unified management systems: You need unified management solutions that let you centrally administer systems and identify, isolate, and repair problems— without on-site assistance. • Comprehensive traffic management solutions: You need advanced traffic management tools that let you prioritize traffic and work around bandwidth constraints. HP offers the industry’s most comprehensive data protection portfolio for midsize businesses. With HP you can roll out virtualization solutions, implement BYOD programs, and take control over remote sites and distributed IT environments in a secure and reliable fashion. You can boost business results and optimize productivity by minimizing interruptions, improve communications and collaboration by delivering predictable user experiences across devices and locations, and mitigate risks by protecting business-critical data and maintaining compliance and governance. April 2014 The ValuePlus Quarterly 21 For more information, please write to sales.value@redingtongulf.com
  • 24. Make your network cloud-ready HP Cloud-Ready Data Center Networking Solutions Simplify your migration to the cloud and drive innovation with a cloud-enabled data center. It’s never been HP Cloud-Ready Data Center Networking Solutions designed to help you: • Improve business agility • Reduce costs • Simplify networking • Unleash innovation © Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein. For more information or to place an order on HP, please write to sales.value@redingtongulf.com
  • 25. Re-Invent Your Business With a Next-Generation Firewall Legacy firewalls classify traffic by network ports and protocols. They were created back when applications played by the rules. The world has changed. Enterprise 2.0 applications skip any rules that slow them down or try to block them. Next-generation firewalls like those offered by Palo Alto Networks™ safely enable applications regardless of network ports. They continuously track all applications and also who’s using them—and use this information to return control to the IT department without slowing down the business. For example, you can: ■ Allow Facebook, but limit to only marketing and sales users. ■ Allow Google Chat, but disable attachments. ■ Allow WebEx, but disable the remote desktop control feature. ■ Allow SharePoint, but scan for threats. salesturkey@paloaltonetworks.com For more information or to place an order on Paloalto Networks, please write to sales.value@redingtongulf.com
  • 26. 4 5 1 6 3 2 Redington value Channel Events 1. VMware Event in Muscat, Oman – Mar 2014 2. Avaya Partner Event in Nairobi, Kenya – Feb 2014 3. HP Networking Partner Event in Nairobi, Kenya - Jan 2014 4. HP Networking Partner Event in Addis Ababa, Ethiopia - Jan 2014 5. HP ESS Event in Jeddah, Saudi Arabia – Jan 2014 6. EMC Partner Event in Abuja, Nigeria – Dec 2013
  • 27. 40G www.nexans.com/LANsystems info.ncs@nexans.com LANmark-OF : Competitive Fibre Optic Solutions Global expert in cables and cabling systems Does your fibre system tick all the boxes? 100G Accelerate business at the speed of light LANmark-OF brings the best fibre technologies together to ensure maximum reliability and lowest operational cost. • Micro-Bundle cables save up to 50% trunk space • Slimflex cords offer 7,5mm bend radius saving 30% space in patching areas • Pre-terminated assemblies reduce installation time • MPO connectivity enables cost efficient migration to 40/100G OF brochure40G www.nexans.com/LANsystems info.ncs@nexans.com LANmark-OF : Competitive Fibre Optic Solutions Global expert in cables and cabling systems Does your fibre system tick all the boxes? 100G Accelerate business at the speed of light LANmark-OF brings the best fibre technologies together to ensure maximum reliability and lowest operational cost. • Micro-Bundle cables save up to 50% trunk space • Slimflex cords offer 7,5mm bend radius saving 30% space in patching areas • Pre-terminated assemblies reduce installation time • MPO connectivity enables cost efficient migration to 40/100G OF brochure For more information or to place an order on Nexans, please write to sales.value@redingtongulf.com
  • 28. For more information or to place an order on Eaton, please write to sales.value@redingtongulf.com