integratorme jan2015

36

Upload: jns-media-international-mfze

Post on 07-Apr-2016

237 views

Category:

Documents


5 download

DESCRIPTION

 

TRANSCRIPT

Page 1: Integratorme jan2015
Page 2: Integratorme jan2015

Axis Communications’ AcademyBuilding your strengths in network video

Axis Communications’ Academy - the global learning center for network video

Your customers and your success depend on you having the most up-to-date, comprehen-sive knowledge in the industry. Axis Commu-nications’ Academy makes it easy to stay one step ahead — putting network video know-ledge right at your fingertips.

The Academy gives you a wealth of information to help you build your strengths through every part of your chain — from interactive system design tools, practical “how-to” guides and

specialized webinars to registration for class-room-based training and certification. And it’s available anytime, anywhere, in your language from Axis’ own highly-trained Academy staff.

When your knowledge source is the company that invented network video and continually sets the standard for innovation in the industry, rest assured customers will recognize your expertise — driving more business to your door.

Get the Axis picture. Stay one step ahead.Visit www.axis.com/academy

axis_ad_acad_build_vendors-resellers_210x275_en_1304.indd 1 16/04/2013 1:00:26 PM

Page 3: Integratorme jan2015

Contents

R. NarayanManaging Editor

Disclaimer: While the publishers have made every attempt possibleto get accurate information on published content in this handbookthey cannot be held liable for any errors herein.

Editorial

Founder & CEO: Vivek Sharma Managing Editor: R. NarayanArt Director: Faiz Ahmed Sales Director: Alishan ZaidiSr. Sales Manager: R. Subramanyan Sales Coordinator: Smitha Jithesh

The year 2015 will play out as a continuum of trends that

have been gathering speed. The fact is that the channel

is now more familiar with the disruptive Technologies that

have challenged their go to market strategies over the past

few years. So even as more disruptors including IoT, come

into play, the channel can look forward to enlarging the

scope of their opportunities.

As technologies change and changes as drastically as

has played out over the past half a decade or so, the go

to market approaches have also been changing. But the

channel’s relevance is perhaps becoming more clarified,

rather than being diminished. As connectivity and security

become paramount objectives as well as concerns of

Businesses, government entities and individuals, the

solutions that come to be deployed will entail a lot of

integration. Emerging areas like IoT coupled with data

analytics, smart home automation, edge computing etc for

instance will entail deployment services from the channel, in

many cases as end to end execution.

Rhetorical it does sound but the channel does need to

continue to invest in certification and education, in some

case recruiting whole new teams with the right skillsets to

tap into the new paradigm of opportunities. For channel

companies, the key is about steering adroitly into emerging

areas while holding their own in already established

domains. It will also require them to take bold decisions of

exiting areas where the opportunities are relatively slowing

down, for it would be necessary to pick enough areas of

focus and perhaps leave some out, if it is challenging to do

justice to all of them.

A continuum of paradigm shifts

Cover Story - 18

2015 outlook: A mix of new trends and consolidationThe year will likely see continued consolidation of the major trends that have been holding the industry’s interest

News in Detail

AV solutions from ATEN in focus - 11

VMware Study: Four weeks to get employees Mobile-Ready - 12

Feature - 16

The great shiftNext-generation security solutions from Cisco deliver protection across the entire attack continuum

TechKnow

Safe measures - 22Fabrizio Croce, Area Director, SEMEA at Watchguard Technologies discusses the trends and the company’s focus

Ever watchful - 24 Andrey Sokurenko, Business Development Director, Infowatch discusses the company’s focus areas in DLP

Point2Point

Cautious outlook - 13 Ajay Singh Chauhan, CEO of ComGuard discusses the company's plans for focusing on datacenter segment

Steel wheels - 15Elie Dib, Head of Channels for METNA region at Riverbed Technology discusses the company’s channel focus

The large picture - 26 Abdul Rauf Chougle, Group General Manager discusses the company’s growth and focus

Insight

Long live the network! - 28Stuart Bailey, founder and CTO, Infoblox discusses how we can no longer rely on the traditional model for answers

Top 5 data centre trends to watch - 30What does 2015 hold in store for data centre professionals? Read on as Dimension Data experts discuss the top trends

Regulars

News BytesEyetechStats & trends

Published by: JNS Media International MFZEP.O. Box: 121075, Montana Building 404, Zabeel Road,Near GPO, Karama, Dubai-UAE - Tel: 04-3705022 Fax: 04-3706639

Page 4: Integratorme jan2015

4 | January 2015

News Bytes

Global Distribution FZE has signed a Distribution Agreement with MOBOTIX AG, a leading European provider of high-resolution digital, network-based video security systems. The new Distribution Agreement announcement marks Global’s entry into the emerging Physical Security Market.

With Governments across the MENA, and specifically GCC region, enforcing to comply with established Laws that regulate the “General Requirements and Technical Specifications of Security Systems”, the market is expected to further grow this year.

“The MOBOTIX decentralized concept is the first to make the recording of high resolution video streams practical and cost efficient. Embassies, airports, train stations, ports, gas stations, hotels, highways – MOBOTIX video systems are in use worldwide today,” said Phillip Antoniou, Business Development Manager, Middle East & Africa at MOBOTIX AG. “We are pleased to have Global to support us in the Region and expand our footprint, as Global has a great reputation in regional Channel Development and Enablement.”

“Global” inks distribution tie-up with MOBOTIX

Ingram Micro has acquired a majority interest in Armada,

the largest value-added technology distributor in Turkey

with 2013 sales of over $280 million. Ingram Micro plans

to make a mandatory tender offer for the remaining

shares in accordance with Turkish capital markets

regulations.

“The addition of Armada is well aligned with our

strategic initiatives to grow Ingram Micro’svalue business

in attractive markets,” said Ali Baghdadi, Ingram Micro

senior vice president and president, Middle East, Turkey

and Africa, Technology Solutions. “Armada enhances our

access and reach into Turkey’s fast growing technology industry while increasing the

overall scale and breadth of value-added solutions Ingram Micro brings to our global

partners.”

Established in 1993, Armada offers robust enterprise solutions portfolio and

channel development experience in the SMB market, credit services, training and other

professional offering. Armada has experienced management team, collaborative culture,

and long-lasting customer and vendor relationships.

Veeam Software wrapped up its channel activities

in 2014 with impressive third quarter results in the

Middle East, including triple-digit percentage growth in

the UAE. Veeam’s Q3 2014 results for the Middle East

region demonstrated a year-on-year revenue rise of

158%, when compared with the same period last year.

Meanwhile, revenues for the UAE rose by 118% over the

same period. During the quarter, the company acquired

approximately 10,000 new customers, with total paid

customers now surpassing 121,500. The number of new

enterprise customers grew 108% year-over-year, and

revenue from enterprise customers grew 140% over the same period. The latest results

mark the twenty-seventh consecutive quarter in which the company saw total revenue

bookings hit double-digit percentage growth.

“2014 has been a great year for Veeam in the UAE channel. In fact, through the

course of this year, we have forged partnerships that have really strengthened our

position in the GCC as a whole – we currently have over 900 clients in the Middle East,

and are confident this figure will increase over 2015,” said Gregg Petersen, Regional

Director, Middle East and SAARC, Veeam Software. He added, “Currently, the UAE is

leading Veeam’s growth in the Middle East region, representing about 33% of its

revenue.”

Earlier in September last year, Veeam had announced new technical training and

certification programmes for its reseller pro-partners and end-users in the Middle East, a

move that opened up new revenue streams for Veeam’s channel partners.

Ingram acquires Turkey’s leading VAD

Veeam reports a successful 2014

Page 5: Integratorme jan2015
Page 6: Integratorme jan2015

6 | January 2015

News Bytes

Prologix Distribution has signed the Authorized Distributorship Agreement with Tramigo, the world leader in tracking products which is headquartered in Finland and has operations worldwide. The company is a pioneer in the field of vehicle and fleet management software and hold the reputation of creating first global consumer brand in tracking products.

Tramigo vehicle tracking device combines the GPS (Global Positioning System), GSM (mobile network) and geographical information (TLD Tramigo Landmark Data) into one device. Tramigo uses GPS satellites in positioning itself in very accurate standing, after which it finds the closest and well known landmark to that point from its internal memory and sends the information across to any authorized mobile phone as a text message using the GSM network. The actual location of your Tramigo tracking device is sent back to your phone as a message.

Tramigo product range includes T23 Tracking Device Series, Tramigo for Service Providers , User Interface Software, Personnel Tracking software and Accessories. Tramigo is accessible anytime, anywhere – even when offline. It can be used in any specific language. It controls your cost because there is no monthly fees or licensed payments. The software is highly reliable with support services which are beneficiary after purchase. With Tramigo, the location data is easily accessible.

Prologix signs up with Tramigo

Fortinet has joined HP’s AllianceOne Partner program with the HP Networking

Specialization. As enterprises and Service Providers look to effectively deploy security

in their datacenters, leveraging the benefits of Software Defined Networking (SDN)

and Network Function Virtualization (NFV), this partnership lays the foundation for

Fortinet to deliver pre-integrated SDN-optimized security solutions to enhance HP’s SDN

security portfolio. These solutions will extend the agility and operational benefits of

SDN security solutions, delivered from physical or virtual FortiGate security appliances,

enabling customers to reduce OPEX, strengthen security and derive more value from their

investments in HP SDN and Fortinet Security.

As enterprises and Service Providers move towards SDN architectures, not only

is security a logical intrinsic Data Center element that needs to fit seamlessly in such

architectures, but security services like those from FortiGate appliances can utilize the

programmability of the network to deliver more capabilities than previously possible.

In HP SDN environments, FortiGate appliances or virtual machines (VMs) could

proactively instruct the HP VAN controller to contain infected endpoints at the closest

switch in an automated programmable way. This would significantly reduce the risk

of threat proliferation and data theft, without any incremental investment required for

containment technologies.

Fortinet announces HP AllianceOne program membership

Bit9 + Carbon Black has continued to reinforce its presence in the UAE, with its leading advanced endpoint threat detection and response solution, Carbon Black--generating high interest from the local market. The company recently showcased Carbon Black’s modern features before industry leaders, stakeholders and prospective clients in a high-level seminar in Dubai. The solution’s real-time detection and response capabilities were also highlighted during the event through the presentation delivered by Dell SecureWorks, which uses Carbon Black in its Advanced Endpoint Threat Detection (AETD) managed service.

The seminar held at the Burj Al Arab presented how Carbon Black delivers continuous

monitoring and recording of all activities on endpoints and servers, customizing

detection, and responding to network intrusions in seconds. Aquib Aftab, Regional

Director, Bit 9 + Carbon Black in the Middle East said,“ Carbon Black reduces the cost

and complexity of incident response by replacing ‘after-the-fact’ manual data acquisition

with continuous monitoring and recording of all activity on endpoints and servers. Our

collaboration with Dell SecureWorks helps its clients significantly reinforce their online

defenses. We look forward to forming partnerships with other organizations in the UAE

and other Middle Eastern countries as we continuously intensify our initiatives against

cyber attacks in the region and the rest of the world.”

Bit9 + Carbon Black extends reach in UAE

Page 7: Integratorme jan2015

Harnessing the value of information

Authorised Value Added Distributor

StorIT Distribution fzco | P.O.Box 17417 Jebel Ali Freezone Dubai, United Arab EmiratesTel: +971.4.881.9690 | Fax: +971.4.887.1637 | Email: [email protected] | Web: www.storit.ae

REDEFINEENTRY-LEVEL STORAGE AND DATA PROTECTION

SIMPLE.EFFICIENT.PROTECTED.

Simple and efficient application-driven unified storage that works the way you do.

The smarter backup appliance that drastically reduces time and effort.

Page 8: Integratorme jan2015

8 | January 2015

News Bytes

emt Distribution successfully launched its channel partner training program called Market Magnitude. Market Magnitude is part of emt’s award winning partner program called ‘emt Magnitude Program’.

Market Magnitude aims to train partners on products, technologies and concepts that impact their customer’s environment. The program is carefully crafted to suit the requirements of channel partners as well as impart knowledge and skill-sets to offer right solution rather than just selling a product.

Product and technical presentations, discussions around the challenges that a customer faces in its network or security environment are integral part of this training program. Case studies, market and technical global trends are few of the other focus areas.

Emt Distribution concluded its inaugural Market Magnitude program in Dubai, which was held recently in Dubai and was attended by several system integrators and resellers from Dubai, Sharjah, Abu Dhabi and other emirates. This training program focused on small and medium enterprises (SMEs) the fast growing segment of the economy in UAE.

emt launches Market Magnitude channel program

StarLink announced an agreement with Splunk Inc., provider of the leading software platform for real-time Operational Intelligence, to become a distributor of Splunk software. StarLink will distribute Splunk products through its extensive network of Channel Partners to enterprise and government customers in the Middle East, Turkey and Africa.

Splunk Enterprise collects, indexes, monitors, analyzes and visualizes machine data being generated by websites, applications, servers, networks, sensors, mobile devices and more. StarLink will also distribute Splunk premium apps including the Splunk App for Enterprise Security and Hunk: Splunk Analytics for Hadoop and NoSQL databases.

“Splunk is excited to have StarLink as a distributor in the Middle East, Turkey and Africa,” said Andrew Morris, EMEA Director of Alliances and Channels, Splunk. “With StarLink’s regional experience in security and IT operations, this agreement opens the door for Splunk software to help more organizations leverage machine data for deeper IT and business insights.”

“Signing with Splunk is a strategic milestone for StarLink as Splunk is the undisputed leader in providing machine data insight,” said Avinash Advani, VP, Business Strategy at StarLink. “With the rapid proliferation of connected devices, and the advent of the Internet-of-Things, monitoring and analyzing everything becomes even more critical to feed security intelligence and enable smart decision making.”

StarLink becomes a Splunk Distributor

SCOPE Middle East, an emerging network performance and security value-added distributor (VAD), has partnered with three global vendors to expand its networking and security portfolio offerings with an eye to become one-stop shop

The distributor has signed regional deals with

Stormshield end-to-end security solutions, web security

WhiteHat and Soti provider of Mobile Device Management

(MDM) solutions.

"The addition of three new vendors to our networking

and security portfolio enables us to offer solutions that

complement each other perfectly," said Yazan Jammalieh,

director - Business Development for SCOPE ME Networking

and Security business unit. "At SCOPE ME we position ourselves as a vendor representative

company, and not just an IT distributor. Therefore, our emphasis is on adding value to the

brands we represent, while enhancing our offerings to our customers."

Yazan said SCOPE ME is focused on providing crucial support for resellers through

marketing initiatives, channel enablement, pre- and post-sales support, logistics support,

skill enhancement and training.

Yazan added, “Our aim is to drive the networking and IT security business at SCOPE

Middle East, in line with the company's vision to provide channel partners with best-in-

class products and performance oriented solutions."

Scope expands portfolio

Page 9: Integratorme jan2015
Page 10: Integratorme jan2015

10 | January 2015

News Bytes

American University of Sharjah (AUS), one of the premier universities in the Middle East and MENA region, has selected Ruckus Smart Wi-Fi products and technology for a massive campus-wide wireless infrastructure deployment that brings high-speed, reliable Wi-Fi connectivity to thousands of students and staff.

In partnership with Fiber Optic Supplies & Services (FOSS), one of the leading network infrastructure solution providers in the region, more than 1,400 dual band Ruckus ZoneFlex indoor and outdoor Smart Wi-Fi access points (APs) have now been deployed, spanning the massive 200 acre AUS campus, covering high traffic areas such as the student refectory, lecture halls, student dormitories and outdoor green spaces.

Roger Hockaday, EMEA director of Marketing for Ruckus Wireless. “The torrid growth of smart mobile devices, online applications and digital curriculum have placed new capacity demands on Wi-Fi infrastructure that require carrier-class solutions designed to deliver pervasive performance. With Ruckus, FOSS and AUS have designed a world-class Wi-Fi solution to deal with these challenges, and one that will be viewed as a benchmark for other higher education institutions both in and out of the region.”

Ruckus deploys smarter Wi-Fi at AUS

du has started the journey towards Network Function Virtualisation (NFV) by successfully conducting internal tests. When fully deployed on the existing state-of-the-art 4G LTE network, NFV will provide du’s enterprise customers with tighter integration of hardware and software leading to offering more value added services, reduced time required to provide a service and at more competitive costs.

NFV (Network Function Virtualisation) offers a new approach to design, deploy and manage networking services. NFV decouples network functions from proprietary hardware appliance so they run in software. NFV utilises standard IT virtualisation technologies

that run on high-volume services, switch and storage hardware to virtualize network functions.

Saleem Al Blooshi, Executive Vice President - Network Development & Operations, du, said: “We are always eager to consider new technologies which not only streamline our network operations but more importantly – deliver a superior and simplified user experience to our customers. We are excited about Network Function Virtualisation and the successful tests paves the way forward for further validation and future deployment. We will continue our journey towards an enhanced experience based on the latest and best available technologies.”

McAfee, part of Intel Security, hosted the 4th annual Partner Summit, providing nearly 700 channel partners from around the globe with the opportunity to engage with McAfee executives and customers. During this year’s event, McAfee unveiled several key channel initiatives to help partners build sustainable security practices.

"We aim at providing our partners, globally and in the region, with increased flexibility for building profitable and sustainable security practices through a new channel partner program framework that focuses on change and thinking big, " said Maya Kreidy, Regional Channel Manager – UAE, GCC & Pakistan at McAfee.

McAfee has announced a new, more flexible partner program framework that allows partners to evolve their business models and adapt to the changing customer landscape. McAfee is changing the name of its Security Alliance Program to the Intel Security Partner Program. In an effort to reduce program complexity, McAfee will consolidate from five product competencies to three solution competencies: Endpoint Security, Network Security and Security Management.

McAfee is also removing the need for partners to complete Baseline Certifications and is expanding Continuing Education to give all partners the flexibility to earn credits for training that is most relevant to their business. McAfee is also introducing post-sales services training and certifications.

du performs Network Function Virtualisation testing

McAfee rolls out new partner initiatives

Page 11: Integratorme jan2015

January 2015 | 11

AV solutions from ATENin focus at channel event

Wave Tech Computers,

ATEN’s exclusive

distributor in the region,

organized the Annual channel

seminar for ATEN partners at

the Royal Ascot hotel in Dubai.

The event was attended

by more than 100 channel

partners, all of whom have

been working with Wave Tech

and reselling ATEN’s range of

KVM solutions and Professional

Audio Video Solutions.

At the seminar, Suresh

Iyer, Product Manager of ATEN

at Wave Tech set the stage for

the day’s sessions by thanking

all assembled partners for their

contribution in making 2014 a

successful year for ATEN and

Wave Tech in the region. The

entire team from Wave Tech

including its MD, Ahmed Faour

were present.

There was a strong

representation from ATEN

as well, including Karthik

Narayanan, Sales Manager for

the company who made the

technical presentations.

He briefly mentioned

that ATEN has four sub-

brands that focus on separate

products lines. These include

ATEN which is the soho and

SMB KVM range of products,

ALTUSEN, the enterprise range

of KVM products, Van Cryst,

the professional AV range of

products as well as NRGgence,

the PDU range of products for

datacenters.

The focus of the channel

event was centered on the

professional AV solutions

from ATEN that offer signal

management and signal control

home and professional AV

installations with a variety

of applications in corporate,

government, education,

hospitality and home theater

environments etc for the digital

signage industry under the

sub-brand Van Cryst. In the

presentations, Karthik dwelt on

technical details, making them

easy to understand for the

audience, taking out the time

to explain some basics such as

the functionalities of a video

splitter, a video extender, video

switch and a video Matrix .

The vendor is keen to

accelerate the selling of these

solutions in the channel on

the eve of the new year as it

believes it has some unique

solutions to offer in what is

a fast growth segment. With

Wave Tech’s support, the

vendor looks to ensure that as

many of the current partners as

well as the new ones that are

added, extend their portfolios

to include these digital signage

products.

Karthik said, “The digital

signage industry has great

potential to grow, many times

over that of the KVM market

and will do so certainly. We are

ideally positioned to be a one-

stop vendor for all connectivity

needs of our customers with

our exhaustive range of

solutions including the Modular

Matrix Switches that provide

seamless switching between

displays.”

He added that the digital

signage market is also more

attractive because of the

higher profitability potential

it promises for the channel.

This is attributed to the fact

that these are potentially large

projects based deployments.

Ahmed Faour, MD, Wave

Tech added, “We are always

focused on introducing

products that are promising

in terms of relevance and

profitability for our partners.

Our association with ATEN

helps us deliver high value

proposition to the partners

always and we are upbeat

of making the most of this

opportunity in the digital

signage industry along with our

partners.”

News In Detail

Karthik NarayanSales Manager, ATEN

Page 12: Integratorme jan2015

12 | January 2015

News In Detail

VMware Study:Four weeks toget employeesMobile-Ready

VMware announced research revealing that it takes

four weeks for the average IT department in the United Arab Emirates (UAE), to equip staff and get them up and running with the mobility tools and applications they need to do their jobs. This time lag increases to eight weeks when it involves contract workers, possibly severely compromising the value employees can deliver upon entering an organisation.

The research by Vanson Bourne, commissioned by VMware, explores the implications this lack of mobile readiness brings across the business, as it impacts both IT departments and employees. Just 10 per cent of

IT departments in the UAE, for example, believe they have all the mobile management capabilities to support staff's mobile needs, while 40 per cent cannot control access to company information from all employee mobile devices.

Exploring this further, the research questioned both IT and employees on where responsibility should lie for mobile working policies. It found that IT departments across the UAE are undecided on the issue; only 27 per cent believe it’s their responsibility to restrict employees' access to mobile tools and applications outside of working hours, yet 40% feel under pressure to do this and 52% admit that it’s now

become necessary.“With the pace of business

today, taking three weeks to equip staff with the tools they need to work isn’t a viable option for organisations looking to survive and thrive in the mobile cloud era”, comments Sam Tayan, Regional Director, MENA, VMware. “Any delay in getting employees functioning at full speed may lead to businesses handing over competitive edge to others. Organisations need to empower employees to collaborate with whoever they require, from any location, at any time, while minimizing security risks.”

Employees, meanwhile, are more decided on the issue. 54 per cent do not agree that their employer should restrict access to mobile apps and tools. As it stands, the vast majority (81 per cent) state they do not yet have full access to the mobile tools needed to work as productively as they can, while almost half (43%) would circumvent the IT department to obtain the mobile tools needed to get the job done – demanding greater mobile enablement from the business, rather than further restrictions.

“The phrase ‘freedom within boundaries’ has never been more appropriate as the explosion of mobile devices and applications disrupts both end-user expectations and functional structures,” continues Tayan. “Organisations in the UAE cannot afford any ambiguity over who takes charge of mobile applications and tools in the business. Many employees now expect and require to determine how they work, so the challenge for IT is to cater to this, while also retaining adequate control over how information assets and business processes are used. This must be done centrally, in order to secure data, and not have business best practices compromised in any way.

“The good news is that technology is ready to do this today: VMware enterprise mobility solutions are helping organisations like Hertz and TUI transform how they enable users to work – providing secure, immediate access to the resources they need. To translate this potential into reality, many more businesses will need to embrace such solutions.”

Sam TayanRegional Director, MENA, WMware

Page 13: Integratorme jan2015

January 2015 | 13

Ajay Singh Chauhan, Chief

executive officer of ComGuard, a

part of Spectrum Group discusses the distributor’s intent to build a

strong competence in solutions for the

datacenter

Discuss the company’s growth in the past year?From a revenue perspective, we have grown through the year. However, from a margin perspective, there was a slowdown noticed in some segments. In certain segments there are no margin pressures but in some, there were margin pressures and it was more competitive. So while we did grow, we could not net as much profits as we should have. Discuss growth across the different distribution companies of the group?There has been growth in Comguard as well Psilog. Since we rebranded Psilog for volume distribution, we have definitely been able to see more growth.

What would be the broad agendas this year in terms of growth objectives?We are diversifying a bit this year. You will hear cloud related and storage related announcements this year.

Broadly, we are looking to consolidate our growth this year. For this, we also want to focus on some new areas that are quite promising. Cloud and virtualization are areas that we would want to focus on as they are in demand. There are a lot of datacenters coming up. We assume that Government entities and others will be buying a lot of infrastructure solutions to build these datacenters. So we want to be present in the three segments, providing the hardware, storage, security that are required to build these datacenters. We would like to be able to provide partners capabilities to offer new age technologies such as on demand storage, applications etc for customers looking to build private clouds and also to integrate with public clouds.

Would you look to add partnerships with more vendors in specific segments?We want to partner with vendors who are providing storage, networking and security solutions for datacenters. We will look for new people who have the right experience in the domains that we are interested such as storage and security solutions for the

datacenter. We want to able to position as end to end supplier for datacenter projects in the areas of storage, networking and security solutions.

Do you see that the security solutions distribution is now more competitive than ever with more distributors in the fray?There is competition with multiple distributors. We are trying to bring in Technologies that are superior and unique. We are confident that if we focus on solutions that offer differentiation and are affordable, it will benefit our partners and the industry.

Cautiousconsolidation

Point2Point | ComGuard

Have you invested in a proof of centre facility?

We have our proof of concept centre at the Spectrum training centre. Our partners coming in for training can take a look at the new products we have added.

Do you intend to expand operations into Africa?As of this year, the focus is on consolidation and building our expertise in the areas I mentioned in our existing operations for this region. We will take on Business in Africa on a project basis as of now but don’t have any expansion plans for the Africa market at the moment.

Aja

y Si

ngh

Ch

auh

an,

Chie

f Exe

cutiv

e Of

ficer

, Com

Guar

d

Page 14: Integratorme jan2015

14 | January 2015

How was 2014 for FDC ProValue?2014 was a launch year for ProValue. We emerged into the VAD community. We had an advantage however since we had the FDC name that has been a leading name in Broadline distribution and has already established infrastructure such as office across different markets of the region. We saw strong growth for ProValue in 2014 and we saw good growth in the Broadline Business as well.

We have got industry awards as recognition for our efforts. We had a challenge in getting to have the Brand known further but our growth has created interest from many of the larger vendors.

Discuss key attributes of your Business growth?We are particular about the need for everyone in the team to be aware of various vendors we partner with, products and most importantly as solutions. All these products put together, how do they together form a solution, is what primarily concerns our go to market approach.

That’s how we have grown the Business as one frontier extending naturally into the other. So we now focus on Networking and convergence, server storage and cloud portfolio, Infrastructure and security.

For all the Brands we partner with, we are able to fulfill the specific role of providing consultancy to partners and

handholding them in sales engagements with customers. That is a significant area for us. Pre-sales plays a significant role in terms of end-customer and partner engagement.

As part of the implementation support, we are providing auditing of networks, RFP building and we are now into the consulting mode for a couple of larger projects. We will be launching an online initiative soon that partners can make use and be part of. ‘Relevance’ will soon have a portal to support the program.

Discuss your vendor associations?We have ZTE in the networking and convergence portfolio for the enterprise to mid-enterprise segment. We have TP-Link in the SMB and channel segment. Then we have Netgear for SMB typically and also for the channel segment.

We started with enterprise products of Seagate. We have partnerships with Synology and QNAP. We have a tie-up with Tandberg Data which is now part of Overland storage.

In the security and infrastructure portfolio, we are in the process of signing up with a few brands. We have Array networks and ESET in the security portfolio. We have BitDfender as well as work a bit with Kaspersky. We will look at adding to what we offer in the server and storage portfolio.

Elaborate on your partner value add initiatives?We have launched our partner program ‘Relevance’.Self-enablement, channel enablement and support (being on time, being immediate, understanding of the solutions etc) are three features of the program.

We are customizing the partner program as much as possible for every vendor depending on requirements and the vendor’s current placing in the market. Current vendors we are talking to are realizing we are good at this. We are not confined to one Technology, one geography or one vendor. We are trying to cover end to end solutions. We want to be lean, mean and stay relevant.

Staying Relevant

Ram Praveen, Director - FDC ProValue discusses how the distributor is scripting consolidation and growth

Point2Point | FDC ProValue

Ram

Pra

veen

, Di

rect

or, F

DC P

roVa

lue

Page 15: Integratorme jan2015

January 2015 | 15

Elie Dib, Head of Channels for

the Middle East, Turkey, North,

West and Central Africa (METNA)

region at Riverbed Technology

discusses the company’s channel

focus as it seeks to cement its

leadership in its key focus areas

of Application performance

infrastructure.

Do you see 2015 as a strong year of Business through the channel for Riverbed?Riverbed has expanded beyond WAN Optimization to include five major product sets which add up to being the industry’s most complete application performance platform. Our new platform opens up a much larger market opportunity for Riverbed in Application Performance Infrastructure.

Our year on year growth has been significant. Since we are a channel focused company, that growth has obviously come from the channel segment. So the channel has been enjoying our growth as well.

We had an exciting GITEX and it was good to experience the mutual commitment to 2015 Business growth with many of our partners from across GCC, Egypt etc. It has definitely enhanced our confidence.

We are doing a lot of investments in the channel team. We are investing in enablement and promotions for generating new Business. The potential is phenomenal.

Which are the territories that you are operationally taking care of from here?We look after the Middle East, North Africa, Central Africa, West Africa and Turkey from the operations based here. Discuss your strength in the Telco segment?We are strong in the Telco segment on the Managed services part and our Steel Central for network performance monitoring. Steel central can work with solutions from other vendors.

Do you have PoC (proof of concept) facilities in the region for partners?As of today we do have these facilities in Europe and which have been set-up through our distributors. We will similarly have here, one in Dubai and one in Saudi.

Who are your value add distributors for the region?For the Middle East, Mindware and

FVC are our distributors. They cover the entire Middle East including Saudi Arabia. Mindware has been signed up as our second value ad distributor to ensure that we are fulfilling our commitment to the growing demand from the channel across the whole region for our solutions.

Elaborate on your Africa focus?We have FVC who manages North, central and West Africa. We have MCS dedicated for Africa, Mitsumi for Central and North Africa and Zycko for the French speaking parts of Africa. We have a plan to have a distributor in Egypt. Africa by and large is still an untapped market for such solutions. We have a lot of enterprise customers there. Bandwidth availability is still a

Steel wheels

Point2Point | Riverbed

challenge in Africa and our SteelHead solution is very relevant for those markets as it can accelerate applications.

Discuss your partner program’s focusThe partner program we offer is competency focused- whether it is WAN optimization,NetworkPerformance Management, Storage delivery or Application delivery. Our program will make sure that our partners can provide the services value to their customers.We are working towards enabling our partners to be fully capable of designing the solution, explaining the benefits to the customer, implementing the solution in the best possible way and providing post implementation support.

Elie DibChannel Head, METNA, Riverbed

Page 16: Integratorme jan2015

16 | January 2015

Next-generation

security solutions

from Cisco deliver

advanced threat

protection across

the entire attack

continuum

before, during,

and after an

attack

Cisco, the networking powerhouse has upped the ante in its growing focus on

security solutions. Its Global Security Sales Organization (GSSO) is now an independent unit of Cisco. The company is now adopting the go to market strategy of focusing on addressing the entire attack continuum and claims it offers Technologies that fit into all those scenarios.

“Beginning of the fiscal year 2015 at Cisco, we launched the GSSO. So we are now a Business unit focusing solely on security within Cisco,” says Anthony Perridge, Security Sales Director at Cisco.

He adds, “Before a probable attack, you need a robust resilient system while during an attack, you need to monitor and after the attack, you need remediation. We want to move away from the approach of point products as there is no silver bullet. As an industry, our learning has been that the point product approach creates issues because customers find it confusing, getting conflicting messages from the various vendors. They also find it hard to integrate these various products. If you are spending your time integrating the various products, you are possibly leaving out gaps. We are

The great shift

bringing the continuum approach, to cover the before, during and after the attack phases.”

The company conducted a seminar in December in Dubai where this message was driven across to attendees, largely customers. The seminar titled ‘Security Beyond Traditional Defenses’ highlighted the importance of next-generation security solutions from Cisco that deliver advanced threat protection across the entire attack continuum before, during, and after an attack.

The focus is on preparedness for any inevitable breach in the network and subsequent remediation. The line of reasoning is quite persuasive that the attacker only needs to succeed once while the defender needs to succeed always. Therefore there is a strong possibility that the defender is likely to fail one time or the other and hence the need for remediation. The company is focusing on such solutions and this includes the AMP (Advanced Malware Protection) from the SourceFire portfolio.

“From a recent Cisco research, it has been found out that 100% of organizations connect to malicious sites. The question

Feature | Cisco

we are asking is what would you do if you already knew that you were hacked? Since 2004, we have been tracking the time between discovery of an attack or compromise and the remediation and what we also found out is that it is sometimes days, weeks or even months. The question therefore is not how high can I build the wall so that my security cannot be breached because at some point the breach is bound to happen. Everybody is using devices that is coming into and out of networks, at work and at home. The complexity of networks, the advent of BYOD, the advent of cloud

Anthony PerridgeSecurity Sales Director, Cisco

Page 17: Integratorme jan2015

January 2015 | 17

computing etc are blurring the lines of responsibility for security,” comments Anthony.

Cisco offers technologies that do remediation, which are forensic type tools that can go back in time and find out the entry point, who was infected, how it proliferated and the damage it has done to the organization. These present great opportunities for incident response, as a service, believes Anthony.

He says, “When an attack occurs and proliferates, it is the equivalent of an emergency call to the service provider to provide remediation services. It is an opportunity about helping with the clean-up and then the forensics about how the attack occurred and how to prevent it from happening again.”

He also believes that the shift towards security as a managed service rather than as a product is inevitable.

Anthony says, “By 2018, 65% of cyber security spend would be on services. Historically, the security spend has been in favor of products. This is going to shift. There is a great opportunity for the channel.”

Reasons in favor of Cisco to be a leader in the network security space include the fact that Cisco sees more network traffic than Google as it has more data points about what’s going on globally on networks. That gives the company access to a great deal of information and therefore a strong leverage in being able to offer the necessary threat monitoring service which it makes available to its customers. This is offered directly as well as via partners.

Anthony adds, “We can offer a global monitoring service and many of our partners, be it global service providers or outsourcing companies provide it as a Managed Service. We have two pronged opportunity and if customers want to buy that directly from us, they can but also certainly we don’t deviate from our channel focus.”

The company is working with several global scale Managed services providers and believes there is a strong opportunity for Managed Services providers regionally as well because of data concerns.

“Historically, there has been a small number of managed service providers like BT, Symantec, Dell Secure Works or an IBM type of organization. We work with almost all of them. In terms of the region, there is significant opportunity for local Managed service providers, especially because customers in the region are concerned to keep the data locally in the country and then there all the regulatory requirements. There is definitely a demand.”

The fact that there is a shortage of nearly a million security practitioners vis-à-vis the demand is also ensuring that the demand is also which is driving the tide in favor of Managed services. Anthony expects that more flexible consumption models such as security as a service etc will gain ground.

The recent seminar was also an occasion to unveil the Cisco ASA with FirePOWER Services - a threat-focused Next Generation Firewall (NGFW) for its UAE customers at the event. This also includes some SourceFire technologies.

Anthony says, “If you look at the recent NSS Labs report, it is a market leading product offering best in class features, best in detection rates and has threat centric approach. Cisco ASA platform is among the most widely deployed platforms, tried and tested and we are bringing into that some of the SourceFire Technologies. It is amazing that within twelve months, how both the teams have come together and worked jointly to bring new products to market. The event has been very well attended and there is a high level of interest.”

With the likely advent of IoT (Internet of Things) on a growing scale, the data sensor points will multiply manifold and in the new scheme of things, it would be

mandatory to secure upfront rather than at a leisurely pace.

“For Cisco it is a huge opportunity to look to have security being built into all solutions rather than as an afterthought. That can be more effective and also offer lower cost of ownership. There are not many organizations that are as well placed as Cisco to secure networks and integrate the security into the networking,” adds Anthony.

On the partner front, Cisco has tried to encourage the traditional Cisco networking partners to integrate security onto the infrastructure solutions. Concurrently, the company has been very keen to retain all SourceFire partners that have been typically focusing on best of breed security solutions. While some of them were also working with cisco, some weren’t.

Anthony says, “We modified the cisco security channel program to make it more attractive for security centric partners. We have made accreditation an important part of the program so that the experts are rewarded. One of the ways we have been done that is we are providing deal registration so that the margins are secured for security centric partners.”

In the final analysis, Cisco’s focus on security is quite strong. The Cisco approach to cybersecurity is visibility driven, threat focused, and platform based. It is encouraging the trend towards security as a service model.

Anthony says, “As an industry, we need to be thinking about moving away from product type model of security solutions. There is a growing appetite for new consumption models. Margins are likely to be eroded in the traditional model and we would be encouraging partners to look at value add expertise and services.”

"As an industry, we need to be thinking

about moving away from product type

model of security solutions. There is a growing

appetite for new consumption models."

Page 18: Integratorme jan2015

Cover Feature | 2015 Outlook

It looks certain that 2015 will see continued consolidation of the major

trends that have been holding the industry’s interest for the past few years. IoT (Internet of Things), SDN, Managed services, Big Data analytics, cloud, Mobility and BYOD are among trends that are in varying degrees shaping the changing face of the industry. The fact that when many of these Technologies come together as enablers, there is likely to be a snowball effect and this is precisely the kind of future we are heading towards with these trends

in tandem.Rabih Dabboussi, General Manager,

Cisco UAE says, “By 2022, there will be 50 billion devices connected to the Internet. By some estimates, even this is a conservative outlook. Technology has advanced and has become smaller in size, is more flexible and adaptable to different applications and has also gone down in terms of costs. This is driving a tremendous interest for adoption of connectivity and intelligence in almost everything around us. Businesses will strive to leverage this connectivity and

intelligence to differentiate.”The IoT opportunity is likely to emerge

into the limelight over the next couple of years in terms of deployments. From integration to securing the infrastructure that will enable IoT to work, there is potentially a lot of opportunities that the channel will be likely to unearth.

Sabbahuddin Khan, Regional Manager at Allied Telesis Middle East says, “The IoT trend will dramatically increase the number of network-connected entities. Devices that contain sensors, control, or intelligence will

2015OUTLOOK

The year will likely see continued consolidation of the major trends that

have been holding the industry’s interest for the past few years including Big

Data analytics, cloud, SDN, IoT, and BYOD

Page 19: Integratorme jan2015

January 2015 | 19

In addition, the rising prevalence of Mobile workforces will also mean that workers would need better access remotely. That is driving the demand for hyper-converged systems that help manage virtualized infrastructures. Hyper-convergence infrastructure have a software-centric architecture that tightly integrates compute, storage, networking and virtualization resources and other technologies.

Ahmad Qadri, Regional Director for Middle East at Nutanix says, “Mobility has meant that large teams of people have been freed from their offices and are able to work offsite, either beside their customers or from home to increase productivity, customer satisfaction and personnel retention. But the distributed systems needed to support these work

environments are driving the uptake of hyper-converged infrastructure at such a pace that even traditional storage area network (SAN) players are reducing SAN production and redirecting IT spend into hyper-converged technology. And it will become even more prevalent in 2015 as businesses look to the IT department to support this new working environment while still keeping equipment and maintenance costs low.”

Therefore he believes that hyper-converged will transition from the ‘early adopter’ phase to mainstream production environment; from test and development to Tier 1 applications.

Nutanix is partnering with Dell globally and have extended that into the region. The Dell XC-series appliance integrates

Dell’s x86 server platform (PowerEdge R720xd) and Nutanix web-scale software to provide a solution with enterprise class performance, scalability, availability and data management features.

Basil Ayass, Marketing Director, Dell Middle East said, “Web-scale IT is making huge inroads compared to traditional DAS, NAS and SAN architectures. The demand for software defined storage is going through the roof- over delivering on promise. Cost-wise, it is cheaper and performance wise, it is better. Customers are liking it and software defined storage has seen quick adoption unlike SDN.”

What happened in the case of server virtualization is now unfolding with storage and networks. SDN is still in the initial phase of rollout with Telcos testing it.

increasingly become network connected. IPv6 will gain wider adoption, as will management technologies that are required to manage network-connected nodes. The IoT will deliver benefits for everyone, from enterprises to municipal councils, but it is the value of information and knowledge that will see new players introduced and new business models emerge during 2015.”

As IoT initiatives get off ground, in fact many of the larger projects could be spearheaded by government entities as they enable more public e-services for the public.

Rabih adds, “The next few years are thus likely to be of IoT gaining ground. We got some economists to gauge the value of the IoT economy. The value at stake of the IoT between now and 2022 is $19 Trillion. The potential is immense. We took that model and applied to Dubai and the report was about the value at stake between now and 2019 for Dubai’s smart city initiative. It is about 5 Billion dollars.”

Mobility & software drive the future Mobile device penetration as well as mobile data traffic growth rate in the region are among the fastest in the world. MEA is set to post the world’s highest-growth rate of IPv6-capable smartphones and tablets according to a Cisco forecast. These trends will encourage even wider adoption of wireless access and Mobile Device management as well.

Sabbahuddin says, “The unprecedented adoption rate of mobile devices in the enterprise landscape means that wireless access is now more important than ever, and will continue to be so for the foreseeable future. The technological innovations that the 802.11ac standard is enabling will lead to continuing growth in demand for wireless access products, and will ensure that wireless access has a critical role in unified enterprise network infrastructure. Users will demand pervasive and reliable wireless coverage and seamless mobility. This wireless expansion drives the need for tightly integrated management platforms.”

Rabi

h D

abbo

uss

i, G

ener

al M

anag

er, C

isco

UAE

"The unprecedented adoption rate of mobiledevices in the enterprise landscape

means that wireless access is now moreimportant than ever, and will continue

to be so for the foreseeable future."

Page 20: Integratorme jan2015

20 | January 2015

Basil adds, “It is only now that SDN is beginning to see traction. Telcos are taking the lead. They are testing and that gives confidence to the enterprise segment to take it up. We are therefore now seeing a lot of interest around SDN.”

Legacy network architectures cannot provide the scale that SDN can potentially bring in to the infrastructure which is required especially as organizations move more workloads to the cloud and the workforce become more mobile.

Sabbahuddin adds, “The flexibility in user location and device usage that is becoming the norm in Enterprise IT, as the BYOD concept has taken hold, will drive requirements for more dynamic operation of Enterprise communication systems. Organizations needing solutions to these requirements will increasingly look to SDN as the source of such solutions. The efficiencies to be gained by integration between business rules, user information, and network infrastructure will benefit network administrators and users alike.”

The cloud’s next phaseAccording to Rabih, the next phase of

cloud computing is about optimizing data centres. That will mean moving some of the actual application processing to the edge, i.e., what is being referred to as ‘fog-computing’. The terms Fog Computing, coined by CISCO, refers to computing on the edge wherein data processing and decisions are happening closer to the event location, leaving only more critical decision making to the central cloud locations.

He adds, “We believe the next phase of cloud computing especially when it comes to smart city initiatives and IoT is in fog computing – taking some of the data centre responsibilities and some of the application processes and distributing it to the edge. So instead of centralizing it in the cloud, you do it in the fog which is closer to the user.”

Rabih claims that Fog computing alongside cloud computing will see more adoption in 2015 in tandem with IoT growth.

Elaborating further, he says, “For example, when you are in the parking lot, the access point covering the parking lot needs to cover your location and the density of cars in the parking lot. That access point needs to tell the lights to turn on or off, brighten up or dim down based on number of people. These decisions need not go to the cloud as they can be taken at the edge. You will see processing and many applications taking place at the edge in places like the parking lot, in a street, a mall, a theatre etc. But you will also see more centralizing applications in the cloud as well.”

There is also likely to be great consolidation in the cloud services market. Ahmad believes that the larger players in the cloud service market will get bigger and there will be a scramble for the rest of the market opportunities.

He says, “If it isn’t already, hybrid cloud will become the ‘new normal’ infrastructure solution as more and more organizations realize the benefits of balancing hardware control and software scalability. Over the next five years, we’ll see the big cloud services providers (CSPs) hold a vast majority of the hardware market. Meanwhile, the smaller businesses fighting for the remaining market share will be forced to pick between building their own

open source-based infrastructure solutions or purchasing turnkey products.”

Bigger pictureQuite obviously IoT will also be a driving factor for Big Data analytics to become more prevalent in terms of deployments. There is going to be a growing demand for such solutions for instantaneously fetching results for specific queries. Therefore, the compute infrastructure in the background is going to consume a lot of processing power.

Rabih says, “If you think of Mobility and IoT together, there is going to be a lot of data going to be generated. In order to link to link people, devices, process, things together, there has to be a tremendous amount of processing power that needs to be enabled behind this. The amount of time it takes to search through text is much less than it takes through for a video file or a voice conversation or facial recognition etc. The level of complexity and consumption of computing that is going to be needed in the future is on an entirely different level than in the past. Hence, the notion of Big Data, which is about taking zettabytes of data in a distributed way across multiple servers and multiple processors so that you gain your result much quicker such as in the case of a crime scenario investigation. It could be so many other different scenarios. In future, the ability to do Big Data crunching will be at our fingertips.”

Cisco’s Rabih also concedes that we are already onto an era when a single company’s solutions will not do and there is likely to be a lot of collaboration that will help enable all required solutions and services.

He adds, “No single company is going to have the answer to all these requirements. We have been developing Technologies both on the analytics side and also on the networking side to enable the Big Data model. We are now integrating Hadoop which is the platform for enabling distributed processing across a compute environment into our systems. We are building the services delivery platform or the orchestration platform that allows to include multiple vendors and allows to do

Sabb

ahu

ddin

Kh

an,

Regi

onal

Man

ager

, Alli

ed T

eles

is M

E

Cover Feature | 2015 Outlook

Page 21: Integratorme jan2015

January 2015 | 21

Basi

l Aya

ss,

Mar

ketin

g Di

rect

or, D

ell M

E

the analytics for you.Dell has also strengthened its portfolio

in information management solutions with the acquisition of StatSoft last year. StatSoft is a provider of analytics solutions that deliver data mining, predictive analytics and data visualization capabilities.

Basil says, “We now have software portfolio for predictive analytics, an area where we were lacking prior to the StatSoft acquisition. We are in a position now to provide our customers access to proven and affordable advanced analytics solution that delivers the predictive and prescriptive analysis capabilities that their businesses need in order to make faster, more accurate decisions.”

Security, a prime time focusWith more devices connected, it would akin to a mouth-watering prospect for would be attackers as they seek network vulnerabilities to attack. Therefore, security needs to stay competent to tackle malicious attacks.

Rabih says, “Security is becoming a great concern. There will more focus on that and more technologies introduced that will allows us to adopt all the trends that I mentioned. This has to be much more robust than what is there currently. As we go towards the predicted 50 billion devices, the actual attack surface area would have increased tremendously.”

Security solutions will become more heavily integrated to guarantee the security of data and the privacy of users across the entire infrastructure. More organizations in the Middle East today recognize the need for efficient network security systems to secure their Businesses.

Sabbahuddin says, “The increasingly flexible policies of network access and the growing number of threats will escalate the demand for newer network protection technologies. The escalating likelihood of attack and the resulting loss of productivity and damage to reputations will ensure that security is a high priority for executive management—particularly given the number of high-profile attacks during 2014. Likewise, Next Generation Firewall (NGFW) technology, integrating application control

capability, will play a leading role in the security space.”

Upbeat outlookThe region continues to be adopt new technologies. Large initiatives are being spearheaded by Government initiatives including the smart city projects.

Rabih says, “We are seeing a determined effort to invest in Technology as a way to enable the transformation of the nation, across the GCC. The vision of the leadership in the region is taking the lead in Technology adoption. IT is now at the forefront of the government’s fiscal budgets. There is an increase in budgetary allocation for IT. IT is not an afterthought. Although IT is not a solution to all issues, yet it is an element of all solutions for all problems.”

Sectors including Education BFSI, Education, Hospitality, Healthcare etc are all in process of upgrading their capabilities to compete and provide best services. Technology will remain a key enabler behind those efforts.

Basil says, “Oftentimes, the Middle East or any emerging markets would

follow the trends going on globally. Customers see the opportunity because they are not tied down by legacy. The large enterprises see the opportunity to leapfrog other regions in terms of infrastructures and implement modern solutions. The small and medium size enterprises find it cheaper to implement as they can start taking advantage of enterprise grade solutions that are available at affordable costs.”

It has been a tricky era for the partners. They are challenged to embrace the disruptive technologies in their go to market models but most are keeping pace.

Rabih says, “Partner ecosystems have been evolving alongside. We are seeing a big appetite from our partners to sharpen their expertise and tools that helps them to deliver these new Technologies.”

While telcos delivering ICT services as part of their Managed services portfolio will increase, there will a lot more of opportunities emerging in the era that is on the cusp of pervasive connectivity and intelligence. The opportunities for integrators is only bound to rise.

Page 22: Integratorme jan2015

22 | January 2015

Do you see UTM adoptions still on the rise? The UTM appliances are becoming more powerful, faster and are available at lesser costs. Earlier generations may have been unable to support advances services which is no longer the case and these can handle new kinds of threats including APT.

It is not easy to be dealing with different vendors for different security solutions. The UTM takes away that hassle and brings a single point reference, a one point of control.

How do you see Watchguard faring in the region?We have a growing market share. It is however a very competitive market. Our appliances deliver high performance and are easy to deploy and use. Even without expertise in networking and security, our appliances can be easily deployed.

We are one of the Market leaders from the Gartner report. WatchGuard has been named a "Leader" in Gartner's 2014 Unified Threat Management (UTM) Magic Quadrant for the fifth consecutive year. WatchGuard was also named a "Champion," and has been awarded the "Value" and "Trend Setter" awards for its XTM Series in Info-Tech Research Group's 2014 NGFW (Next Generation Firewall) Vendor Landscape Report. We got the NSS Labs recommendation for the XTM 1525 as one of the top-rated Next Generation Firewalls (NGFW) based on a real-world comparative analysis. According to the report, the XTM 1525 blocked 96.7 percent of attacks against server applications, 98.7 percent of attacks against client applications, and 97.8 percent overall. It proved effective against all evasion techniques tested and passed all the stability and reliability tests.

How do such third party reports help?There is a lot of attention to Analyst reports here. This kind of third party validation is critical to our customers in instilling confidence they are choosing market leading solutions.

We have the capability to provide both UTM and the NGFW with the same appliance. Sometimes what the analysts say is far from accurate but they give directions to the industry.

What are some of the unique features of the WatchGuard Firebox M440 that you showcased at GITEX?We launched the WatchGuard Firebox M440 which delivers 25 1 Gb Ethernet ports, eight that deliver Power over Ethernet (PoE), plus two 10 Gb SFP+ (fiber) ports. The Firebox M440 with its multiple ports removes the need for complex configurations such as VLANs and simplifies the

WatchGuard Technologies has been a consistent leader in the UTM space and has made significant enhancements in its Technologies and partner engagement. Fabrizio Croce, Area Director, SEMEA at Watchguard Technologies discusses the trends and the company’s focus.

Safe measures

Fabrizio CroceArea Director, SEMEA, Watchguard

TechKnow | Watchguard

Page 23: Integratorme jan2015

January 2015 | 23

critical process of applying traffic-appropriate policies across multiple network segments.

We also announced Firebox M400 and M500 appliances, based on the latest Intel Pentium and Intel Celeron Processors. These are specifically engineered for mid-size and distributed enterprises, which are struggling to effectively and affordably secure networks in the face of explosive growth in bandwidth rates, connection speeds and encrypted traffic. These solutions are powerful to run all their engines in parallel without any bottlenecks.

What have been the advances in your visibility tool? How has it been received by customers?WatchGuard's visibility solution, Dimension, first launched in late 2013, provides real-time, single-pane-of-glass view of the effect each policy is having on that segment's traffic. The latest version of dimension includes the industry's first interactive, integrated policy mapping capability for Unified Threat Management (UTM) and Next-Generation Firewall (NGFW) appliances. Policy Map provides a complete view of traffic flow and policy impact across the entire network and also provide the ability to quickly filter or drill down for additional detail and analysis.It aggregates disparate information about policies, interfaces, applications and related traffic flows, and presents it in a simple, intuitive and interactive visualization dashboard. It can be used for policy audits, to find active and misconfigured policies, to identify unusual/abnormal traffic patterns, to visually check if firewall policies or configuration changes have the intended impact on traffic patterns and much more. It comes free on any WatchGuard UTM or NGFW platform.

WatchGuard Dimension has been received well by customers and has seen strong market adoption. Customers have

been using the network security visibility tool to monitor and gain critical and timely insights about network security threats, bandwidth and Internet usage, as well as related traffic trends.

Discuss your current partner program?From the channel program perspective, we offer Watchguard One as our partner program. It ties higher margins to higher customer service levels and allows resellers to get unprecedented combined discounts of more than 70 percent. The program leverages a value-based model that places additional focus on reseller certification and training in addition to simply volume sales. It includes additional profit sharing partner programs, such as Deal Registration and Security Pays.

WatchGuardONE delivers a variety of membership levels including Silver, Gold and Platinum and the difference is the number of employee certified on our Technologies. Discounts and rebates vary depending on the partner's level of commitment.

The program has greater stress on skill and certifications than sales targets. We are focusing on very skilled partners that can constantly work on our products and support our customers. We are not keen on working with partners that are only opportunity focused and active occasionally.

How have the software versions of your solutions been accepted?We have software versions of our appliances for the virtual deployments. They have exactly the same features. You save on the hardware costs, space and cooling costs. You can choose to deploy a mix of hardware and virtual appliances,

operating together and managed from a common centralized management platform. There is a shift in favor of the virtual but it varies from region

to region.WatchGuard virtualized solutions

address the challenges that are faced by enterprises today, and how to tackle them successfully. Through our virtual appliances XTMv (Extendible Threat Management) and XCSv (Extensible Content Security) we offer virtual security deployment options for businesses of all sizes. This is important because virtual environments cannot depend on physical infrastructure alone for protection. Whether organizations are looking to virtualize traditional gateway firewalls or integrate virtual security with messaging and application servers.

Discuss how you enable all your modules to offer best capabilities?In our devices, we decided to have best of breed modules. Our UTM and NGFW security appliances run on Fireware, a complete security platform designed to run full versions of the leading security engines in every category. Our best-of-breed security tools include DLP, APT, Intrusion Prevention, Reputation Enabled Defense, spamBlocker, Gateway AntiVirus, WebBlocker, Application Control and Packet Filtering. Where we aren’t the experts, we have partnerships with best of breed suppliers to include their solution. This is the case for AV solutions as is for IPS and Application control. For AV solutions, we have Kaspersky and AVG. For IPS and Application control, we have Trend Micro. We are very careful about what the market is demanding. Now we are working to enhance our wireless capabilities such as Hotspot services, for hospitality, airports etc. We continue to refresh our boxes, ensuring they are always offering state of the art technologies.

"The partner program has greater stress on skilland certifications than sales targets. We are focusingon very skilled partners that can constantly work on

our products and support our customers."

Page 24: Integratorme jan2015

24 | January 2015

Discuss solutions from InfoWatch?InfoWatch is a DLP solutions company, focusing on solutions that help prevent data loss prevention. The company was a spin-off from Kaspersky and is over 10 years old. The InfoWatch Group consists of four companies InfoWatch Ltd. (data leakage prevention software), Kribrum Ltd. (social media monitoring and analysis aimed at online reputation management), EgoSecure GmbH (end-point security software), and Appercut (business application source code analysis).

Traffic Monitor is our flagship product and our core strength has been in DLP market. In addition, we offer the InfoWatch EndPoint Protection, InfoWatch Appercut for securing company’s applications from backdoors and vulnerabilities, InfoWatch Targeted Attack Detector aimed at detection and prevention of attacks the target of which is frequently large corporations, government agencies and defense companies.

Please elaborate on key features in the current version of Traffic Monitor Enterprise?InfoWatch Traffic Monitor Enterprise is a comprehensive solution for data protection, loss prevention and monitoring the transmission of sensitive information outside a company, as well as for the protection of the company from internal threats.The Traffic Monitor Enterprise 5.0 brings in a new approach to interfaces for enterprise solutions., with easy access to data for integrating business divisions. It provides an improved potential for detecting and analyzing data.

Traffic Monitor Enterprise 5.0 allows security management to engage heads of business units.The application of tools for analyzing data protection and their transfer channels gives a comprehensive picture of information flows within the organization's business processes and helps identify similar paths for transferring confidential information and prevents access to it by unauthorized persons. It also reveals collusion, disloyal employees and intruders.

Constructing policies in InfoWatch Traffic Monitor Enterprise 5.0 can even be done by inexperienced users, since the integrity and precision of the policy is calculated automatically by the system. You can specify how data can be copied and stored, and set various parameters for determining incidents and reactions to situations, in concise, understandable form.

It allow document recognition and analysis

TechKnow | InfoWatch

With the rise in the threat scenario of confidential data leaks

perpetuated in majority by insiders in organizations, there is a

growing relevance for advanced DLP (Data leakage prevention)

solutions. Andrey Sokurenko, Business Development Director,

Infowatch discusses the company’s focus areas in DLP

Everwatchful

Andrey SokurenkoBusiness Development Director, Infowatch

Page 25: Integratorme jan2015

January 2015 | 25

even in the case of small text fragments which can be inserted into any document or sent in informal communications or via IM systems.New technologies that have been added to InfoWatch Traffic Monitor Enterprise 5.0 include Database Detection, Filled Form Detection, Stamp Detection, Passport Detection and Credit card Detection.

Discuss how the solutions are deployed and managed?There are three phases of engagement. We call them pre-DLP, DLP and post DLP. In the Pre DLP phase, we try and understand pain points, technical requirements etc. This stage includes deep data analysis and categorization. This is done with the help of InfoWatch Auto-linguist engine and consultancy of InfoWatch linguists. Since the majority of data in companies are unstructured and spread out across documents, files and storages, companies aren’t on top of the confidentiality required for various data; companies simply do not know which of their data are confidential and therefore can’t protect them effectively. Once, all data is classified into categories on the basis of levels of confidentiality, a DLP system can be installed.

In the DLP phase, our engineers and partners help customers implement, integrate and understand steps to use. Monitors are installed on all data transfer channels, for monitoring all data moving inside the company and outside the company perimeter. In instances of any attempt to transfer confidential data outside the company perimeter, either the system will block the attempt or alert.

The Post-DLP stage includes investigation of data leak incidents with help of InfoWatch Forensic Storage. It’s a specialized storage containing

an archive of all information flows in the organization, including incidents of security policy breach and leakage of confidential information; this storage is a legally relevant evidence base for internal incident investigation and court proceedings.

In the Post DLP phase, special reports are generated on the status of the customer after the implementation as agreed with customer. This reports the health of the situation inside the company and makes recommendations to enhance security.

Reports generated can profile kinds of leakages, who is responsible, how to prevent etc.Forensic is an important part in this as it helps us block and investigate cause of leakage as well as point out the insider who is responsible for the data leak.

Discuss the need for DLP solutions and how the Middle East has responded?The Middle East is quite developed in terms of demand for DLP solutions and this is set to grow further. We have been driving market awareness of DLP solutions. Our Analytics Centre generated a report which we make available to customers, showing situations from around the world and illustrating schemes that data thieves are making to enable data leakage from inside to the outside.

Each year the number of leakages has been growing. According to the report from InfoWatch Analytical Centre, more than 500 cases of data leakage incidents were recorded during the first half of 2014. This figure represents a 32% increase in confidential

information leakage in comparison with the same period in 2013. Out of the 654 leaks of confidential information that were recorded

and reported in the media in the first half of 2014, it was found that employees were responsible for 71% of cases.The results highlight that corporates need to be more aware of such threats and implement the required solutions to protect their data and businesses.The statistics found in the report clearly show that leaks through "traditional" channels - mail, e-mail, paper documentation, theft and loss of equipment – still form the lion's share of accidental leaks.

Companies should not only have DLP solutions, they should make sure to get advanced solutions. We deliver the knowledge, trainings etc to help customers choose the right solutions.In short, these are tools to increase productivity of the company.

Discuss your distribution and partner strategy?Scope Middle East and EMT are our distributors as well Fakhro Electronicsin Bahrain. They have knowledge and expertise in our solutions and have trained specialists. Our technical experts are visiting the region regularly to train the technical teams of our partners, thus providing them with extensive knowledge and expertise in data leakage prevention and other information security areas. All our partners undergo InfoWatch certification and so get the status of InfoWatch Group certified partners.

They are well trained in the three phases of deploying DLP services, including post-DLP. For customers, it is important to be assured that the systems will work out fine in the longer run after deployment.

"The Middle East is quite developed in

terms of demand for DLP solutions and

this is set to grow further. We have been driving

market awareness of DLP solutions."

Page 26: Integratorme jan2015

26 | January 2015

SNB Middle East is today an established name in value distribution in the region and has expanded its focus areas considerably in the past couple of years. Abdul Rauf Chougle, Group General Manager discusses the company’s growth and focus.

Discuss the areas of focus as of today for the company?Four years ago, we started out as a distributor for data storage, primarily, disks, tapes as well as backup and recovery software. For various reasons but primarily in addressing requirements from our partners for different solutions and to help them in their turnkey project requirements, we got into new areas.

So as of today, we are distributors for solutions across four key segments- data storage, surveillance, networking and security.

Elaborate on your various portfolios?SNB's Data-Storage portfolio comprises of Disk, Tape and Backup & Recovery solutions.We represent Nexsan and Infortrend on Disk, TandbergData on Tape and EVault on Backup & Recovery. All brands we represent have products to address SMB and Enterprise requirements.

We began to address a lot surveillance opportunities. Surveillance partners were keen to source other related products and solutions as storage was only a small part of surveillance. That led us into IP cameras and Ethernet connectivity solutions.

The large picture

Point2Point | SNB

So in our portfolio today, we have IP cameras from Mobotix, Video Management software from Axxon, connectivity solutions from Allied Telesis. We have strengthened the surveillance portfolio following partnerships signed with Pelco (by Schneider Electric) for its cameras and Tripp Lite for its power and connectivity solutions.

With the signing up for Allied Telesis, another frontier opened up and we were adding other networking vendors. We signed up for Proxim for outdoor wireless and Enterasys for high end enterprise switches. Enterasys got bought out by Extreme Networks and so we are distributors for Extreme Networks now.

For the last one year, we have been building the security focus. We signed up with Seclore, which is into information rights management. Seclore offers an innovative solution, FileSecure, which enables organizations to control usage of information wherever it goes, both within and outside of the organization’s boundaries. The ability to remotely enforce and audit who can view, edit, copy, and re-distribute files empowers organizations to embrace mobility, Cloud and external collaboration with confidence. Then we signed up with GTV Technologies which is into DLP. The DLP solution provides organizations the overall control and visibility needed to manage advanced threats, analyze data, prevent data loss, enforce compliance while protecting the brand, intellectual property and reputation of some of the world's largest enterprises.

We also signed up with Cyberoam for its range of UTM solutions.

Are all of these growth segments in the region?We continue to see growth across all segments we focus on. Surveillance has been for sure a growth segment in the region. That is also being driven because of the compliance requirements. In the UAE, many of the Ministry requirements are for large resolution cameras and for retaining data for a specific period of time. The surveillance needs of government

Abdul Rauf ChougleGroup General Manager, SNB ME

Page 27: Integratorme jan2015

January 2015 | 27

organisations, as well as the banking and finance, oil and gas, hospitals and transportation sectors are driving the demand.

Storage has been steadily growing and there is good traction for Cloud backup. IT security has been a segment showing consistent growth and we are looking to add endpoint protection solution to what we offer in this space.

Have you spun off the services as a separate entity?We now have a different company for services that was spun off. That acts as ASP for some vendors. We are also looking to include Training as a focus activity.

As a VAD, what do you see as your specific value attributes?We don’t have commodity products. We

are able to offer end to end solutions, whether it is surveillance (cameras, VMS, storage and connectivity), data storage (Discs, tapes, data and backup software) etc, networking (wired, wireless, short distance and long distance connectivity products). IT security is still relatively new but we still have a few products and intend to strengthen offerings in this domain.

SNB has always been a Value-Add distributor focused on being an end-to-end solution provider. SNB has a strong technical team to offer pre and post-sales technical support to all our partners. SNB also offers sales and technical trainings to partners and also helps by getting

involved in end-user interactions.

Discuss EA Business focus?We have a local partner in East Africa who is driving the

Business there.Kenya office still depends on the UAE operations for support. The plan is to grow it into a full-fledged branch in 2015. What has the expansion been into other GCC countries?We have offices in Doha and in Saudi Arabia. We are looking for an office in eastern region of Saudi Arabia. Further, we have signed authorized distributorship with Fluke Networks to promote its entire network testing equipment portfolio that are spread across network deployment, network and application performance measurement and troubleshooting in the KSA region.

"SNB has always been a Value-Add distributorfocused on being an end-to-end solution provider.

SNB has a strong technical team to offer preand post-sales technical support

to all our partners."

CNME ICT Achievement Awards

[email protected] | www.finessedirect.com | facebook.com/finessedirect

100+ Enterprise Clients | 200 + Professional Team | Global Offices | Strong Domain Expertise

Cloud | Mobile | Social MediaBFSI | Education | Energy | Healthcare | Hospitality

Business Intelligence & Analytics | Enterprise Content Management | Governance, Risk & Compliance

Enhance the Learning Experience..!

ICT Integrator Awards

ACN Arab TechnologyAwards

GEC Awards NBAD SME Stars of BusinessAwards

Risk Management ExcellenceAwards

RED HERRING Global Top 100

Page 28: Integratorme jan2015

28 | January 2015

And enterprise networks are

no exception. Rather than

being made up of switches

and cables, they’re comprised

of the people, data, devices

and infrastructure that

conspire together to make

things happen. These are

the networks that provide

personalised medicine to

paediatric cancer patients

that make sure ships safely

enter and leave ports of call,

and enable global business to

grow.

Knowing this, one of the

prime focuses for today’s

technology industries is to

empower and entice both the

networked business and the

networked you – they watch,

participate in, and try to control

your networks. Expanding,

informing and building

different types of networks

is big business for Verizon,

LinkedIn, and Google Ads to

name but a few.

So what makes up the

network itself? For decades

now, the network has been

perceived by the technology

industry as a subsystem, or as

plumbing; a perception that is

now outdated and obsolete.

I’d suggest that it’s now

time to consider the network

as being so much more than

the switches, routers and

load balancers sold by the

likes of Cisco, Juniper and

Brocade; more than the Cloud

and the data centre. And I

believe that existing network

Stuart Bailey, founder and CTO, Infoblox discusses how we can no longer rely on the traditional model for answers and now is therefore the time to embrace the new model, rethinking our definition of the network and how we build and manage it.

The Internet permeates our

lives, a complex global

TCP/IP network that we take

for granted whether we use it

for shopping, for research, or

for watching funny cat videos.

However, look closer and

you’ll see that the Internet is

responsible for less than 20 per

cent of the real network that

we all use every day. Indeed,

when you take into account a

world of intranets, machine-

to-machine networks, RFID

sensors chirping information

between pallets and shippers,

and even robots tweeting

each other, it’s clear that your

network is vastly bigger than

the Internet itself.

Networks contain the

data, connections and choices

that are woven throughout

every aspect of your personal

and work life. Each day your

network is created by the

interactions you make with

your devices, apps, clouds and

social networks.

It will constantly shift and

redefine itself depending on

how you’re using it, what

you need from it, and the

new information that comes

into it, teaching it to behave

differently for you. This

network that you’ve created,

and the way that your devices

interact with each other on

your behalf, offer significant

value and meaning to others.

Whether it’s your own,

your doctor’s, or that of the

NHS, each network is unique.

The Network is dead. Long live the network!

Insight | Infoblox

Stuart BaileyFounder & CTO, Infoblox

Page 29: Integratorme jan2015

January 2015 | 29

providers aren’t

in a position to

see and empower

the network as it

really is – a means

of containing and

facilitating all of

the intelligence and

action entwined within your

life and your business.

Networks will change

instantly and unpredictably,

all of the time, so we need

a radical rethink of how we

should build, manage and

consider our network needs

so that they can join us here,

today, in the 21st century.

We’re facing a massive

shift in technology and

economics as the world

demands ever more from its

networks.

A recent study

by International Tele-

communications Union, for

example, predicts that the

number of mobile phone

accounts will rise from 6

billion today to 7.3 billion next

year. And, while this demand

rises, the price of hardware

will continue to fall, cheap

and reliable bandwidth will

become more widely available,

and there’ll be increasingly

less expensive ways to access

vast amounts of data. The

economics of our world are

shifting as a result, and our

networks are feeling immense

pressure to shift with them.

It is hugely complicated,

not to mention a little scary,

using existing tools to manage

networks as they exponentially

scale. Network engineers with

years of experience in the

traditional internet are now

finding themselves so busy

trying to scale and manage this

growth that they have no time

or room to breathe. Human

hands can no longer keep

up with the rate of change

required by the new network.

The ratio of networking

professionals to the velocity of

change is now forever broken

and neither traditional methods

not traditional thinking can

repair it.

But, by looking at the

network differently, there

are other ways to scale and

manage these new demands.

First, it’s now possible

to measure a network’s

complexity. Tapestry, a piece

of open source software freely

available from FlowForwarding.

org, uses network data to

calculate a Network Complexity

Index. This enables IT teams

to plan for network growth

and reduce the costs that

are typically associated

with increasing complexity.

Ultimately, taking such

measurements can save time,

money and precious resources

by employing different

technologies and strategies.

One such strategy relies

on automation with a control

plane at the heart of a

software-defined network.

A control plane is viable

due to the vast amount of

computational power now

available to run sophisticated

and affordable software that

can scale in order to manage

an exponentially expanding

network. The right software in

the control plane, combined

with shrewd use of data

analytics will allow network

managers to do more, faster,

and without the need for an

endless supply of engineers.

Businesses need access to

a robust, future-proof network,

but to hire the number of

engineers required to manually

scale and manage today’s

networks with today’s tools

would be beyond the budget

of most companies and nearly

all individuals, so there really is

no other option.

We can no longer rely

on the traditional model for

answers, so now is the time

to embrace the new model,

rethinking our definition of

the network and

how we build and

manage it.

At the Open

Networking Summit

earlier this year,

Intel launched its

Open Network

Platform Switch and Server,

a technology as hugely

disruptive as the Apple I was

almost 40 years ago. A low-

cost programmable network

switch, Intel’s new technology

puts the power in the

software, where it should be.

A move to commodity

hardware in networking, as

has happened with servers

over the last ten years, will

redefine the entire ecosystem

of networking.

Low cost PCs and

commodity servers caused the

entire mainframe industry to

be redefined before going on

to change business and life

itself. And in the same way, by

embracing this radical change

in networking, we’ll see the

whole world change again.

As we’ve seen, the future

of networks doesn’t lie in the

Internet, or in the traditional

networking model.

Instead, it belongs to

the new, highly scalable,

adaptable, software-enabled

complex networks. The people

and organisations that will

scale and thrive are those that

embrace the complexity, the

beauty and the value that the

real network has to offer.

"Networks will change instantly andunpredictably, all of the time, so we need a

radical rethink of how we should build, manage and consider our network needs so that they can join us

here, today, in the 21st century."

Page 30: Integratorme jan2015

30 | January 2015

Insight | Dimension Data

Top 5 data centretrends to watchin 2015

Unlocking the value of technology is

more important than the technology itselfThe next data centre trend to watch relates to technology, or rather, the ability to unlock its true value. Leahy explains: ‘Increasingly, CIOs aren’t asking for our assistance with technology issues, they’re seeking help in updating their operational processes so that they can extract maximum value from their technology investments.’

Frank Casey, Dimension Data’s Director for Managed Services agrees: ‘It’s all about internal maturity. Every client I speak to is at a different level of maturity and most feel they have a fair amount of work to do. The goal is to move the organisation forward, in a structured manner.’

Casey sees automation as key to extracting maximum value from technology. ‘Most IT teams are focused on making sure that infrastructure is up and running, and, due to workload and time pressures, aren’t thinking about how they can drive greater levels of automation.’

Making informed decisions regarding new technology investments is critical to ensuring you extract maximum value from them. The market’s shifting away from component-based hardware and software, and moving to bundled technologies that feature high levels of automation. However, it’s not always easy to determine how to get the most out of these technologies, and how they’ll interoperate with the legacy infrastructures and workloads that may be running in a public cloud.

2 Big gets bigger, small gets smaller

The data centre market is entering a period of unprecedented transition, and the pace of this change looks set to accelerate during the year ahead. Smaller, enterprise-owned data centres are shrinking in size ... and on the other end of the scale, the growth of mega facilities continues unabated. Kevin Leahy, Dimension Data’s Group General Manager for Data Centres explains: ‘A year or two ago, we were debating whether the data centre and the cloud were quite ready to come together. Clients were concerned as to whether the cloud was geared to support production workloads and compliance requirements. But today, every CIO I talk to isn’t asking if they should move to the cloud. Now it’s a question of how much of their environments they can move to the cloud and how quickly they can make the transition.’

This has dramatic implications for the data centre itself. Organisations need to re-evaluate:• the amount of data centre space they need• where their remaining data centre facilities should be locatedOn the other end of the scale, large data centres, typically owned by industry and cloud provider heavyweights, see nothing but growth on the horizon. These giant facilities are expanding either due to the fact that they’re absorbing the capacity being transferred to them from customers looking to exploit the cloud model, or simply as a result of the nature and complexity of the businesses they serve.

1

Kevin LeahyGM, Dimension Data Group

Treb RyanChief Strategy Officer, Dimension Data Group

Page 31: Integratorme jan2015

January 2015 | 31

What does 2015 hold in store for data centre professionals? Read on as Dimension Data experts discuss the top trends to watch and

their expected impact on business.

‘Software-driven’ transforms into

business valueAs they look ahead to 2015, the challenge facing many organisations is how to ensure that their efforts in implementing Agile-based methodologies result in tangible business value.

Colin McNamara, Chief Cloud Architect at Dimension Data subsidiary, Nexus, shares some of his insights and experiences: ‘One of the tools that our agile software development team uses in its development operations and with clients, is value stream mapping. It’s a ‘pencil and paper’ process that allows you to visualise the impact of your activities on the business and prioritise your activities.’ McNamara also believes that open source technologies like OpenStack and OpenDaylight can also add significant value.

4 It’s time to extract the value

of information While there’s a lot of hype in the market around big data and analytics, most organisations are in the early stages of finding ways to derive more value from their data and find ways to translate it into competitive advantage.

Leahy believes that it’s time for data centre professionals to move beyond managing infrastructure and trying to find ways to reduce storage costs, and begin to explore the potential new value inherent in information.

Ryan cautions that decisions regarding data and storage can’t be made in isolation, especially in the era of analytics and big data. ‘The type of storage you need will depend on what you want to accomplish with your data and how you want to accomplish it. It’s not as simple as saying ‘‘I want to get into big data, so I'll just start accessing the tools."’

Hadoop and MapReduce are built on the premise that you have fast sequential read access to cheap disks. However, traditional cloud servers don't offer this capability. They’re designed for highly transactional applications. So it’s important to consider what you want to do with your data. Do you want to perform transactions? Or do you want to archive it and later extract it and aggregate it into a big data construct? You also need to think about how applications are optimised to ensure you’re able to get the data back out of the storage environment when you need it.Object storage is another area of growing interest on the part of businesses that are testing the big data waters.

5 Agility: it’s about exploring the art of

the possibleTreb Ryan, Chief Strategy Officer for Dimension Data’s ITaaS Service Unit believes that IT organisations need to use technology advancements, such as cloud and Agile development methodologies, to explore the art of the possible ... boldly test new ideas and approaches ... and have fun.‘Many IT organisations still operate their data centres the way they did 20 years ago, using waterfall processes and idle-driven systems,’ he explains. ‘They’re missing a great opportunity to take advantage of new architectures and systems which will allow them to be more responsive to their businesses and more cost-effective.’Investing in Agile software development technology is a first step in capitalising on these opportunities. IT leaders need to instil a culture of people, processes, and software working together and responding to change, rather than following a rigid plan. The concept of consumption-based billing for IT capacity is a key enabler of this transformation. But the advantages extend well beyond cost savings alone; this model empowers IT teams to test new ideas quickly, and unleash innovation, without exposing the business to risk. Developers can try things out without having to put in place formal structures. And if something works, great; if it doesn't, then they can go back and try something else.

3

Page 32: Integratorme jan2015

32 | January 2015

eyetech

AXIS F44 Seagate EnterpriseNAS HDD

Overview:

Axis Communications has added AXIS F44 Main Unit to its

flexible and modular AXIS F Series. The series is based on

a divided network camera concept where the camera is

split into a sensor unit, made up of a lens and image sensor

with a pre-mounted cable up to 12 m (39 ft.) long, and

a main unit, which is the body of the camera. Since the

main units and sensor units with different lens types are

sold separately, customers can choose the components as

required and can easily change them to fit the surveillance

need. The products allow for a highly discreet installation

since the small sensor units can be installed virtually out of

view in tight places and the main unit can be placed up to

12 m away where there is space for it.Key features:

• Simultaneous streaming of four separate high-resolution 1080p videos at 12.5/15 frames per second (50/60 Hz) or four HDTV 720p videos at full frame rate

• Quad view, a stream made up of four separate views from the connected sensor units

• Two-way audio

• Input/output ports for external devices to enhance alarm management

• RS232 port for integration of external data to the video

• Local storage of recordings using its two built-in full-sized SD card slots

• Power over Ethernet, as well as the option of connecting to an 8-28 V DC power supply

• Intelligent video capabilities such as video motion detection, active tampering alarm and downloadable applications through the AXIS Camera Application Platform

Overview:

Seagate has extended its offerings to small and medium-

sized businesses in the region seeking to optimize their

computing for performance and reliability using Network

Attached Storage (NAS) systems. The new Enterprise

NAS HDD is a high-capacity drive available in capacities

up to an industry-leading 6TB and is designed to perform

at high levels even under demanding workloads and in

environments that call for global availability and 24x7

accessibility.

Key features:

• With a 50 percent capacity advantage over other mid- range NAS offerings, the Enterprise NAS HDD 6TB drive delivers the highest capacity available on the market.

• Using RV sensor technology, the Enterprise NAS HDD can also sustain performance streaming and random read/write workloads for growing business data needs, intrinsically adjusting and compensating based on external vibrational disturbances

• In the event of a failure—be it environmental, human error, or accident—the Enterprise NAS HDD is supported by Seagate’s own Rescue Data Recovery plans which provide end-to-end protection enabling industry-leading data recovery with more than a 90 percent success rate.

• The plans also cover NAS HDD targeting the SOHO and prosumer NAS market, and the Surveillance HDD targeting video surveillance systems.

• Available in 2, 3, 4, 5 and 6TB capacities, Seagate Enterprise NAS HDD can deliver up to 96TBs in one 16- bay rackmount or tower form factor.

Page 33: Integratorme jan2015

January 2015 | 33

Overview:The Silver Peak NX-700 is a new low-cost, small form-factor

WAN optimization platform for connecting the smallest of

branch offices with data center and cloud applications.

The Silver Peak NX-700 is designed to optimize 2 megabits-

per-second (Mbps) of WAN capacity in a form factor the size

of a paperback novel. The NX-700 is the physical equivalent

to Silver Peak’s VX-500 virtual appliance, which also supports 2

Mbps of WAN bandwidth and 8,000 simultaneous connections.

For smaller locations without existing virtual infrastructure, the

NX-700 provides a plug-and-play physical option for extending

WAN optimization to the branch.

Silver Peak delivers the industry's broadest portfolio of

physical and virtual WAN optimization solutions. The products

are sized for the smallest of branch offices to the world's

largest data centers, supporting up to 10 gigabits-per-second

(Gbps) of WAN capacity and 512,000 simultaneous flows.

Key features:• While the Silver Peak NX-700 is small and low-cost, it provides all of the same functionality of Silver Peak’s larger appliances for overcoming network bandwidth, distance and quality challenges when moving data over distance.

• The Silver Peak NX-700 can be used to build out a Silver Peak Unity WAN fabric, which unifies the enterprise WAN with the Internet and public cloud.

• Unity gives IT the ability to monitor and control connectivity to the cloud while ensuring consistent performance for every enterprise and SaaS application.

• With Dynamic Path Control in the appliances, customers can maximize the use of Internet connectivity in the branch to spend less on branch office bandwidth.

LANmark-OF Tight Buffer Universal Cable

Overview:

Nexans announced the launch of its new LANmark-

OF Tight Buffer Universal Cable, which harmonizes its

Tight Buffer Indoor and Universal cable portfolio with

an installer-friendly and more cost effective Tight

Buffer Universal cable for indoor and outdoor use.

Nexans developed the new cable using a new type

of glass yarn that combines rodent protection with

installer friendliness and avoids skin-irritation when

compared to similar products of other vendors.

Key features:

• The LANmark-OF Tight Buffer Universal cable is a fibre cable that can be used indoor and outdoor in a duct.

• It complies with the indoor fire requirements and can be installed indoor both vertically and horizontally.

• It can also be used for outdoor installation in a duct as the water tight glass yarns make the cables fully waterproof and rodent retardant.

• The latest LANmark-OF Tight Buffer Universal cables includes a new type of glass yarn that combines rodent protection with installer friendliness and avoids skin-irritation.

• It is dielectric and fully dry and has 900 um buffered fibres. This second coating till 900 um provides additional protection of the fibres and facilitates the handling when terminating the fibres in a patch panel.

• The easy strip tight buffer design allows stripping the fibre over 10 cm in one action. It is a cost effective solution for short and medium distances.

• The LANmark-OF Tight Buffer Universal is most suitable for direct termination by either anaerobic or hot melt connectors as well as with splicing of pigtails.

Silver Peak NX-700

Page 34: Integratorme jan2015

34 | January 2015

Healthcare providers in the Middle East and North

Africa will spend US $3 billion on IT products and services in 2014, an increase of 1.3 percent over 2013 revenues, according to Gartner, Inc. This forecast includes spending by healthcare providers (includes hospitals and hospital systems, as well as ambulatory service and physicians' practices) on internal services, software, IT services, data center, devices & telecom services.

Telecom services, which include fixed and mobile telecom services, will remain the largest overall spending category throughout the forecast period within the healthcare providers sector with an expected market size of US $1.3 billion in 2014.

Software will increase 7.8 percent in 2014 to reach US $382 million. Internal services will grow 7.4 percent in 2014

Stats & Trends

Healthcare providers in MENA to spend US $3 Billion on IT in 2014

to reach US $473 million. Internal services refer to salaries and benefits paid to the information services staff of an organization. The information services staff includes all company employees that plan, develop, implement and maintain information systems. IT services will grow 6.3 percent in 2014 to reach US $379 million, up from US $356 million in 2013. IT services

Kaspersky Lab has launched the interactive project ‘Targeted

Cyberattacks Logbook’ that brings together all the information it holds on the most sophisticated cyber campaigns. The company’s team of experts also has compiled a list of the top emerging threats in the APT world. These include:

The fragmentation of bigger APT groups. A growing number of smaller threat actors are likely to lead to more companies being hit. And larger organizations are expected to experience a greater number of attacks from a wider range of sources.

APT-style attacks in the

Research shed light on APT campaigns

cybercriminal world. The days when cyber-criminal gangs focused exclusively on stealing money from end users are over. Criminals now attack the banks directly because that’s where the money is. And they use APT techniques for these complex attacks.

Targeting executives through hotel networks. Hotels are perfect for targeting high profile individuals around the world. The Darkhotel group is one of the APT actors known to have targeted specific visitors during their stay in hotels.

Enhanced evasion techniques. More APT groups will be concerned about exposure and will take more

advanced measures to shield themselves from discovery.

New methods of data exfiltration. In 2015, more groups are expected to use cloud services in order to make exfiltration (the unauthorized transfer of data from a computer) stealthier and harder to detect.

The use of false flags. APT groups are expected to exploit government intention to ‘naming and shaming’ suspected attackers by carefully adjusting their operations to plant false flags (that make it appear as if the attack was carried out by another entity.)

spending will be led by growth in business process outsourcing (BPO), software support and consulting.

“The Saudi Arabian government is moving towards a growth plan for its healthcare apparatus underpinned by investments in technology. We expect spending across the hospitals, ambulatory care and the setting up of its communication backbone,”

said Anurag Gupta, research director at Gartner. “UAE will continue to evolve its focus on leveraging its past investments on transactional healthcare systems. Turkey is also closely examining its healthcare technology landscape, and we expect further developments within the public healthcare sector. Private healthcare will continue to be a major growth area across the region.”

Page 35: Integratorme jan2015

The Middle East and Africa’s EssentialI.T. Security Knowledge Platform

3 DAYS To ChallengeYour Security Strategy

“The perfect opportunity to connect with CIOs, CTOs, CSOs”

Sanjeev Walia,Director, Spire Solutions

26-28 APRIL 2015

Critical Security for Key Industries

ENDORSED BY DIAMOND SPONSOR

PLATINUM SPONSOR

CO-LOCATED EVENT

GULF ENTERPRISE MOBILITY EXHIBITION & CONFERENCE

SILVER SPONSOR

GOLDSPONSOR

Register your interest now

www.gisec.ae

+971 4 308 6468 / 6566

[email protected]

GISECDUBAI

GISECDUBAIGISEC - GULF INFORMATIONSECURITY EXPO AND CONFERENCE

GISEC_VAR MEA_247x358.indd 1 1/6/15 8:49 AM

Page 36: Integratorme jan2015

AUTHORIZED DISTRIBUTOR

Aptec - an Ingram Micro Company

P. O. Box 33550Dubai Internet City,Dubai, UAEE-Mail: [email protected]

Tel.: (+971 4) 3697 111Fax: (+971 4) 3697 110www.apteconline.com

www.dlinkmea.com

The security of your business is at risk if there is no monitoring system in place to protect your business assets. Choosing to implement IP Surveillance offers the advantage of leveraging your existing network infrastructure to maximise your investment. D-Link can supply end-to-end networking solutions to build an affordable and easy-to-deploy system to ensure the security and safety of people, possessions and places.

Migrate to IP Surveillance

Making the move to digital technology at your own pace

DCS-3716PoE HD Day and Night WideDynamic Range IP Camera

DCS-7513Full HD WDR Day & NightOutdoor Network Camera

DCS-6915Full HD High-Speed

Dome Network Camera

DCS-5615 Full HD Mini P/T

Dome Network Camera

DCS-6315HD Outdoor Fixed

Dome Camera with Color Night Vision

DCS-6115HD Indoor Fixed

Dome Camera with

Color Night Vision