value plus april014

28
value plus the QUARTERLY EMC: Product Watch HP: Preparing for SDN wave Cisco: Transforming businesses RSA: Game changer Honeywell: Highlights HP: Secure Access & Continuity in virtualized & BYOD 04 06 08 14 18 20 April 2014 presents A SPECIAL PUBLICATION FROM REDINGTON GULF VALUE DIVISION Redington Value offers solutions to equip the market in the wake of trends such as BYOD and virtualisation. SEIZING OPPORTUNITIES

Upload: aditya0312

Post on 08-Jun-2015

138 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Value Plus April014

valueplustheq u a r t e r ly

EMC: Product Watch

HP: Preparing for SDN wave

Cisco: Transforming businesses

RSA: Game changer

Honeywell: Highlights

HP: Secure Access & Continuity in virtualized & BYOD

040608141820

April 2014presents

A speciAl publicAtion from redington gulf VAlue diVision

Redington Value offers solutions to equip the market in the wake of trends such as BYOD and virtualisation.

SeizingopportunitieS

Page 2: Value Plus April014

stands the test

WANT TO LEARN MORE?CONTACT US ON WWW.HONEYWELLAIDC.COM

OR CALL +31 40 7110 041

© 2013 Honeywell International Inc. All rights reserved.

For more information or to place an order on Honeywell, please write to [email protected]

At Honeywell, we believe that the measure of durability over the lifetime of an industrial barcode scanner is the tumble test.The Granit 1910i has been tested to endure 5,000 drops from a height of 1 meter. Drops from this height are most common in industrial use cases making Granit 1910i the industry’s most rugged 2D Area-Imaging Device. For your next 2D industrial scanner, demand nothing less.

Page 3: Value Plus April014

resolve security risks, creating cyber

security strategy and policies and

finally regularly reviewing and

updating these strategies are the steps

to a secure business.

This edition of The Value Plus

talks about the security issues that

come with trends such as BYOD and

data centers. We look forward to

your feedback and suggestions, and

wish you all a great year ahead.

Yours sincerely,

Raj Shankar,

Managing Director, Redington Gulf

04 EMC: Product watch06 HP: Preparing for SDN wave08 Cisco: Transforming businesses14 RSA: Game changer18 Honeywell: Highlights20 HP: Secure access &

continuity in virtualisation, BYOD

24 Channel events

CONTENTS04 06

08 14

Dear Partners,

security solutions are no longer

an after-thought. Today,

organizations are having a

tougher time mitigating

security breaches, and the average

financial impact of each breach is

increasing. Security was once under

the domain of the IT department but

now there is an urgent need for it to be

viewed strategically rather than

operationally. There are various

reasons why this transition needs to

happen. Companies have more data as

compared to a decade ago and it is

now also recorded and stored for

analysis. Earlier, the data was confined

from the director:

in the company’s data center facility

but with the rise of hybrid cloud

services and organizations leveraging

infrastructure as a service, software as

a service and security as a service, the

data now resides in the cloud too.

Employees accessing this information

through the explosion of new devices

and environment complicates the

process further. In such a scenario,

regulatory compliance makes it

mandatory to ensure security is in

place. Companies must prepare to face

advanced threats as technology evolves

and becomes pervasive. Identifying

organizations’ key data asset and

potential risk associated with it,

engaging with security specialist to

Product WatchPreparing for SDN wave

Transforming businesses Game changer

April 2014 The ValuePlus Quarterly 1

for more information, please write to [email protected]

Page 4: Value Plus April014

For more information or to place an order on Barracuda Networks, please write to [email protected]

Page 5: Value Plus April014

Dear Readers

It gives us immense pleasure to announce our partnership with Oracle to offer their solutions for the ME market. This gives us an opportunity to provide our channel with one of the ‘best of breed’ solution sets across the entire stack – from applications to hardware – all from a single company.

We, at Redington Value, will focus on the development of the Oracle channel in the Middle East region, driving deeper adoption of Oracle’s technology and application products within the Middle East IT channel. We will offer our partners pricing and deal support for Oracle solutions, as well as support in terms of enablement and demand generation. We will also be responsible for identifying a strategic network of specialist partners for driving deeper adoption of Oracle products within the ISV community in the region. And, we will invest in Oracle Authorized Solution Centers for the benefit of partners and customers across the region.

2014 has begun on a positive note and we expect that this trend will continue during the rest of the year. In the Middle East, majority of the growth is expected to come from the governments in Saudi Arabia, UAE and Qatar. Iraq and Libya will see an overall increase in IT spending as per the recent research reports. In Africa, the IT market is growing despite the limitation in infrastructure. VoIP and Mobility have taken off exponentially across all the countries in the African continent and will provide immense opportunities in this market. Another growing market in Africa for this year is IT security;

there is a growing concern among large organizations and government departments to protect their network.

Our focus for this year will be to promote technological solutions broadly in the following areas: virtualisation, converged infrastructure, storage and security (with focus on virtualized environments) along with BYOD and cloud computing.

In other developments, we have now moved into Angola and are hoping to achieve a strong presence in the region by the end of this year. 2013 saw us making very important partnerships with key vendors such as VMware, Eaton, Honeywell, RSA and the most recent one being, Oracle. For the remaining part of the year, we will be strengthening our partner and customer base for these vendors’ technological solutions.

Redington Value Marketing is offering demand generation tools to vendors and partners to grow their end-user customer base. We now conduct many end user workshops to educate the customer base using Redington Value proof of concept centers and generate leads for our partners and vendors. With our existing strong partner intelligence and growing end customer knowledge, we look to provide easier go-to-market strategy not only for vendors but also for our channel partners.

Wish you a prosperous quarter ahead.

Thanks and best regards, Ramkumar BSenior Vice-president, Redington GulfValue Division

Viewpoint by ramkumar

Bright outlook

April 2014 The ValuePlus Quarterly 3

for more information, please write to [email protected]

Page 6: Value Plus April014

Product watch

organizations of all sizes around the globe are dealing with a deluge of digital content and

unstructured data that is driving massive increases in storage needs. As these enterprise datasets continue to expand to unprecedented sizes, data protection has never been more crucial. A new approach is needed to meet the availability, protection and performance requirements of this era of ‘big data’.

EMC Isilon enables organizations to linearly scale

capacity and performance to over twenty petabytes, 106GB per second and 1.6 million SPECsfs2008 CIFS file operations per second. Moreover, they can do this within a single file system—one which is both simple to manage and highly available and redundant, as we have seen. Built on commodity hardware and powered by the revolutionary OneFS distributed file system, Isilon scale-out NAS solutions deliver key tenets such as unparalleled levels of data protection, no single point of

failure, fully distributed single file system, industry leading tolerance for multi-failure scenarios, pro-active failure detection and pre-emptive, fast drive rebuilds, flexible, file-level data protection and fully journalled file system along with extreme transient availability.

Isilon scale-out architectureAn Isilon cluster is built on a highly redundant and scalable architecture, based upon the hardware premise of shared nothing. The fundamental

building blocks are platform nodes, of which there are anywhere from three to one hundred and forty four nodes in a cluster. Each of these platform nodes contain CPU, memory, disk and I/O controllers in an efficient 2U or 4U rack-mountable chassis. Redundant InfiniBand (IB) adapters provide a high speed back-end cluster interconnect—essentially a distributed system bus - and each node houses a fast, battery-backed file system journal device. With the exception of the IB

High availability and data protection are the two benefits with EMC Isilon scale-out NAS.

4 The ValuePlus Quarterly April 2014

for more information, please write to [email protected]

focuS | EMC

Page 7: Value Plus April014

“EMC Isilon OneFS takes a holistic approach to ensuring that data is consistent and intact - both within the file system, and when exiting the cluster via a network interface.”

controller, journal card and an LCD control front panel, all of a node’s components are standard enterprise commodity hardware.

These Isilon nodes contain a variety of storage media types and densities, including SAS and SATA hard disk drives (HDDs), solid-state drives (SSDs), and a configurable quantity of memory. This allows customers to granularly select an appropriate price, performance and protection point to accommodate the requirements of specific workflows or storage tiers.

Highly available storage client access is provided via multiple 1 or 10Gb/s Ethernet interface controllers within each node, and across a variety of file- and block-based protocols including NFS and SMB/CIFS.

OneFS architectural overviewOneFS collapses the traditional elements of the storage stack—data protection, volume manager, file system, etc.—into a single, unified software layer. This allows for a highly extensible file system that affords unparalleled levels of protection and availability.

Built atop FreeBSD’s UNIX implementation, availability and resilience are integral to OneFS from the lowest level on up. For example, unlike BSD, OneFS provides mirrored volumes for the root and /var file systems via the Isilon Mirrored Device Driver (IMDD), stored on flash drives.

OneFS also automatically saves last known good boot partitions for further resilience.

On the network side, the Isilon logical network interface (LNI) framework provides a robust, dynamic abstraction for easily combining and managing differing interfaces, enabling network resilience. Multiple network interfaces can be trunked together with Link Aggregation Control Protocol (LACP) and Link Aggregation and Link Failover (LAGG) to provide bandwidth aggregation in

addition to client session failover and general network resilience.

Within the cluster, every disk within each node is assigned both a Globally Unique Identifier (GUID) and logical drive number and is subdivided into 32MB cylinder groups comprised of 8KB blocks. Each cylinder group is responsible for tracking, via a bitmap, whether its blocks are used for data, inodes or other metadata constructs. The combination of node number, logical drive number and block offset comprise a block or inode address and fall under the control of the aptly named Block Allocation Manager (BAM).

In addition to block and inode allocation, the BAM also handles file layout and locking and abstracts the details of OneFS distributed file system from the kernel and userspace. The BAM never actually touches the disk itself, instead delegating tasks

to the local and remote block manager elements respectively on the appropriate nodes. The Remote Block Manager (RBM) is essentially a Remote Procedure Call (RPC) protocol that utilizes the Socket Direct Protocol (SDP) over redundant InfiniBand for reliable, ultra low-latency back-end cluster communication. These RBM messages— everything from cluster heartbeat pings to distributed locking control - are then processed by a node’s Local Block Manager via the Device Worker Thread (DWT) framework code.

EMC Isilon OneFS takes a holistic approach to ensuring that data is consistent and intact - both within the file system, and when exiting the cluster via a network interface. Furthermore, the Isilon clustering technology is uncompromisingly designed to simplify the management and protection of multi-petabyte datasets.

On The neTwOrk SIde, The ISIlOn lOgIcal neTwOrk InTerFace (lnI) FramewOrk PrOVIdeS a rObuST, dynamIc abSTracTIOn FOr eaSIly cOmbInIng and managIng dIFFerIng InTerFaceS, enablIng neTwOrk reSIlIence.

April 2014 The ValuePlus Quarterly 5

for more information, please write to [email protected]

Page 8: Value Plus April014

6 The ValuePlus Quarterly April 2014

for more information, please write to [email protected]

Preparing for SDN wave

many enterprises are unable to achieve business innovation because of aging

networking environments. Enterprise network design and architectures have remained largely unchanged for more than a decade. While applications and systems have evolved to meet the demands of a world where real-time communications, rich-media, and mobility are the norm, the underlying network infrastructure has not kept pace.

A new paradigm in networking, SDN represents an evolution of networking that holds the promise of eliminating legacy human middleware and paves the way for business innovation. With SDN, IT can orchestrate network services and automate control of the network according to high-level policies, rather than low-level network device configurations.

By eliminating manual device-by-device configuration, IT resources can be optimized to lower costs and increase competitiveness.

The desire for automated and dynamic control over network resources is not new. However, with the emergence of technologies such as OpenFlow, the ability to implement SDN to increase agility has never been simpler.

HP is a leader in enterprise networking and as part of its commitment to deliver innovative solutions it has developed the HP Virtual Application Networks framework for delivering SDN solutions. OpenFlow is a key enabling technology for these solutions.

Sdn architectureThe SDN architecture departs from legacy solutions by building networks from three abstractions or layers.

First, the infrastructure layer acts as the foundation for an SDN

architecture. The infrastructure consists of both physical and virtual network devices such as switches and routers. These devices implement the OpenFlow protocol as a standards-based method of implementing traffic forwarding rules.

Second, the control layer consists of a centralized control plane for the entire network. The control plane is decoupled from the underlying infrastructure to provide a single centralized view of the entire network. The control layer utilizes OpenFlow to communicate with the infrastructure layer.

Third, the application layer consists of network services, orchestration tools, and business applications that interact with the control layer. These applications leverage open interfaces to communicate with the control layer and the network state.

Sdn simplifies campus and data center networksSDN solutions have applicability across many environments from the data center to the enterprise campus. One of the key solutions that SDN can deliver is network virtualization.

Network virtualization can be used to support multi-tenancy in large data centers, while individual enterprises retain control. Network virtualization can also be used to span multiple data centers.

Many organizations have found that their networks cannot accommodate the demands of server virtualization and workload mobility. Virtualized networks, enabled by OpenFlow, simplify the challenge of moving virtual workloads across data centers. IT managers can define network policies that support the massive amounts of traffic that are moved for workload automation, “Big Data”

HP helps build the foundation for SDN with OpenFlow.

focuS | HP

Page 9: Value Plus April014

April 2014 The ValuePlus Quarterly 7

for more information, please write to [email protected]

“As part of HP’s commitment to deliver innovative solutions it has developed the HP Virtual Application Networks framework for delivering SDN solutions.”

applications, and business continuity objectives. Network bandwidth can be automatically expanded to meet dynamically changing application and service requirements.

Network virtualization can also facilitate IT experimentation on the network. Few organizations want to risk experimenting on a production network. Laboratory test beds are too small to represent real-world networks. Now, IT can use an OpenFlow-enabled network to run more realistic tests in virtualized slices of the network. IT architects can have a practical way to experiment and explore new network technologies and protocols.

The ability to virtualize networks creates benefits for organizations from the smallest businesses to the largest enterprises.

Virtualized networks, enabled by the OpenFlow protocol, will make it easier for organizations to configure and manage their applications and resources across campus networks. For instance, a retailer can ensure regulatory compliance using virtualized networks to provision payment devices. This helps retailers comply with Payment Card Industry (PCI) security regulations in a way that is simpler and easier than ever before.

IT can create virtual networks to handle the real-time demands of video or voice applications, ensuring that users have the quality experience they demand. IT can gain unified control over wireless and wired LANs, making it easier for mobile users to stay seamlessly connected to their applications and services, no matter where they are.

Sdn enabled by OpenFlowAt the foundation of enabling SDN is an emerging open standard called OpenFlow, which ultimately allows the network to be more responsive to business needs. It has been in development since

2007, led by Stanford University and the University of California at Berkeley. It became a standard that is now defined by the Open Networking Foundation (ONF) since 2011.

OpenFlow hides the complexity of the individual pieces of network devices. It centralizes the control of those devices in a virtualized manner, simplifying network management for network managers.

The OpenFlow protocol uses a standardized instruction set, which means that any OpenFlow controller can send a common set of instructions to any OpenFlow-enabled switch, regardless of vendor.

OpenFlow is an open-standards way of virtualizing the network. Network managers can specify different policy rules for different groups of devices and users, which create multiple virtualized networks regardless of the physical network connections. This allows network managers to easily customize and manage these virtualized networks to ensure proper policies such as forwarding path, QoS and security.

OpenFlow is designed to be programmable. The OpenFlow instruction set allows network managers to try new ideas or create new protocols to solve problems specific to their organizations’ network needs. This allows network architects to experiment with new services and protocols on a real-world network that cannot be simulated in a test lab—or is too risky to undertake in a production network today.

In building SDN-ready network architecture, it is important to prepare the infrastructure layer for standards-based programmability. It is recommended that businesses ensure that all network infrastructure devices support the OpenFlow standard. OpenFlow support will future proof the network for SDN and provide

investment protection without requiring a forklift upgrade. When business are ready, they can easily build out an SDN solution on top of the OpenFlow-enabled infrastructure.

hP OpenFlow leadershipThe OpenFlow protocol is emerging from its roots in the research and education community and expanding to the enterprise. HP OpenFlow-enabled solutions have been a top choice for academic and commercial researchers. HP demonstrated the first commercial, hardware-based switch implementation of OpenFlow at ACM SIGCOMM in

2008. HP also participated in a public demonstration of OpenFlow at InteropNet Lab in May 2011.

HP has been an active contributor to the OpenFlow standards effort and is a founding member of the Open Networking Foundation. HP continues to work closely with partners such as Indiana Center for Network Transactional Research and Education (InCNTRE) to drive research in SDN and enable multivendor interoperability for OpenFlow-enabled solutions.

HP is a leader in implementing OpenFlow across its FlexNetwork portfolio with the broadest portfolio support of any tier-1 networking vendor and the largest install base of OpenFlow enabled ports.

hP Virtual application networksVirtualization has redefined how applications, servers, and storage

are deployed, and the same unstoppable force is heading toward the network. Once a brittle bottleneck standing in the way of dynamic IT, the network’s future is one of greater agility, scalability, and security. Now is the time to make that future a reality.

HP Virtual Application Network is a complete, end-to-end framework for delivering SDN solutions to enable businesses to create a scalable, agile, and secure network that empowers IT staff and streamline business operations. With Virtual Application Networks, businesses can focus on connecting users to

business applications and on the quality of experience—rather than on the details of configuring the network, device by device.

Together, HP FlexNetwork architecture and Virtual Application Networks create a unified platform through a programmable end-to-end control plane for dynamic and rapid deployment of applications and services giving the agility businesses need.

Virtual Application Networks are built on the tenets of application characterization, network abstraction, and automated orchestration to ensure consistent provisioning of resources to meet the service level expected by users.

With Virtual Application Networks you can spend more time connecting users to applications and less time on managing complex infrastructure.

Page 10: Value Plus April014

bring Your own device (bYod) has become one of the most influential trends that has or will touch each

and every it organisation. the term has come to define a megatrend occurring in it that requires sweeping changes to the way devices are used in the workplace.

What is BYOD? Does it mean employees pay for their own devices they use for work? Possibly, but the BYOD trend means much

more. It is about end users being able to use the compute and communication devices they choose to increase productivity and mobility. These can be devices purchased by the employer, purchased by the employee, or both. BYOD means any device, with any ownership, used anywhere.

To understand the challenges BYOD poses, it is helpful to understand the business trends that are driving BYOD adoption.

consumer devicesIn the last year, the persistence of end-users demanding to leverage their tablet computers and smartphones to extend their productivity, even if they had to purchase the devices themselves, has led many IT departments to adopt less restrictive policies, allowing employees basic connectivity or, increasingly, full access to the IT network and corporate applications. This

trend is likely irreversible and every IT organisation will need to quickly adapt to the consumer device phenomenon.

multiple needs and multiple devicesThere is speculation that in the future a single device will be used for all needs: computing, communications, and applications.

However today most believe there will continue to be different devices best suited to

Transforming businessesWith BYOD becoming the norm rapidly in most organisations, Cisco provides insights into the trend and discusses advantages of the company’s solution.

Start Preparing Your Network Today

Networking trends are affecting IT efficiency. Over seven billion enterprise mobile devices are expected by 2015, and video and other rich-media tools are expected to consume more than 90 percent of bandwidth by 2014. IT is being asked to improve efficiency and save money, while still fully supporting these new trends.

Cisco® Borderless Networks built with Cisco Catalyst switches can help you reduceimplementation and deployment costs, network downtime, and operational expenses. Enable IT to increase operational efficiency and lower total cost of ownership, solving the challenges your staff face in supporting today’s networking trends.

Contact us to discuss potential areas for network improvement, review Cisco’s latest offers, and look at our joint professional and technical services that help you take advantage of new investments more quickly and easily.

For more information please write [email protected]

Get Your Network Ready for Operational Efficiency

8 The ValuePlus Quarterly April 2014

for more information, please write to [email protected]

HigHligHtS | CISCO

Page 11: Value Plus April014

Start Preparing Your Network Today

Networking trends are affecting IT efficiency. Over seven billion enterprise mobile devices are expected by 2015, and video and other rich-media tools are expected to consume more than 90 percent of bandwidth by 2014. IT is being asked to improve efficiency and save money, while still fully supporting these new trends.

Cisco® Borderless Networks built with Cisco Catalyst switches can help you reduceimplementation and deployment costs, network downtime, and operational expenses. Enable IT to increase operational efficiency and lower total cost of ownership, solving the challenges your staff face in supporting today’s networking trends.

Contact us to discuss potential areas for network improvement, review Cisco’s latest offers, and look at our joint professional and technical services that help you take advantage of new investments more quickly and easily.

For more information please write [email protected]

Get Your Network Ready for Operational Efficiency

Page 12: Value Plus April014

particular uses. For example, a laptop is not as portable as a smartphone, so people are likely to carry their smartphone for mobile communications. Tablets are powerful devices as well, but it is likely laptops and PCs will still be used for document creation and publishing. This means people will more likely carry and use multiple devices and less likely that a single, all-purpose device will emerge.

The impact of this trend is that many more devices will be connected to the network by the same employee or person, often simultaneously, and likely lead to a large increase in overall connected devices.

work and personal overlapIncreasingly, work is an activity that people do, not a place to which they go. Extended connectivity through mobile and remote access to the corporate network gives employees tremendous flexibility and increased productivity. It also leads to a blurring of the line between work time and personal time, with employees trading set work schedules for the flexibility of working when and where they want to, often interweaving work and personal tasks.

A side effect of this flexibility is that most employees want to be able to use a single smartphone, tablet, or laptop for both work and personal tasks and not also carry around corporate devices.

Device ownership is not clear cut. Many employees are willing to use their personal tablet or smartphone, for example, to access work applications. Many employers are considering or

have implemented subsidy programs, whereby an employee is provided with money for devices, but it is up to the employee to purchase the devices they want. The effect of this time and device overlap is that corporate and personal data will be increasingly co-mingled on devices, leading to security and privacy issues.

anywhere, anytime mobilityIt is estimated that mobile devices and the traffic they create on networks will increase by 26X between 2010 and 2015, driven by more powerful smartphones and tablets, with users demanding Internet access and access to applications wherever and whenever they want. Enabling this is an explosive build-out of WiFi networks by employers, 3G and 4G networks by mobile providers, as well as public WiFi by retailers and municipalities.

The more employees can easily access work using WiFi and mobile networks, the more widespread these networks will become, thereby further enabling access. The end result is pervasive connectivity anywhere and anytime, which means corporate networks will have more devices connected more frequently, leading to an even broader need for the 24/7 availability of applications.

challengeS FOr IT OrganISaTIOnSAdopting BYOD comes with a set of challenges for the IT organisation . Many of the benefits of BYOD, such as having the choice of any device and anywhere, anytime access, are somewhat antithetical to

traditional IT requirements for security and support.

Providing device choice and supportTraditionally, IT pre-determined a list of approved workplace devices, typically a standardized desktop, laptop, and perhaps even a small, standardized set of mobile phones and smartphones. Employees could choose among these devices, but generally were not permitted to stray from the approved devices list.

With BYOD, IT must approach the problem differently. Devices are evolving so rapidly that it is impractical to pre-approve each and every device brand and form-factor. It is also somewhat impractical to expect IT organisation s to have the same

level of support for each and every device that employees may bring to the workplace.

Hence most IT organisation s have to establish, at a macro level, what types of devices they will permit to access the network, perhaps excluding a category or brand due to unacceptable security readiness or other factors. Support must also be considered, such as adopting more IT-assisted and self-support models.

maintaining secure access to the corporate networkDevice choice does not mean sacrificing security. IT must establish the minimum security baseline that any device must meet to be used on the corporate

“On-boarding of new devices should be simple and, ideally, self-service with minimal IT intervention, especially for employee bought devices.”

10 The ValuePlus Quarterly April 2014

for more information, please write to [email protected]

HigHligHtS | CISCO

Page 13: Value Plus April014

network, including WiFi security, VPN access, and perhaps add-on software to protect against malware.

In addition, due to the wide range of devices, it is critical to be able to identify each device connecting to the network and authenticate both the device and the person using it.

On-boarding of new devicesMost BYOD implementations will have a wide-range of devices including desktop PCs, laptops, netbooks, smartphones, tablets, e-readers, and collaboration devices. It is likely some devices will be corporate owned and managed, while other devices may be employee purchased and self-supported.

On-boarding of new devices—bringing a new device onto the network for the first time—should be simple and, ideally, self-service with minimal IT intervention, especially for employee bought devices. IT also needs the ability to push updates to on-boarded devices as required.

Ideally on-boarding should be clientless, meaning no pre-installed software is required. This has an added benefit: if a self-service on-boarding model is successfully implemented, it can be easily extended to provide access to guests as well.

enforcing company usage policiesBusinesses have a wide range of policies they need to implement, depending upon their industry and its regulations and the company’s own explicit policies. Adoption of BYOD must provide a way to enforce policies, which can be more challenging on

consumer devices like tablets and smartphones.

Another complication results from the mixing of personal and work tasks on the same device. Smartphones are likely used for business and personal calls and tablets have both personal and business applications installed. Access to the Internet, peer-to-peer file sharing, and application use may be subject to different policies when a user is on their personal time and network and when they are accessing the corporate network during work hours

key adVanTageS OF The cIScO byOd SOluTIOnThe Cisco BYOD solution integrates the Cisco products, third-party products, and other devices into a comprehensive BYOD approach, which is tightly integrated across the network infrastructure. This offers a unique set of advantages over other solutions.

Secure access for any deviceThrough a combination of X.509 digital certificates, two-factor authentication, Cisco AnyConnect client, and 802.1x, a wide variety of devices can be supported with secure access to the network.

Self-service on-boardingThe integrated approach allows for devices to be self-enrolled the first time they connect to the network. Each device is fingerprinted so it can be identified upon returning for subsequent network access attempts.

centralised enforcement of company usage policies

Cisco Identity Services Engine (ISE) provides a centralised single source of policy across the organisation that can be enforced across different network access types.

differentiated access and servicesThe Cisco BYOD solution provides a means to identify devices and users and provides differentiated services based on custom policy options. For example, employees using corporate-owned and managed devices can be treated differently than employees using their own unmanaged devices at work.

Similarly, contract employees, partners, guests, customers, students, and other classifications that are important to the business or entity can be identified and treated according to the business policies, restricting access to only the set of services and access to which they are entitled.

high performance and reliable wireless lanThe Cisco BYOD solution includes industry leading WLAN technologies to enable the best possible performance and reliability for wireless clients. Technologies including Cisco CleanAir, ClientLink, and 4x4 antenna design fundamentally improve RF performance. Secure

Fast Roaming, VideoStream, and Wireless QoS improve application experience. No other industry solution offers the depth and breadth of the Cisco WLAN product family.

unified approach for wired, wireless, remote, and mobile accessThe Cisco BYOD solution strategy is to provide a common approach anywhere devices connect to the network, including wired, WiFi, public WiFi, and 3G/4G mobile and also regardless of whether the connectivity occurs in the main campus, branch office, home office, or mobile Teleworker location.

unified experience for end usersThe unified approach across network access types and locations, as well as the use of the Cisco AnyConnect client, provides a unified experience for users, which is consistent whether they are connecting at the corporate office over WiFi or remotely over 3G/4G mobile providers.

unified visibility and device managementCisco ISE and Cisco Prime provide a single source and visibility for users and devices, simplifying troubleshooting and auditing.

“Cisco BYOD solution integrates the Cisco products, third-party products, and other devices into a comprehensive BYOD approach, which is tightly integrated across the network infrastructure.”

April 2014 The ValuePlus Quarterly 11

for more information, please write to [email protected]

Page 14: Value Plus April014

Coming together today, to createbetter opportunities for tomorrow

Redington Value is now an authorized distributor for Oracle in the Middle East. Oracle is the leading provider of the most

complete, open, and integrated business software and hardware systems. Redington, with its diverse reach and

excellent strength across the region, will now offer the entire stack of Oracle products and value added support services including pre sales, credit, local billing and concept centers

spread across its locations in the Middle East.

To place an order, please write to [email protected] or call 971 55 2286236

Page 15: Value Plus April014

Coming together today, to createbetter opportunities for tomorrow

Redington Value is now an authorized distributor for Oracle in the Middle East. Oracle is the leading provider of the most

complete, open, and integrated business software and hardware systems. Redington, with its diverse reach and

excellent strength across the region, will now offer the entire stack of Oracle products and value added support services including pre sales, credit, local billing and concept centers

spread across its locations in the Middle East.

To place an order, please write to [email protected] or call 971 55 2286236

For more information or to place an order on Barracuda Networks, please write to [email protected]

Page 16: Value Plus April014

Game changerAhmed El Sabbagh, Regional Distribution Manager - Turkey, Emerging Africa & Middle East, RSA on the changing threat landscape and how this affects the channel.

What has been the business focus for rsA?It’s not surprisingly, that many leading

organizations find it extremely difficult, without spending prohibitively large sums of money, to answer key challenges, such as Am I secure? Am I compliant? Where do I have gaps? How do I prioritize? Can I do this affordably? Am I aligned to the business?

Accompanying our customers as a trusted advisor through their security journey to ensure that intrusion and compromise do not result in business damage or loss for them and assuring they have definite answers to these questions has been always our business focus and priority from which our research and development teams are always working on adopting a more

intelligence-driven approach to help our customers increase their security maturity level taking into consideration their ongoing business transformation and the advanced threat landscape and evolution.

What’s important for RSA is not only where our customers are today, but what steps are we taking to improve their security practice and take them to the next level within their security maturity journey.

how has the perception of security solutions changed over the years?Just a few years ago, a typical scenario might have been remote access offered to a limited set of employees, using a laptop that was provided by the company, over a VPN connection that allowed access to a limited set of key internal applications like

email and sales force automation. Now, we have almost our entire workforce, using their own tablets and smartphones for business purposes, accessing applications that live in the cloud, over untrusted wireless networks and the internet. We used to describe the disappearing perimeter as a security concern – today we have almost no boundaries or a perimeter that has effectively been turned inside-out. And the expectations for securing this environment are the same or more strict.

On top of that, the threat landscape and attacker tactics have fundamentally changed, resulting in adversaries that are more formidable than ever before, and who can’t be stopped effectively using yesterday’s tools and methods. It’s not just that they are more sophisticated, but

attack methods have fundamentally changed.

First they are targeted, with a specific objective. Previously, we may have seen threats such as mass malware that can infect PCs or random attacks on unnecessary services running on external-facing servers. Advanced threats typically use custom malware that targets an individual or group of employees at a specific organization. The attackers are seeking specific information – intellectual property or confidential documents. And their entry point to the organization is the compromise of an individual user’s credentials that they can use to establish an non-suspicious initial foothold in their target organization.

Second, once their initial intrusion is successful, advanced attackers are much more stealthy.

in DeptH | RSA

14 The ValuePlus Quarterly April 2014

for more information, please write to [email protected]

Page 17: Value Plus April014

RSA | in DeptH

Unlike a “smash and grab” password theft or website defacement, advanced attackers seek to remain hidden inside the organization, establishing multiple footholds in case their initial access is shut down, and keeping suspicious activity that might alert security operations teams to a minimum as they seek their target. They cover their tracks by erasing logs and other evidence of their activity.

We need to acknowledge that a model that defends a static perimeter and static infrastructure, that relies on fixed controls based on signatures derived from knowledge of prior attacks, will be increasingly ineffective in maintaining trust in our IT systems and digital businesses. Against these fundamentally different and advanced attacks, we need a fundamentally different response. We need to spend less time trying to keep attackers out, but focus instead on accelerating our ability to detect and respond to intrusions, and reducing the amount of time they are in the network.

In response to all of this, RSA Intelligence Driven Security Approach focus on people, identities, and their behavior, the flow of data and transactions to ensure that intrusion and compromise do not result in business damage or loss for our customers.

what is rSa’s market differentiator?The security market is obviously one that RSA has been in for some time. In fact, it is one that we pioneered with the invention of the public key cryptography 25 years ago. A capability which is now deployed in over a billion applications worldwide and is the foundation of network and internet security.

Our solution set is made up of leading, best of breed products and we have obviously long been recognized as the market leader in one-time password authentication with the broadest set of authentication options available. But now our solution set includes leading solutions in Data Loss Prevention, Web Fraud Prevention, Security Information and Event Management, Network Analysis & Forensics as well as Governance, Risk and Compliance where Gartner considers us to be in the ‘leaders’ quadrant in all categories.

And because of this breadth of capability, we are also ‘complete’. Not because we provide solutions in every aspect of security but because no other company shares our strategy of integrating these products so that they work together and with third-party products and solutions – allowing our customers to build a business holistic approach to security, risk and compliance.

Another dimension that makes us ‘complete’ is the out-of-the-box expertise about regulations, threats and best practices built-in to our solutions, saving customers significant time and resources. Expertise created by teams of experts, shared across our customers.

Also being the security division of the giant EMC gives us financial strength that has and continues to enable us to make strategic acquisitions and investments that add tremendous value to our customers. As such our solution portfolio and offerings has been exponentially expanded over the last few years. EMC also has strong corporate partnerships with the likes of Cisco, Microsoft, and, of course, VMware, which gives us better opportunity to work more closely with these technology partners to

ensure that security, visibility and control is built into their IT infrastructure – both physical and virtual.

Finally, a strong security pedigree and one where our primary go to-market model is via partners, again something that we have done for the last 25 years.

I believe that all this puts RSA in a unique position to deliver an integrated and holistic security solution which lowers the overall cost of safeguarding an organization while handling advanced persistent threats.

what does this mean for the channel?The threat landscape and attacking community has changed. Advanced persistent threats are the norm, data and information levels are exploding and we are being put under ever more legislative and regulatory pressure and it’s not surprising that security is now a big issue for most CIOs and the security market for both products and supporting services is vast and growing rapidly however different organizations depending on their characteristics, exhibit different security postures from Threat Defense based companies who do ‘just enough’ through to Business Risk oriented businesses that want to sow security into the fabric of their organization, and therefore have different needs.

RSA early realized that and translates it into opportunities for our channel by leveraging our leading, complete and integrated security solutions that play a part at every stage of the market maturity model whatever your target market and its security posture which leads to potential new clients and increase account penetration with a richer set of solutions, services and consultancy

leading to increased revenue and more business to the channel.

In this fast growing region, I have noticed that a lot of VARs want to be everything to everybody, then you’re a commodity and you’re not any different than ‘that guy’ down the street. We give our channel the opportunity to be unique and focused through the RSA “SecurWorld” program which reflect RSA’s broader solution portfolio and the different needs of partners taking different products to market. As a result partners can specialize in certain areas and our channel education framework “SecurAcademy” has been specifically designed to support the needs of all partners that is role based and more solution-centric.

Finally, we are always looking to align our channel, depending on their skills, characteristics and aspirations, with our solutions and the end user market where their capabilities can be best deployed and there is always an opportunity to partner with RSA across the complete security spectrum whatever the stance of their business or target market.

ahmed el Sabbagh, regIOnal dISTrIbuTIOn manager - Turkey, emergIng aFrIca & mIddle eaST, rSa

April 2014 The ValuePlus Quarterly 15

for more information, please write to [email protected]

Page 18: Value Plus April014

• Cut threat analysis from days to minutes• See the issues and where they originated• Advance your security team to the next level

Defend with confidence.

RSA SECURIT YANALYTICS

For more information or to place an order on RSA, please write to [email protected]

Page 19: Value Plus April014

Smart Video goes mobile with LifeSize® UVC ClearSea™.

Stop settling for inadequate video conferencing.

Packed with powerful collaboration tools,

LifeSize UVC ClearSea allows you to connect

securely with multiple people*, share documents,

and more – anywhere, on any device. Make the

most of BYOD (Bring Your Own Device) through

a smarter, more collaborative, true-to-life HD

mobile video conferencing experience.

Delivering the Ultimate Communication Experience

www.lifesize.com/mobility

© 2013 Logitech. All rights reserved. Information contained in this document is subject to change without notice. LifeSize is the registered trademark or trademark of Logitech.

All other trademarks are the property of their respective owners. *When configured with LifeSize UVC Multipoint.

Don’t compromise. That’s Smart Video™.

Make anywhere your video conferencing room

For more information or to place an order on LifeSize, please write to [email protected]

Page 20: Value Plus April014

Redington Value signs distributor agreement with Honeywell Scanning and MobilityRedington Value is now an authorised Honeywell distributor for Scanning and Mobility solutions in the Middle East.

redington Value will work together with honeywell to provide end-users with value-added scanning and

mobility solutions across a variety of it, infrastructure and commercial projects in the region.

“As a Honeywell Scanning and Mobility distributor, Redington Value’s Data Capture/POS Business Unit (BU) will immediately begin offering the complete line of Honeywell Scanning and Mobility solutions across the Middle East and Africa to fulfill customer needs and requirements for solutions that support supply chain

operations and business processes. The addition of Honeywell’s proven supply chain products will give our channel partners another way to go after new market segments and generate even stronger sales and profits,” said Ramkumar, Senior Vice-President of Redington Gulf. “We are excited to partner with Honeywell and add products that complement our portfolio.”

“We’re pleased to have Redington distributing our products and services in the region. Redington is a high-value added distributor with significant experience in the IT/

AIDC market, delivering fulfillment services to their resellers,” said Tony Nasr, Regional Director, Middle East, Africa & India Honeywell Scanning and Mobility.

Honeywell Scanning & Mobility (HSM) is part of the Automation and Control Solutions (ACS) business group of Honeywell. HSM is a leading manufacturer of high-performance image- and laser-based data collection hardware, including rugged mobile computers and bar code scanners. With one of the

broadest product portfolios in the automatic identification and data collection industry, HSM provides data collection hardware for retail, healthcare, and transportation and logistics companies seeking to improve operations and enhance customer service. Additionally, HSM provides advanced software, service and professional solutions that help customers effectively manage data and assets. HSM products are sold worldwide through a network of distributor and reseller partners

HigHligHtS | HONEYWEll

18 The ValuePlus Quarterly April 2014

for more information, please write to [email protected]

Page 21: Value Plus April014
Page 22: Value Plus April014

Secure access and continuity in a virtualized and BYOD worldHow HP’s solutions can help in implementing affordable solutions for midsize business

today’s IT challenge is ensuring applications and data are always available. Data is the lifeblood of

your business. To compete in today’s global information economy, you need to keep your IT systems up and running and provide consistent and reliable access to business-critical applications at all times. Application downtime or slow performance can mean diminished employee productivity, dissatisfied customers, and lost revenue. But keeping pace with change and managing growth can be a real challenge. Increasing numbers of applications, evolving technology, and rapid data growth are pushing older IT infrastructure to the limit—demanding more

storage and bandwidth, greater security and agility, and higher availability than ever before.

hP Just right IT—technology made easy for your growing business HP Just Right IT features technology products and solutions—from servers, storage, and networking, to client devices, printers, services and support options—made easy for a growing business. With HP Just Right IT technology, you can save time with single vendor solutions that streamline the evaluation process, save money with plug-and-play products that contain integration and deployment costs, boost efficiency by getting things done faster and easier with automation and unified management, and act with

confidence by leveraging proven IT solutions.

When you’re launching a business, you need to get the basics right. HP Just Right IT features technology products and solutions made easy so you can start strong, support worker mobility, and effectively market your products and services.

hP Secure access and continuity scenarios and solutions Here are three scenarios that many midsize businesses are grappling with today to keep data and applications protected and available.

keeping staff effective at all times Midsize businesses depend on effective, highly-productive staff to manage the business and

engage customers—from any place, at any time. The business need can sound like this: “My people need to be effective wherever they are, and with whatever device they have.” From the IT side, that means supporting tablets and smartphones, ensuring secure, wireless access to business data stored inside the firewall, and deploying reliable systems. The BYOD phenomenon is fundamentally transforming the workplace.

That goes for your customers and partners, too, as they expect access when on-premise with you. Opening your internal network is not an option.

BYOD creates capacity planning and networking engineering challenges and introduces new security and

in DeptH | HP

20 The ValuePlus Quarterly April 2014

for more information, please write to [email protected]

Page 23: Value Plus April014

management requirements. A comprehensive BYOD strategy and solution set are critical to realizing the full potential of mobility, while maintaining the security and integrity of your network and data. A comprehensive BYOD strategy should address:

• Onboarding users: Use tools for bringing new devices and users onto the network for the first time—solutions that enable users to get up and running quickly and easily, with minimal IT intervention.

• Ensuring high service quality and availability: Ensure your wireless LAN (WLAN) infrastructure can support increasing numbers of mobile devices and delay-sensitive applications, while delivering predictable connectivity and service levels.

• Maintaining security and mitigating risk: Personal devices and guest users present unique security challenges. These require stringent authentication and authorization controls and security solutions to protect your IT systems, prevent data leakage, safeguard privacy, and ensure compliance. And systems are required for revoking access privileges when employees leave the company or when mobile devices are lost or stolen.

• Supporting diverse users and devices: Maintain visibility and network access control over an array of company-issued and personal devices running various operating systems and revision levels. Manage a variety of users with varying privileges.

enhancing data access and application availability After ensuring secure and reliable access, a common second step is to protect data and ensure applications are always available. This step often comes during the

“building momentum” stage, where additional applications are being deployed to improve business capability. It can sound like this: “The number of applications we have are growing, as is the amount of data we have. We need to ensure our data is always protected and our applications are always available.”

IT organizations are expanding the use of server and client virtualization solutions to address these requirements.

As you extend the use of virtualization across the business, you’ll need to take a fresh look at storage management and data protection. A complete strategy should address:

• Primary storage: Primary storage requirements differ for virtualized environments.

Virtualization can lead to an influx of data. You’ll need a highly extensible storage solution that cost-effectively scales to support rapid data growth. And to ensure business continuity, you’ll need a storage architecture that provides multiple layers of data availability with flexible component redundancy, RAID, and replication options.

• Backup and recovery: Conventional backup solutions designed for dedicated server environments can’t meet the scalability or performance requirements that accompany virtualization. Many require software agents that can be complex and expensive to implement in a virtual environment; individual backup agents must be licensed and installed for each VM. In addition, traditional agent-based backup methods place a significant burden on physical host servers by consuming CPU cycles and I/O bandwidth during the backup process. You can overcome these limitations with agentless backup

solutions that reduce licensing costs and minimize host performance implications.

• Disk-to-disk backup storage: With the demand for faster, higher availability backup and recovery, disk is becoming the media of choice for primary backup storage, and the role of tape is shifting to long-term archiving. Disk-based systems address the faster backup and restore requirements of today’s virtualized environments, while tape provides a reliable and cost-efficient media for archiving data for months or years.

• Client Virtualization: HP offers customizable client virtualization solutions for midsize businesses, which are tightly integrated with Citrix XenDesktop, Citrix VDI-in-a-Box, Microsoft Windows Server 2012, and VMware View.

HP simplifies the entire data protection and retention environment, from disk to tape, from data center to remote offices, all supported by a single vendor.

business protection and continuity across multiple sites As you enter the “business expansion” phase, you need to ensure your data is protected and your applications are always available throughout your entire extended business. Yet when it comes to business continuity, remote offices and branch offices are often left out in the cold. Many distributed enterprises are islands of technology—with disjointed management systems, little or no remote IT resources, and bandwidth-constrained connectivity.

With restricted, centralized management capabilities and limited on-site support staff, IT resources usually have to be dispatched to remote offices to troubleshoot problems and

restore services—an expensive and time-consuming proposition.

The problem is often summed up like this: “We have multiple sites and distributed data. How do I efficiently backup and protect our data?” A comprehensive remote office/branch office business continuity strategy should include:

• Flexible data backup and recovery solutions: You need automated backup and recovery tools that obviate the need for on-site support staff and manually intensive backup and restore procedures. Look for flexible solutions that support centralized, distributed, or hybrid backup approaches so you can make optimal use of all your storage resources.

• Unified management systems: You need unified management solutions that let you centrally administer systems and identify, isolate, and repair problems—without on-site assistance.

• Comprehensive traffic management solutions: You need advanced traffic management tools that let you prioritize traffic and work around bandwidth constraints.

HP offers the industry’s most comprehensive data protection portfolio for midsize businesses. With HP you can roll out virtualization solutions, implement BYOD programs, and take control over remote sites and distributed IT environments in a secure and reliable fashion. You can boost business results and optimize productivity by minimizing interruptions, improve communications and collaboration by delivering predictable user experiences across devices and locations, and mitigate risks by protecting business-critical data and maintaining compliance and governance.

April 2014 The ValuePlus Quarterly 21

for more information, please write to [email protected]

Page 24: Value Plus April014

Make your network cloud-readyHP Cloud-Ready Data Center Networking SolutionsSimplify your migration to the cloud and drive innovation with a cloud-enabled data center. It’s never been

HP Cloud-Ready Data Center Networking Solutions designed to help you:

• Improve business agility• Reduce costs• Simplify networking

• Unleash innovation

© Copyright 2013 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall not be liable for technical or editorial errors or omissions contained herein.

For more information or to place an order on HP, please write to [email protected]

Page 25: Value Plus April014

Re-Invent Your BusinessWith a Next-Generation Firewall

Legacy firewalls classify traffic by network ports and protocols. They were created back

when applications played by the rules. The world has changed. Enterprise 2.0 applications

skip any rules that slow them down or try to block them.

Next-generation firewalls like those offered by Palo Alto Networks™ safely enable

applications regardless of network ports. They continuously track all applications and

also who’s using them—and use this information to return control to the IT department

without slowing down the business. For example, you can:

■ Allow Facebook, but limit to only marketing and sales users.

■ Allow Google Chat, but disable attachments.

■ Allow WebEx, but disable the remote desktop control feature.

■ Allow SharePoint, but scan for threats.

[email protected]

For more information or to place an order on Paloalto Networks, please write to [email protected]

Page 26: Value Plus April014

4

5

1

6

3

2

reDington Value cHannel eVentS

1. Vmware event in muscat, Oman – Mar 2014

2. avaya Partner event in nairobi, kenya – Feb 2014

3. hP networking Partner event in nairobi, kenya - Jan 2014

4. hP networking Partner event in addis ababa, ethiopia - Jan 2014

5. hP eSS event in Jeddah, Saudi arabia – Jan 2014

6. emc Partner event in abuja, nigeria – Dec 2013

Page 27: Value Plus April014

40G

www.nexans.com/LANsystems [email protected]

LANmark-OF : Competitive Fibre Optic Solutions

G l o b a l e x p e r t i n c a b l e s

a n d c a b l i n g s y s t e m s

Does your fibre system tick all the boxes?

100G Accelerate business at the speed of light

LANmark-OF brings the best fibre technologies together to ensure maximum reliability and lowest operational cost.

• Micro-Bundle cables save up to 50% trunk space

• Slimflex cords offer 7,5mm bend radius saving 30% space in patching areas

• Pre-terminated assemblies reduce installation time

• MPO connectivity enables cost efficient migration to 40/100G

OF brochure40G

www.nexans.com/LANsystems [email protected]

LANmark-OF : Competitive Fibre Optic Solutions

G l o b a l e x p e r t i n c a b l e s

a n d c a b l i n g s y s t e m s

Does your fibre system tick all the boxes?

100G Accelerate business at the speed of light

LANmark-OF brings the best fibre technologies together to ensure maximum reliability and lowest operational cost.

• Micro-Bundle cables save up to 50% trunk space

• Slimflex cords offer 7,5mm bend radius saving 30% space in patching areas

• Pre-terminated assemblies reduce installation time

• MPO connectivity enables cost efficient migration to 40/100G

OF brochure

For more information or to place an order on Nexans, please write to [email protected]

Page 28: Value Plus April014

For more information or to place an order on Eaton, please write to [email protected]