Budget Expectations

28
As the Finance Minister gets set to present the Union Budget for 2010-11, DCC highlights the expectations and perspectives of some key execs in the IT fraternity: February 2010 Vol 02 | Issue 06 | Rs.50 BIJU NAIR CFO, Four Soft DIWAKAR NIGAM Managing Director, Newgen Software GAUTAM GHOSH Country Manager - India, ViewSonic ALOK BHARADWAJ Sr Vice President, Canon India KALYANARAMAN D President, Tally Solutions NARESH WADHWA President and Country Manager - India and SAARC, Cisco PUNEET DATTA Assistant Director – Marketing (BIS), Canon India R S RETHINASAMY CFO, Aditi Technologies S RAJENDRAN CMO, Acer India SR NAUTIYAL MD, Spark Technologies SAKET KAPUR MD, Green Vision SHRIRAM KRISHNAMACHARI Head – Channels, Adobe Systems VIKAS KHANVELKAR Managing Director, DesignTech Systems VINNIE MEHTA Executive Director, MAIT ALOK GUPTA MD, Softmart

description

As the Fianance Minister gets set to present the Union Budget for 2010-11, DCC highlights the expectations and perspectives of some key exes in the IT fraternity:

Transcript of Budget Expectations

As the Finance Minister gets set to present the Union Budget for 2010-11, DCC highlights the expectations and perspectives of

some key execs in the IT fraternity:

February 2010Vol 02 | Issue 06 | Rs.50

BIjU NAIRCFO, Four Soft

DIwAkAR NIgAM Managing Director, Newgen Software

gAUtAM ghoshCountry Manager -

India, ViewSonic

Alok BhARADwAjSr Vice President,

Canon India

kAlyANARAMAN D President, Tally

Solutions

NAResh wADhwA President and Country Manager - India and

SAARC, Cisco

PUNeet DAttAAssistant Director – Marketing (BIS),

Canon India

R s RethINAsAMyCFO, Aditi

Technologies

s RAjeNDRAN CMO, Acer India

sR NAUtIyAl MD, Spark

Technologies

sAket kAPURMD, Green Vision

shRIRAM kRIshNAMAChARI

Head – Channels, Adobe Systems

VIkAs khANVelkARManaging Director, DesignTech Systems

VINNIe MehtA Executive Director,

MAIT

Alok gUPtA MD, Softmart

DIGIT CHANNEL CONNECT 6

contents

fEbruAry 2010

Editorial ......................................................... 03trENdS ............................................................. 06aNalySiS .......................................................... 28GuESt ExprESSioN .......................................... 30aNalySt SpEak ................................................ 38

a d v e r t i s e r s i n d e x

cover illustration & design: prasanth t r

IBM ..................................................... Inside Front Cover

EMC ...............................................................Back Cover

Intel ......................................................Inside Back Cover

iBall ............................................................................5,9

Rashi Peripherals ............................................................7

K7 ...............................................................................11

Supertron .....................................................................13

Jupiter..........................................................................15

Quick Heal ...................................................................17

Meganet ......................................................................21

Abacus.........................................................................33

Priya ............................................................................37

10

tiME to aCtThe right set of Data Loss Prevention (DLP) tools can put a stop to the rampant data breach incidences among businesses and help them take a proactive approach to protecting business-critical data

“a huge focus would be on middleware”

as the Finance Minister gets set to present the union Budget for 2010-11, dCC highlights the expectations and perspectives of some key execs in the it fraternity.

“We will focus on data centres and BFSi verticals in 2010”

18 25 24SPECIAL REPORT

VENDOR SPEAK

REguLARS

SANDy CARTER,VP, CHAnnElS, IBM SoFtwARE GRouP

JITENDRA guPTA, Manager—IndIa and SaarC, extreMe networkS

SAKET KAPuR, Md, green VISIon

PS NEOgI, PreSIdent, redIngton IndIa

“We focus on areas that attract maximum customers”

“Value-add has become a much-abused term.”

22 23ChANNEL q&A

Creating lasting Value

26bEST Of bIz

Burzin Dubash dwells at length on ways to optimise procure-to-pay cycle of companies

Managing Director: Dr Pramath Raj SinhaPrinter & Publisher: Kanak Ghosh

EditorialEditor: Sanjay GuptaSr. Correspondents: Charu Khera (Delhi), Soma Tah (Mumbai) dEsignSr. Creative Director: Jayan K NarayananArt Director: Binesh SreedharanAssociate Art Director: Anil VKManager Design: Chander ShekharSr. Visualisers: PC Anoop, Santosh KushwahaSr. Designers: Prasanth TR & Anil TPhotographer: Jiten Gandhi

Brand CommuniCationProduct Manager: Ankur Agarwal

salEs & markEtingVP Sales & Marketing: Navin Chand SinghNational Manager - Events and Special Projects: Mahantesh Godi (09880436623)Business Manager (Engagement Platforms) Arvind Ambo (09819904050)National Manager - Channels: Krishnadas Kurup (09322971866)Asst. Brand Manager: Arpita GanguliCo-ordinator - MIS & Scheduling: Aatish MohiteBangalore & Chennai: Vinodh K (09740714817)Delhi: Pranav Saran (09312685289)Kolkata: Jayanta Bhattacharya (09331829284)Mumbai: Sachin Mhashilkar (09920348755)

ProduCtion & logistiCsSr. GM Operations: Shivshankar M HiremathProduction Executive: Vilas MhatreLogistics: MP Singh, Mohd. Ansari, Shashi Shekhar Singh

ChannEl ChamPsSr Co-ordinator - Events: Rakesh SequeiraEvents Executives: Pramod Jadhav, Johnson NoronhaAudience Dev. Executive: Aparna Bobhate, Shilpa Surve

oFFiCE addrEss

Nine Dot Nine Interactive Pvt Ltd., KPT House, Plot 41/13, Sector 30, Vashi, Navi Mumbai - 400 703 Phone: 40789666 Fax: 022-40789540, 022-40789640

Printed and published by Kanak Ghosh for Nine Dot Nine Interactive Pvt Ltd.C/O KPT House, Plot 41/13, Sector 30, Vashi (Near Sanpada Railway Station), Navi Mumbai 400703

Editor: Anuradha Das MathurC/O KPT House, Plot 41/13, Sector 30, Vashi (Near Sanpada Railway Station), Navi Mumbai 400703

Printed at Silverpoint Press Pvt. Ltd, TTC Ind. Area, Plot No. : A - 403, MIDC,Mahape, Navi Mumbai - 400709

Vol 02 issue 06 | february 2010

DIGIT CHANNEL CONNECT 3

editorial

fEbruAry 2010

With the Union Budget

round the corner, the industry is hopeful of extended support.

Presentation of the Union Budget is a time when most industry lobbies in the country make their

pitches to the finance ministry to ensure the maximum possible allocation to their respective segments and to get as much tax benefits as they can get. India’s IT industry has thus far been quite fortunate in the sense that it has benefited greatly from tax exemptions and other incentives offered by the government, especially to the exporters.

Still, there are many areas where both hardware and software segments are looking forward to further sops in order to emerge stronger from the recent slowdown as well as to smoothen out some nagging anomalies in taxation that still exist. A lot of industry execs who have contributed their expectations and perspectives on the upcoming budget in our cover story this fortnight, for instance, say that the government must continue with the stimulus of the countervailing duty reduction to the current 8 per cent. Some other key points raised by them include clarity on GST (Goods and Services Tax), problems arising from simultaneous imposition of service tax and VAT (Value Added Tax) on sale of soft-ware licenses, withdrawal of SAD (Special Additional Duty) on imported items and, of course, continuation of tax exemption for export units under STPI (Software Technology Parks of India) scheme.

With the Budget only a few days away, we will soon

What Will the Gov Do?

[email protected]

Write to the EditorE-mail:[email protected]

Snail Mail: The Editor, Digit Channel Connect, K-40, Connaught Place, New Delhi 110 001

sounding boardsounding board

n SR Nautiyal, MD, Spark Technologies

The IT hardware market is not growing at a level it should, even though prices have already come down. I request the concerned agencies to come up with a consistent and motivating budget, which will drive the growth of the IT industry. The economic slow-down of last year has somewhat affected corporate investments. The budget should facilitate companies to retain more investible funds for modernization and expansion.

n Saket Kapur, MD, Green VisionWe need to have consistency and stability in the taxation and duty structure. And with the kind of economic scenario the industry is facing, it will be really great if the stimulus package is continued. I don’t feel that the industry should look at unrealistic demands from the taxation point of views but there should be no additional taxes.

n Alok Gupta, MD, Softmart

Software ESD/Paper (in the name of the end user) license developed in or outside India should have only service tax, and no VAT should be included in it. TDS on Software ESD License sales should be fixed at maximum 1%, since the margins are only 3%-4% when sold by software dealers.

SANJAY GUPTAEditorDigit Channel Connect

get to know which demands are met and what remains to be addressed.

But there are certain things that the government of India must keep in mind when allocating moneys if it’s serious about taking IT in the country to the next level. Power situation and broadband are what immediately come to the mind. The number of broadband subscrib-ers in the country still languishes somewhere around 7 million – whereas the government had declared 2007 as the year of broadband. Most industry pundits have time and again said that higher broadband penetration will boost PC and overall IT consumption significantly. Unfortunately, the pipe still remains a pipedream.

Another area that needs government attention is hardware manufacturing. When was the last time we heard of something new on that front?

It’s high time the government put its money where it often puts its mouth.

trends

6

Brocade and McAfee have entered into a partnership to deliver a broad set of fully interoperable network security solutions. As part of the partnership, Brocade will work in

conjunction with McAfee to integrate critical security capabilities into the Brocade family of networking products.

The pairing of Brocade networking products with McAfee’s security capabilities enables customers to deploy and maintain highly reliable and secure network environments – from endpoint to the edge and the core – that are protected against a wide range of security threats, including malicious activities, data breaches, network intrusions and policy violations.

As a part of an open technology architecture approach, Brocade and McAfee are collaborating on a set of jointly designed, interoperable solutions developed specifically to address the network security needs of enterprise customers.

These solutions are being delivered under a new agreement that enables this first phase of a multi-year relationship between the two companies. The next stage will involve extending the network management integration to further utilise metrics and security intelligence information. n

Brocade, McAfee to deliver network security solutions

850W Black Edition power supply unit from XFX

Zotac International has announced its exclusive partnership with Neoteric Infomatique for distribution of mother-

boards. The partnership will help Zotac establish and distribute their range of motherboards to untapped territories of India. Neoteric will drive this business for Zotac independently using its network of partners across the country in close coordination with the Zotac product team.

Commenting on the tie-up, Manish Rambhia, DGM, Neoteric says, “In a short span of time, Zotac has established itself very well amongst the Indian channel community and now with this tie-up, we will take this to a new level through our network of branches all across India.”

Deepak Gupta, Country Manager, Zotac – India sounding exuberant says, “We are certain that we have found the right partner in Neoteric to grow the business in India and look forward to working together.”

To create awareness for the brand in the channel and end user community, Neoteric and Zotac plan to carry out marketing activities that include promotions, road shows in upcom-ing markets, in shop branding and many other activities. All Zotac motherboards distributed by Neoteric will carry a three-year carry-in warranty. n

Live webcast for COMPASS IT show

For the first time, there would be a live webcast of the IT exhibition

- COMPASS 2009-10. The mega event would be held at the Netaji Indoor Stadium, Kolkata, from March 12 to 15, 2010.

“The entire four-day event, which draws over 1.2 lakh visitors, would this time be accessible to the `virtual visi-tors’ across the globe. There are many people who are unable to visit the IT show each year personally. This time they can log in to visit the 20 pavilions and 100 stalls offering various IT products, services, solutions and special d iscounts,” says Pawan Jajodia, Chairman Exhibition Committee, COMPASS 09-10. “This is a rare initiative by COMPASS since very few events in India are webcast live,” Jajodia adds.

One has to register with www.compass.liveevent.in and log in for a virtual trip

of the COMPASS IT show online. A 20 member special team of professionals will be instrumental to execute the webcast. There would be around seven cameras, anchor s, engineer s and support staff providing live audio-visual feeds for the webcast from 10.30 am till 7.30 pm daily during the exhibition.

Prior to the actual event, visitors can get the details of all the participants of the COMPASS IT show. A dedi-cated home page would host all the details of the partici-pants, including special interviews that would help visitors get an idea on the range of products, services, solutions and incentives that would be available and show-cased at the show. COMPASS is targeting various schools and colleges to popularise its webcast. Many visitors who look for specialised products and services would be able

to plan out their visit to the show in advance and save time. Post event, the entire COMPASS IT show video would be accessible online for 50 days.

“Webcast would be a good brand building exercise for COMPASS IT show and also enable us to reach out to a global audience that was earlier not possible. There has been a deluge of new IT products and services in India which the compa-nies and multinationals are looking forward to exhibit at the COMPASS IT show. This year’s theme is ‘Xplore Digitally’ in keeping with the global trend,” Jajodia adds. n

Pawan Jajodia

Zotac partners Neoteric for motherboards

XFX has added “power” to its product line-up with the intro-duction of the XFX 850W Black Edition Power Supply Unit (PSU).

Designed specifically for the high performance gamer, the 850W Black Edition PSU supports multiple high-end graphic cards.

Introducing the product, Kapal Pansari, Director – Marketing, Rashi Peripherals, said, “XFX 850W PSU is a natural progression to the XFX line of graphics cards. XFX is known worldwide for its products, espe-cially graphics card, to the gaming community, and adding a superior power supply further strengthens that bond with the gamers. A lot

of PSUs are available in the Indian market, but none provide the true 850W power, leaving the consum-ers wanting for more. With XFX 850W PSU consumers will get the real power that will help them utilize optimum power of their GPUs.”

Rated for a combined, continuous output power of up to 850 watts at 50 degrees Celsius, the XFX 850W BE PSU outperforms lesser qual-ity PSUs. Crossbreed engineering featuring both fixed and modu-lar cables provide users with both exceptional performance and supe-rior flexibility. n

DIGIT CHANNEL CONNECT FEBRUARY 2010

trends

DIGIT CHANNEL CONNECT 8 FEBRUARY 2010

Micro Star International (MSI) announced that they will further enhance their retail reach to make their range of consumer notebooks

easily available to a wider customer base. In a customer-friendly move, the company has tied up with large format retail (LFR) chains including Croma, Reliance Digital and Big Bazaar across several cities.

Under the retail push, the notebooks will be displayed at dedicated MSI-branded counters in the LFR stores. Moreover customers will be able to browse and access detailed product literature, while trained personnel will on hand to explain product features and help custom-ers derive an “MSI experience” before making their purchase decision. Tony Yang, MD of MSI India says, “The LFR stores will bring new availability for MSI’s industry-leading notebooks to a wider consumer base. They will help buyers make more informed decisions by acquainting them with the capabilities and unique features of the different models.”

MSI had initiated their LFR programme on a pilot basis with 30 Croma stores across major metros, last month. This arrangement is now expanding to more than 43 Stores across 10 cities including Delhi, Mumbai, Cochin, Ahmadabad, Chennai, Bangalore, Hyderabad, Gurgaon, Ghaziabad and Rajkot. MSI will be retailing the stylish and award winning X-Slim series of notebooks as well as their Classic series through the Croma outlets.Further, MSI has already begun rollout of similar retail programme through Reliance and Big Bazaar stores. MSI notebooks are available at more than 20 reliance stores across ten cities, and another 21 Big Bazaar outlets in Delhi, NCR and Mumbai. The ultra-light U-series netbooks are placed in the Reliance Digital and Big Bazaar outlets.

Johnny Lin, National Product, Sales and Marketing Manager for MSI India informed that similar tie-ups with other retail chains were on the anvil. “The tie-up with these large retailers will strengthen MSI presence in India. The brand aims at leveraging an environment where the customers can have a firsthand experience of MSI latest technology before buying it. Similar kind of tie-ups will be rolled out with more outlets within next 6 months,” adds Lin.

The MSI retail outlet programme is driven by increas-ing consumer demand. Some months ago, MSI had established its first branded retail access point for its entire range of laptops, in Delhi’s IT trade hub – Nehru Place market in collaboration with its channel part-ner Sun Computers. That arrangement is also being expanded with coming up of another branded retail point in partnership with Technology Next.

The MSI retail outlet programme through LFR chains and co-branded individual stores will expand the number customer access points in India from 90 today to about 300 by the end of 2010. n

Elitegroup Computer Systems (ECS) has launched the P55H-A Black Series motherboard based on Intel P55

Express chipset supporting high-performance Intel Core i5 and Core i7 processors.

T h e L G A 1 1 5 6 socket motherboard is ideal for gamers setting up a feature rich system on a tight budget. The ECS P55H-A supports CrossFireX for blister-ing fast graphics as well as Intel’s features such as Turbo Boost technology, which overclocks CPU opportunistically based on the temper-ature, current and power settings. This is enhanced by DDR3 1333MHz memory support, for fast data throughput using a maximum of 16GB in 4x DDR3 DIMMS.

The ECS P55H-A motherboard has all the functionality that a gamer needs as a power user. Features include 4x DDR3 slots @1333MHz, an eSATA port for external stor-age, IDE SATA with RAID 0,1,5 & 10 support to allow for large storage capacity , 8x USB external ports+ 6x USB internal for ample connectivity options, 8 Channel Realtek AL888S HD Audio with SPDIF out for full and rich sound options to bring your games and audio needs to life. It has Gigabit LAN

for fast and secure internet connectivity, and 2x PCIe x16 (2nd Generation) slots for dual graphics CrossFireX capabilities. The MOSFET

region has a 6-phase high qual-ity PWM, which regulates the voltage to maintain clean power to your CPU, while the Dragon style heat sinks ensure stability and extra cooling for your chip-set and components.

In addition, the P55H-A has a plethora of exclusive ECS tech-nology such as the M.I.B. II OC BIOS utility that assists begin-

ners to overclock effortlessly and the unique eJiffy Linux solution which once selected from the BIOS can allow you to by-pass your OS and access eWeb (Internet access), ePix (Picture interface to view pictures) and ePal (chat messenger program) directly within seconds of turning on your PC. It can be accessed in multiple languages. Also included in this Black series product are the innovative 4E design features: Easy Clear, Easy Debug, Easy Attach and Easy buttons, which make the P55H-A motherboard very easy and convenient to use, while the newly added intelligent power saving (IPS) indicators help make sure green power saving are within everyone’s reach. ECS P 55H –A is available through Rashi Peripherals at Rs 9,900 with three years warranty. n

HCL Infosystems has unveiled PVC-free HCL ME Series 40

notebook. The eco-friendly ME notebook has been designed and manufactured with materials completely free of harmful chemicals like Polyvinyl Chloride (PVC), a hazardous toxin, absence of which makes recycling of electronic products safer and environment friendly.

George Paul, Executive

V i c e P r e s i d e n t , H C L Infosystems said, “HCL ME Series 40 is another step

towards a green revolution in the IT hardware industry. We at HCL Infosystems have always been an environmen-tally responsible corporate and one of the few compa-nies the world over with an official commitment to sustainability in our vision and mission statement.”

The new notebook is based on the Intel Core 2 Duo processor and apart from being eco-friendly is also

loaded with features such as:• SplitME,whereonecan

share their data without worrying about file size.

• LockME,thatpreventsdata theft f rom the system.

• SecureME,aneffectivetool which can be used to lock any application installed on the PC e.g. Internet Browser, Adobe, Power point etc.

• EncryptME,whichallowsthe user to encrypt their data.

HCL ME 40 notebook is available for Rs 41,500. n

MSI extends retail reach in India

ECS launches motherboard for gamers

HCL launches PVC free notebook

9 FEBRUARY 20109

trends

Blue Coat intros Professional Services Partner Program

Th e B a n k i n g , F i n a n c i a l S e r v i c e s and Insurance (BFSI) IT ser vices market in India is expected to grow

from $1.6 billion in 2009 to $2.7 billion in 2013, growing at a CAGR (compound

annual growth rate) of 14.2 percent, says Springboard Research. Springboard’s report – ‘ T h e I n d i a n I T Ser vices Market for the Banking, Financial Services and Insurance Ver tical’ notes that this intensely compet-itive market remains fragmented between a large number s of services providers.

“Although the BFSI vertical in India is maturing in terms of adoption and usage of IT, it continues to be price sensitive. ‘Hard to please’ Indian CIOs are becoming as demanding as their global counterparts, consistently expecting vendors to offer a ‘fresh approach’,” says Sanchit Vir Gogia, Senior Research Analyst for Services at Springboard Research. “Now, the key chal-lenge for IT vendors moving forward will be to keep pace with end user demand for rapid innovation,” Gogia adds.

Springboard obser ved that there is a ‘great rush’ to step-up customer service levels and companies in the BFSI space have been rapidly investing in IT to work towards fulfilment of this objective. With increasing competitive pressure, it is getting harder for BFSI enterprises to ‘win and keep’ custom-ers. The move to adopt CRM solutions and customer focused technology is driven by the increasing need for maintaining and enhanc-ing customer relationships.

Business Intelligence (BI) is yet another key priority for BFSI enterprises which helps to identify and capture potential customers. Organisations in India are also using high-end analytics to indentify fraud and money laundering. Given the critical nature of the solution, Springboard believes BI and Anti-Money Laundering (AML) solutions will have significant growth in the Indian BFSI marketplace in the next 2 to 3 years. n

BFSI rapidly adopting and investing in IT: Springboard

Blue Coat Systems has introduced the BlueTouch Professional Services Partner (BTPSP) Program, an advanced service offer-

ing that enables partners to increase their service attach rates and margins by delivering professional and consulting services. The BTPSP Program supplements the BlueTouch Support Partner Program by providing the tools, certification and training that partners require to develop strategic, consultative relationships with their customers.

The BTPSP Program is a two-level program that offers a variety of professional services, including network design; installation and configuration of Blue Coat products; testing and migration from staging to production-ready environments; migra-tion and upgrades; and management and monitor-ing. Additionally, certified partners can participate as subcontractors in professional services engage-ments that are managed by Blue Coat. The BTPSP Program is part of the Blue Coat Channel Advantage Program and is available for all Premium, Elite and higher level partners.

“As a certified BlueTouch Professional Services Partner, we have the technical expertise and access to Blue Coat’s knowledge to help our custom-ers maximize the return on investment in their Application Delivery Networking infrastructure,” said Andrew Lev, Group Senior Vice President Marketing, Alliances and Channels at Integralis. “With this program, we are complementing our trusted advisor services with a valuable consulta-tive approach that allows us to share our expertise and ensure our customers’ networks are optimized to best serve their business requirements.”

The BTPSP Program provides two levels of partner certifications: BlueTouch Professional Ser vices Par tner and Master BlueTouch Professional Services Partner. Additionally, the program offers individual certifications in the key Application Delivery Networking specializations of visibility, acceleration and security. Certified BlueTouch Professional Services Consultants are certified in the acceleration specialization and at least one other.

“With the new Professional Services Partner designation, Blue Coat has created an offering that enables partners to increase service attach rates and margins while building more strategic relationships with their customers,” said Jim Harold, Vice President of Worldwide Channel Sales at Blue Coat Systems. n

Sanchit Vir Gogia

DIGIT CHANNEL CONNECT 10 FEBRUARY 2010

We would expect the stimulus package that the government has

announced (countervailing duty, CVD tax reduced from 10-8%) to continue for some time as the investment climate has improved. B2C business looks good but B2B business needs to scale up further.

I would also expect in the budget the correction of the anomaly in a few IT products categories like printers on abatement. The government had amended the duty structure basis from value based to retail price based with an abatement of 20%. This abate-ment is quite low and the indus-try still requires the support of the government to increase it to 30% so that freight reduction of 10% can be passed on to the consum-ers. Also, more thrust needed on infrastructure development.

ExpectationsBudgetcover story

ALOK BHARADWAJSR VICE PRESIDENT, CANON INDIA

As the Finance Minister gets set to present the Union Budget for 2010-11, DCC highlights the expectations and perspectives of some key execs in the IT fraternity

DIGIT CHANNEL CONNECT 12 FEBRUARY 2010

cover story

Looking at the current market scenario, industries have started coping up from the negative impact of global slow-down, but unfortunately the Indian IT hardware industry

is not doing that well as compared to other industry verticals. So, first and foremost the government should continue the stimulus package for this industry. We also expect clarity on the roadmap for GST. However, to sustain hardware manufacturing in the country for the longer run, it is critical that taxation structure should be stable. While the Indian GDP growth this fiscal is grow-ing, the market for desktops is showing negative growth. This factor should be looked into seriously in order to drive the growth.

We have also recommended that the 8% excise duty/CVD on all IT products–computers, peripherals and components - be main-tained as is. It should be ensured that the IT product value chain has a seamless CENVAT chain. The output/finished products at

no stage should be at lower excise duty/CVD than the inputs/components. Further, it is strongly recommended that the rate of service tax be aligned to that of the excise duty/CVD to avoid struc-tural anomalies. Currently the service tax is pegged at 10% while the rate of excise duty/CVD is 8%.

The duty structure should remain stable. It becomes very difficult for the industry to introduce newer price struc-ture on regular time intervals. We expect stability and

consistency from the Budget 2010. We are still living under the huge negative impact of global recession – and the IT industry is no different.

The IT hardware market is not growing at a level it should, even though prices have already come down. I request the concerned agencies to come up with a consistent and motivat-ing budget, which will drive the growth of the IT industry.

The economic slowdown of last year has somewhat affected corporate investments. The budget should facilitate companies to retain more investible funds for modernization and expansion.

As one of the sectors critical to India’s emergence as the next economic superpower, the IT sector has considerable expec-

tations from the Budget. The extension of the tax benefits beyond 2011, under the Software Technology Parks of India (STPI) scheme would enable the Indian IT sector to compete with other countries globally and sustain its global edge. These incentives will help the small and medium businesses in particular, a key growth sector that accounts for 40% of the exports made from software technology parks.

The whole of last year vendors like us have been paying service tax as VAT (or CST) on software

sales. This I believe is not correct for our industry segment. Our end customers are also ending up paying more. This budget should bring more clarity on this aspect.

Service tax on services and software will have impact on our vertical. So, I would say that this parameter should be carefully looked upon. Any taxation which affects auto Industry will have similar (positive or negative) impact on our performance also.

Last but very importantly, STP bene-fits should continue for a longer time. Service tax on IT/Engineering services should remain at same level.

I do expect this budget to be more reformatory in terms of imple-mentation of Direct Tax Code and GST. I would expect a Phase 1 plan introduced in this regard as this may be implemented in

stages over next two years or so. Hence it is very unlikely there may be changes in tax rates in both Direct and Indirect taxes. However, I do expect a gradual shift in Corporate tax downwards around 28% and moving towards 25% in the coming years to align with DTC plans. In brief, a positive forward looking budget is expected. I would say this budget will be very neutral to IT industry.

In India we are never motivated to enter into a space where we build IP and brands and sell globally. India should build more IP and market products globally. It has always been a challenge to do that. However, with the help of Government, there should be incen-tives by ways of grant or incentives for software product companies building IP for the country. These companies should be showcased and marketed by Government through its various channels.

VINNIE MEHTA EXECUTIVE DIRECTOR, MAIT

SR NAUTIYAL MD, SPARK TECHNOLOGIES

VIKAS KHANVELKARMANAGING DIRECTOR, DESIGNTECH SYSTEMS

R S RETHINASAMYCFO, ADITI TECHNOLOGIES

BIJU NAIRCFO, FOUR SOFT

Iexpect the budget to provide a smooth transition from STPI to SEZ regime with simplified process,

reusable capital assets and manpower resources. I also expect better clarity on the tax benefits under SEZ in accor-dance to the proposed Tax Code.

DIGIT CHANNEL CONNECT 14 FEBRUARY 2010

cover story

We urgently need finality and clarity on the taxa-tion applicable on Software

based products. There could be one option where GST is to be applicable from 1st April 2010. Till GST becomes applicable we would require better clar-ity on Taxes applicable on software in different forms.

Software ESD/Paper (in the name of the end user) license developed in or outside India should have only service tax, and no VAT should be included in it. TDS on Software ESD License sales should be fixed at maximum 1%, since the margins are only 3%-4% when sold by software dealers. I would definitely demand that there should be no VAT applicable on software licenses.

The primary expectation from the Union budget is that GST would get implemented in this

period. This would certainly stimulate most sectors of the economy not simply through a cost saving, but through a simplification of commerce. This is also the belief from Tally, which truly believes in the power of simplicity.

We need to have consistency and stability in the taxa-tions and duty structure. And with the kind of economic scenario the industry is facing, it will be

really great if the stimulus package is continued. I don’t feel that the industry should look at unrealistic demands from the taxation point of views but there should be no additional taxes apart from the existing taxation structure. I strongly feel that at this point of time, industry cannot digest any new tax on IT hardware or software.

Another interesting and very important viewpoint I have is for the assembled PC market. I believe that the Government should take a relook on their existing policies regarding the assembled PC market. As this area could be a big stream for Indian employment generation and Indian entrepreneurship development. IT hardware segment is something which is very

important area for the overall growth of the industry. And this segment is still under the impact of recession, so we request the Government to look at the IT hardware segment carefully as it needs to grow.

The year 2009 was a good year for Canon despite uncer-tainties faced by many sectors in the industry. However we expect 2010 to continue to be very strong in terms of perfor-

mance as far as the consumer electronics industry is concerned. The industry expects a reduction of 30% in the corporate tax due to the introduction of Direct Tax Code (DTC) suggesting a 25% rate. We hope that the tax concessions received by us last year continue to stay through the new year as this will give us the added boost to achieve the growth rates projected before the slowdown hit the economy.

Apart from the above we foresee the government strengthening its focus on the rural sector with greater fiscal incentives, rural employment and various other rural incentive programmes. These steps would surely go a long way in giving the rural economy and rural demand a greater boost. We expect that policies of the government should be such that they result in higher disposable incomes in the hands of customers so that they loosen up their purse strings and it results in higher sales.

The budget should provide a strategy for investment led growth and stimulate demand through fiscal measures. Though the industry is conscious of the problems of fiscal

deficit, the government should pursue its focus on fiscal consoli-dation after the economy has recovered strongly.

While the corporate tax burden needs to be cut, the budget should make provision for investments in education, secondary and vocational in particular, broadband, infrastructure and the power sector, all of which are critical to socio economic growth of the nation. The government must create a National Technology Acquisition Fund to increase technology infusion in micro, small and medium enterprises (MSME). In the Education sector for instance, while rightful importance is being attributed to the basic foundation of education through programmes like the Sarva Shiksha Abhiyan (SSA), the focus on secondary educa-tion should increase. Also, budgetary allocation towards tech-nology that makes distance learning initiatives viable would help

to ensure access to quality education and vocational courses in remote rural areas. One also looks forward to budgetary allocations towards some major e-governance projects,

executed under the PPP (Public Private Partnership) model. Projects for citizen services should be given due importance.

NARESH WADHWA PRESIDENT AND COUNTRY

MANAGER - INDIA AND SAARC, CISCO

PUNEET DATTAASSISTANT DIRECTOR – MARKETING

(BIS DIVISION), CANON INDIA

ALOK GUPTA MD, SOFTMART

KALYANARAMAN D PRESIDENT, TALLY SOLUTIONS

SAKET KAPURMD, GREEN VISION

DIGIT CHANNEL CONNECT 16 FEBRUARY 2010

cover story

The key demand is to issue a clear definition of customized software in contrast to packaged IT software. Also, to recog-nize that IT software (customized or packaged) could be sold

as a shrink-wrapped box, paper license or Internet download. The major problem is simultaneous imposition of service tax and VAT on sale of software licenses. Double taxation has increased costs.

There also needs to be a reduction or removal of excise and CVD on packaged software because packaged software is in no way a threat to the local IT industry. Channel partners are facing huge working capital issues as customers started slashing TDS (tax deducted at source) on the invoices raised by channel partners on software that’s sold in the country. At 10.3 percent TDS, partners are facing huge complications. TDS has to be reduced significantly/removed.

The IT/ITES sector has been the fastest growing segment for Exports and has also been the largest job creator in the country. With downturn in the US economy, business

has been tough and appreciation of the Rupee has not helped. The Industry needs an Extension of Tax Holiday by five years in existing STPs. The new SEZ scheme has not caught on, and is also not viable for small and medium software companies. Hence extension of tax exemption for five years is a must.

One of the major problems being faced by Software Product companies is confusion related to tax. The question is whether it is Excise or Service Tax that is applicable on Software Products. There is need for clarity and there is urgent need for clear guide-lines and notification.

DIWAKAR NIGAM MANAGING DIRECTOR, NEWGEN

SOFTWARE

SHRIRAM KRISHNAMACHARI HEAD – CHANNELS & DISTRIBUTION (INDIA AND SAARC), ADOBE SYSTEMS

Union Budget 2010-11 has already spurred great expecta-tions and discussions. The Government has plenty of issues to take into notice in order to come up with an ideal budget

plan that meets everyone’s expectations. We are looking forward to a budget that provides stability and does not result in disruptive changes. The key issues from our perspective include: n Continuity of the uniform 4% VAT till such time that the GST gets

implemented. A disturbing trend noticed is that of different state governments moving away from the ‘accepted, uniform 4% VAT level’ - this varies from 5% to even 12.5%!

n Continuity of the present duty structures - the IT hardware indus-try witnessed a de-growth in 2009 (compared to 2008). In an emerging and growing economy like India, this is unacceptable and unaffordable. Thus any attempt to increase duty rates (excise or otherwise) would be counterproductive.

n Removal of 4% SAD on imported items to avoid overflow for local manufacturing. Otherwise this CENVAT credit piles up without any opportunity for utilisation. MRP based valuation should be removed under both Excise & Customs for IT hardware items. The dynamic nature and the rapid pace of technology make the task of MRP quite meaningless.

Idon’t expect that this budget would be very populist like the earlier one. Probably our finance minister will

have to take some hard steps towards financial reforms. The spiralling food price index needs to be addressed as high priority.

The proposition of withdrawal of SAD is overdue. We are expecting some action on the same. Secondly the aboli-tion of Central VAT is needed. This is most essential to help free flow of goods from one state to another.

GAUTAM GHOSHCOUNTRY MANAGER - INDIA,

VIEWSONIC

S RAJENDRAN CMO, ACER INDIA

DIGIT CHANNEL CONNECT 18 FEBRUARY 2010

special report Data Management

Learn how to make information work effectively for your business GEETAJ CHANNANA

Data in an organization is like blood in the body. It has to be purified continuously, pumped regularly and it must reach all the correct organs in the body in time to ensure that all body functions are being performed seamlessly. One blocked artery and the chain is broken, and the body collapses.

Your business works in the same way. If you can ensure that your data is secure, and moves freely to the right people in the organization on time, it will result in a machine that is running smoothly. It will also ensure that the inter-vention, when required, comes at the right time.

To gauge the way companies use their data and convert it into opportunities, we conducted two surveys – the first asked people how they stored and used their data and the related challenges. The other was on business intelligence tools and their effectiveness in making the right business decisions.

ISDATA ACOST OR A

OPPORTUNITY?HIDDEN

DIGIT CHANNEL CONNECT 20 FEBRUARY 2010

special report Data Management

More than ahalf of the respondents were from companies with more than 500 employees. About 40 percent respondents were from companies that had revenues of more than Rs. 2.5 billion. Most of these companies were owner driven, and technology related decisions were taken by the CEO, President or owner of the company. More than 50 percent of these compa-nies are also forward looking and ready to adopt new technologies.

We will be quoting results from these surveys through the story.

Creating DataEven an advertisement from a leading technology company on television talks about the amount of data we are creating daily in the world. It is more than all the information in American libraries. A regular company is no less.

There are so many kinds of data that an organization produces or has to use. It is data about customers, logistics, transactions, products, manufactur-ing and supply chain.

This data is not only important for your business but for people outside too. Be it your customers, vendors or the government. All require you to store, process and safeguard your data in a certain manner. There are many statutory and compliance related regu-

lations that come into play too.And you need all this data converted

into information at the right time to take effective business decisions.

Like with the body, you need to have the right fitness level before you start playing a sport – you need to store and secure your data properly before you start making business decisions.

Keeping Data OrganizedData Management starts with aggre-gating the data of the organization and storing it in the right way. In this age of information the amount of storage needed has increased multifold. Close to 50 percent of companies surveyed have 100 to 500 GB of storage to manage, and about a third have more than 1.5 TB of data.

The challenges posed by this deluge of data are immense. There is also the attendant risk that this free flowing data can result in espionage, data leak-age and data loss. Resulting in loss of business and opportunities.

Close to 60 percent companies store their data on file servers, with some using storage farms. But, the worri-some point is that over one third of the companies surveyed still use personal computers for storage.

These companies are the ones that are likely to be the hardest hit by a data

loss incident. That is because it is diffi-cult to manage and backup data from individual computers. Add to this the fact that recovery mechanisms for a PC are pretty rudimentary. Eighty percent users lose their data because of hardware failure, which is a lot more common in notebooks and desktops. This is also the place where data turns into a cost. The cost of securing it and that cost that arises when you lose that data.

Thus, consolidating data in servers is a good option. Some companies are also dabbing with desktop virtualiza-tion. It helps in eliminating desktop computers altogether and processes all the data on a server, thus consid-erably decreasing the risks related to data loss.

Preventing Data LossYou can either have a vaccine for a dangerous disease or take a medicine to cure it. Similarly for your business you must have a two pronged strat-egy of security and disaster recovery. Companies feel that the biggest chal-lenges in managing data are effec-tive backup and recovery (60%), and ensuring that the data is safe and right people have access to it (57%). Thirty one percent think that data prolifera-tion is the biggest challenge for them.

Twenty eight percent organizations admit that they have been affected by data loss. Forty four percent of the surveyed companies say that they have been able to recover the lost data less than 75-percent of times, when data loss has happened.

Businesses must understand that losing data when you are growing at a fast pace can hit you harder than you can imagine. It is like blowing a tire while accelerating a really fast vehicle. You will end up losing more than what you may have gained by prioritizing project delivery over data backups.

Converting Data into IntelligenceOnce you have secured your data and have the right processes for backup, the next step is to make it work for you. This involves giving access of the right data, to the right people, at the right time. This is where Business Intelligence comes in.

Hans Peter Luhn, an IBM researcher, used the term Business Intelligence (BI) for the first time in an article written in 1958. He defined the objective of BI as

Vendors provide a Hanuman

approach in ERP systems.ANISH TRIPATHI GRANT THORNTON

Technology should work as an enabler for achieving specific busi-ness goals.

ASHOK MALHOTRA,

METTLER TOLEDO

Awareness of business

intelligence (BI) solutions and

tools

No46%

Yes54%

How do you store data inyour organization

80%

70%

60%

50%

40%

30%

20%

10%

0% Net

wor

k st

orag

e on

a fi

le s

erve

r

Net

wor

k of

sto

rage

ser

vers

Loca

l sto

rage

with

com

pute

r

Off

site

dat

a ce

nter

Oth

er

59%

37% 34%

17%10%

Challenges in Managing data

Ensu

ring

effe

ctiv

e da

ta

back

up a

nd re

cove

ry

80%

70%

60%

50%

40%

30%

20%

10%

0% Ensu

ring

that

the

data

is s

ecur

e, a

nd

only

the

right

peo

ple

have

acc

ess

to it

Mor

e ty

pes

of d

ata

and

docu

men

ts(d

ata

prol

ifera

tion)

Gre

ater

qua

ntiti

es o

f dat

a (D

ata

Expl

osio

n)

Prov

idin

g an

ythi

me,

any

whe

reac

cess

to d

ata

60%50%

31%26% 26%

DIGIT CHANNEL CONNECT 21 FEBRUARY 2010

special report Data Management

“the supply of suitable information to support specific inactivities carried out by individuals, groups, departments, divisions or even larger units.”

The keyword here is ‘suitable infor-mation’. Having access to data is not enough. There should be a correct context to it. Correct data in the right hands at the right time can be extremely valuable.

We did a survey of more than 100 business and technology leaders from mid-tier companies to determine the awareness of specialized BI tools, the type of tools being used and under-standing their utility. We found that more than half of all the responding companies were using an ERP. Many felt that it is dif ficult to integrate reports from various systems. More than a third thought that the reports they were currently getting were either too detailed, out of date or incomplete.

This means that even after invest-ing a large sum on an ERP system, organizations were left wanting for information. Most people who use ERP dashboards also use a BI system or plan to use one.

Does it mean that the ERP implemen-tation is inadequate? Anish Tripathi, Par tner, Markets and Strategic

Services at Grant Thornton says, “The vendors provide a Hanuman approach in ERP systems. They give clients the full mountain and it is up to the client to figure out what he needs.” He adds,” There is no need of a BI product if the ERP vendor has done a good job.”

This reiterates the need to add context to the data, otherwise a senior manager is just crushed by the deluge of data and cannot draw any effective insights from it. Rather, the data over-load results in loss of important figures and subsequently, wrong decisions.

A s h o k M a l h o t r a , M a n a g i n g Director, Mettler Toledo India is going to implement a BI system even though he already has a robust SAP imple-mentation in place. He says, “SAP gives us raw data and not insights. BI as a tool will help us use the data from SAP to improve future decision making and optimize current resources.”

According to the survey more than 20% business leaders think that trans-actional data in the organization is not available to the right people.

Tripathi adds,” It is not at the right time too. It is a design fault and the busi-ness leaders are also to blame because the thinking is also outsourced to the IT vendor. Most of the time the client

does not demand the right thing.”That makes it even more challeng-

ing to implement a BI system than it is to implement ERP. According to Malhotra, the biggest challenge that people face while implementing BI is that, “People should know what they want to get out of the system.

The technology should work as an enabler for achieving specific business goals.” Before you go ahead and imple-ment a BI solution, it is important to get your business objectives in place and ensure that you have specific goals that you would want the BI system to achieve. Also, it is important to make fine tuning a continuous process.

As Tripathi puts it, “Lack of fine tuning is the reason why people get disillusioned after a point of time and cease to get benefits from the system.”

As the survey points out, BI is a great tool that can benefit businesses immensely, but it is important that the implementation is fuelled by correctly defined business objectives, and the tool is tuned periodically to ensure that its productivity is maintained.

Data, thus, is also like your girl-friend. Treat it well if you want a peaceful and prosperous life; abuse it at your own expense. n

Data Man-agement

starts with aggregating the data of the organi-zation and storing it in

the right way. In this age of information the amount of storage needed has increased multifold.

DIGIT CHANNEL CONNECT FEBRUARY 2010

channel q&a Green Vision

22

DCC: Can you please recall the journey of Green Vision since its inception days?

Green Vision was incorporated in 1990. Launching a company back then was very different from what it is today. The words like ‘private equity’, ‘raising capital’, etc were not part of the diction-ary because economically, India was in a transition phase. The paradigm for business, especially entrepreneurship, meant the owner doping the entire work himself. This is exactly how Green Vision was started.

My primary investment in the company was my experience. I cannot calculate my progress in terms of my annual turnover; rather I consider my own as well as my organisational devel-opment to be the progress. From a one-man’s show, we have now gone into many functional departments.

DCC: In a highly competitive world, the biggest challenge is to retain customers. What are the strategies you follow to attract customers?

The word ‘strategy’ appears a little calculative because when we deal with customers, we do not have a strategy in mind. One should be particular about the strategies and mould things as per the situation.

Customers need warmth and special attention. For us, customers are more than a mere source of capital and we try to make them feel so. We understand their requirements and help them buy the product of their choice by present-ing before them the best of deals. We educate them and not push them into buying from us. The idea here is to strike

a healthy relationship with customers so that they always come back with a positive feel good factor. Being ethical is another way that can help one retain customers and sustain business.

DCC: The tough economic conditions gave enterprises extra time to sit back and strategise their business. Do you agree?

Our economy is cyclical and I would say that recession is again a phase of that economy. There will be ups and downs and it is up to an individual as to how he reacts to a particular situation.

We too utilised this phase to sit back and strategise and have been able to chalk the vision for our organisa-tion for the next five years and thus, I believe that slowdown brought a posi-tive change for Green Vision.

During the normal working times, we often do not get time to trace the growth of our business, but slowdown gave us the opportunity to do so and also identify our core areas of competence. We tried to focus on retaining custom-ers by providing them timely services, irrespective of the tough times. We realised that we need to be prepared to avoid such slowdowns in future. And above all, we tried to understand that such things cannot really bog us down.

DCC: From the channel community perspective as a whole, what are the key challenges that partners face in the IT business? IT business can be categorised into three broad areas – networking, comput-ing and services. Networking was the least affected by the slowdown whereas

computing segment saw a major transi-tion. There has been a drastic shift from the local brands or assembled segment to multi-national players. Desktops have been replaced by laptops/note books or netbooks. Partners who deal in assem-bled PCs or sourcing components can face a tough time ahead. For one whose role is limited to buy a branded PC and sell it to customers, their reach as well as margins are expected to reduce. Therefore, this shrinking of margins poses a major threat to the channel business because there is no scope for benefits and value-adds for the partners.

Services, on the other hand, is one area where channel is sure to survive and succeed. Almost five years back, a customer would take maintenance contract for his IT infrastructure, whereas today the trend has changed – rather than investing in hardware or soft-ware, they recruit system administrators/IT professional or even outsource their entire IT infrastructure. But due to this, large contracts have almost got finished - this is a challenge in the services sector.

DCC: What has been your key focus?As for now, every area where

customer can increase our productivity is the key area for us to focus. We work for our customers’ needs and require-ments and therefore it becomes our sole responsibility to focus on the areas that can attract the maximum customers.

Remote Infrastructure Management Services (RIMS) is one of our key areas. We do not specifically provide RIMS; we employ this tool to remotely support our native customers only. n

[email protected]

Kapur shares his journey of making Green Vision one of the most admired channel companies in India in an interaction with Charu Khera

“WE FOCUS ON AREAS THAT ATTRACT MAXIMUM CUSTOMERS”

Saket Kapur, MD, Green Vision

My primary investment

was my experience.

I cannot calculate

my progress in terms of my annual turnover; rather I consider my own

development as well as the development

of my organisation

to be the progress.

Customers need warmth and special

attention. We educate them and not push

them into buying from us.

DIGIT CHANNEL CONNECT 23 FEBRUARY 2010

channel q&a Redington

DCC: What are your key supply chain challenges?

As a key Supply Chain Solution Provider to the IT Distribution Industry, our constant challenge is to educate both channel partners and vendors on the “cost vs value” elements of the vari-ous components of the services being extended by us. The main challenge is containing the cost of various services that we provide while maintaining a competitive offering to our business partners. Supply Chain Management is a space intensive and manpower inten-sive service and the quality that we can offer in this area is directly proportional to the value that our customer is willing to attach to it.

DCC: How do you structure your support system to serve small-town channel partners for issues like warranty and replacements?

Warranty and warranty related replacements are offered strictly as per vendor policies and guidelines. We do have a division - Redington Reverse Logistics Centre (RRLC) - which supports the vendors through a toll-free number which provides a single point contact for all warranty related logistics issue. Partners can log their warranty related requirements with RRLC, which would co-ordinate and guide them at each step of the process, as laid down by the vendor.

DCC: Most of the distributors today provide value-added services. How do you differentiate your offerings?

“Value-add” has become a much-abused term, being used too lightly. Also,

what is “value add” today becomes a “norm” tomorrow. The largest value-add that all the National Distributors are providing to all the business partners are deployment of Capital for extend-ing credit and maintenance of Stocks across the huge geographical spread of the country.

Nevertheless, as the channel gradu-ates more and more into solution sell-ing and the vendors look at extending the reach of their Enterprise Solutions to beyond Tier-1 cities, Redington has deployed skilled resources to train part-ners and help them propose and config-ure solutions to the end-customers. We represent the vendors’ extended arm in the SME segment in this respect. Unfortunately, obtaining sufficient value for this investment, both from partners as well as from Vendors is increasingly a challenge.

DCC: What are the trends in the movement of volume products in smaller cities?

The trend is very well-established. Penetration in Tier-2, -3, -4 cities is on continuous increase. These cities have demonstrated growth even during the period of economic slowdown over the last 12 months.

DCC: Redington had said that it would set up an NBFC to offer credit. Please update us on this?

Our 100% owned NBFC, Easyaccess Financial Services Ltd, has been in existence since January 2008 and over that past two years, nearly 100 of our largest channel partners have availed Working Capital funding from it. EFSL

is strictly governed by RBI regulations, being subjected to regular RBI audits and there are specific documentation requirements that the partners would need to comply with.

DCC: What are the key benefits from your Automated Distribution Centre (ADC) in Chennai? It is learnt that your company is planning for more such centres?

The ADC at Chennai is operational. The next four are planned at Kolkata, Delhi and Mumbai. The key benefits are Economics of scale, Consolidation of Regional warehouse space during a single GST regime, and Ability to extend efficient 3PL services.

DCC: How are you placed vis-à-vis traditional competitors and other logistics companies?

There is no point in comparison with other logistics companies as we are still not into large scale 3PL services. As compared to our competitors, I would only state that we provide quick and easy access to our partners across all geographies in India, for most run-rate products that we carry.

DCC: How is your move to diversify into lifestyle products paying off?

Our diversification into Lifestyle, Digital Products and Consumer Durable has helped us tremendously in address-ing a completely dif ferent market segment. Our “non-IT” portfolio is grow-ing at a very rapid space and it is likely to more than double its revenue this fiscal, as compared to FY 2008-09. n

[email protected]

Neogi talks to Muntazir Abbas about the challenges that Redington, one of the fastest growing distributors of IT products in India, faces and the road ahead in distribution

“Value-add has become a much-abused term.”PS NEOGI, President, Redington India

THE LARGEST VALUE-ADD

THAT ALL THE NATIONAL

DISTRIBUTORS ARE PROVIDING

TO ALL THE BUSINESS

PARTNERS ARE DEPLOYMENT

OF CAPITAL FOR EXTENDING CREDIT AND

MAINTENANCE OF STOCKS.

Supply Chain Management

is a space intensive and

manpower intensive

service and the quality is proportional to the value

that our customer is willing to

attach to it.

DIGIT CHANNEL CONNECT FEBRUARY 2010

vendor speak Extreme Networks

24

DCC: Can you brief us about your distribution structure in India?Extreme Networks follows two model distribution approaches – Global Alliances like Avaya, Ericsson & Siemens who sell as well as bundle Extreme prod-ucts with their convergence solutions and then there are channel partners, SIs who focus on the enterprise space. We also have a direct sales team in Delhi, Mumbai, Chennai and Hyderabad.

DCC: Extreme Networks launched its Partner Programme in India in 2009. Under the same, the company appointed 20 SIs across India. Do you plan to make further enhancements to the programme?The partner program offers four levels of partnership - Diamond, Platinum, Gold and Silver. These titles are awarded to partners based on the sales and pre-sales skill set, revenue commitment and service capabilities.

Our channel policy is to work with selective partners and thus, we do more with less - same like our products. The Partner Program is built on value, inno-vation, and commitment.

Presently, we have 30 odd partners in India and in 2010; we will add new partners in the new territories so that we can have a wider reach in the country. Also, in 2010, we will focus on enabling our partners with the latest technolo-gies by conducting various boot camps as well as webinars. There are excellent opportunities in India and we need to convert these into business through our channel partners.

DCC: Throughout 2009, Extreme Networks tried establishing itself in the Converged Enterprise and Carrier Ethernet market. How successful have you been and how well-equipped are your partners to help you achieve these results?We have different partners working in Carrier Ethernet and Converged Enterprise segments. In the last six months, we have introduced around eight new models for the segment and all products are aimed and researched to solve “Business Problems” with superior technology.

To maintain the pace with technol-ogy, we need the constant support from our channel partners. For the same, we believe in providing them certification courses of our products. These training and certification are web-based courses and are a must for them to retain their partnership levels.

DCC: What are some of the key channel initiatives planned for 2010? Also, please share your expansion plans.Throughout 2010, we will reward our partners who have made the necessary investments in training, technical and sales competence. Furthermore, to moti-vate the sales team we have introduced “Purple Point” incentive program for signed partners. A major agenda is to conduct a national level partner meet.

Our expansion plans are twofold as India is a very important market for Extreme Networks in the APAC region. We therefore will continue to strengthen our presence with selected partners in the metros and state capitals.

Apart from this, we are in the process of identifying partners in cities where we do not have direct presence. We are also leveraging our distributors’ strength in tapping B- and C-class cities.

DCC: Which market segments or verticals will you focus on in 2010?We have been quite successful in verti-cals such as Education, Government, Te l e c o m , S e r v i c e P r o v i d e r s , Manufacturing, PSUs, Hospitality and Healthcare. With the new range of products, in 2010 we will be strongly pitching for Data Centres & BFSI verti-cals as well.

DCC: What are some of the challenges you face in channels?Most of our partners are used to fight-ing against the so-called ‘branded giants’ and they are very confident technically about our products and solutions, which helps them in convert-ing competition accounts. But with the new partners, it is a bit of challenge.

DCC: Please comment on the latest trends in next-generation data centres.The adoption of virtualisation and outsourcing of infrastructure to managed hosting and cloud providers is driving demand for high performance and increased scale in the data centre network. Today, hosting companies and enterprises alike are scaling their data centres to realise the benefits of a virtu-alised infrastructure and cloud-based applications and systems. n

[email protected]

“ We will focus on data centres and BFSI verticals in 2010”

Gupta discusses with Charu Khera the key verticals that Extreme Networks plans to tap into this year through support from its channel partners

Jitendra Gupta, Country Manager—India and SAARC, Extreme Networks

To maintain the pace

with technology, we need the

constant support from our channel partners. For

the same, we believe

in providing them

certification courses of our

products. These

training and certification

are web-based

courses and are a must for them to retain their partnership

levels.

DIGIT CHANNEL CONNECT 25 FEBRUARY 2010

vendor speak IBM

“A HUGE FOCUS WOULD BE ON MIDDLEWARE”

DCC: What are your new partner initiatives in India?

We have started a unique concept of business partner-led territory in India, where a partner actually is the go to market lead for a typical set of clients spread across different geographic loca-tions. They do the business devel-opment for IBM Corporation for the specific accounts across different geographic territories. We have introduced this concept of Software Value Plus to help

partners maximize profits by reselling IBM software, based on the clients’ needs and their invest-ment in skills.

DCC: Do you focus on any specific verticals or kinds of partners?

We are looking for dif fer-ent types of partners who have proven expertise and focus in specific industry verticals. A huge focus would be on IBM middle-ware and we are trying to tap the ISVs for this. Similarly, we

are looking at service providers and system integrators who have industry-specific skill sets and business knowledge to cater to different industry verticals.

DCC: What solutions do you plan to deliver to SMBs?

We have a lot of products in our portfolio that hit the SMB sector. For example, DB2 Express, mainly because of the storage and performance in respect to the cost incurred which is comparatively

Sandy Carter, VP, Channels, IBM Software Group

lower in DB2 Express. We are also focusing on prepackaged and preconfigured appliances with plug-and-play software architec-ture like Lotus Foundation and Tivoli Foundation. We are also stepping up our public cloud offering like Lotus Live.

DCC: What kinds of tools do you provide partners?

We a r e b a n k i n g o n o u r collaborative partner strategy to support our growth plans a great deal. Additionally, we are also using Lotus Community, where the partners can pick up communities based on their interest and collaborate on their skill and knowledge. We are also using social networking sites like Twitter and LinkedIn for exchanging information and growing business connections. We are also allowing them to use a collaborative partner dash-board which they can leverage to pull information online. n

[email protected]

In an interview to Soma Tah, Carter talks about some of the key partner initiatives in India

DIGIT CHANNEL CONNECT

best of biz Working Capital

FEBRUARY 201026

Burzin Dubash dwells at length on ways to optimise procure-to-pay cycle of companies

CREATING LASTING VALUE

contracting, credit management and logistics are with different parts of the organisation, with often competing agendas. If companies want to shrinkm the cash-conversion cycle, they need to get everyone in the supply chain—from procurement to production and treasury through to customer service, working together and thinking like a CFO.

In my previous article, I had talked about the three key processes that could be optimised in almost every enterprise to release that precious working capital.

While I had dealt with inventory management previously, I will look at some strategies of optimising the procure-topay (P2P) cycle in this article.

Effective management of the P2P cycle is one of the easiest ways for businesses to improve cash flow, and a regular review of policy and procedures in this area also helps in identifying further opportunities to deliver hardcore rupee savings. Creditor management is about maximising the period from purchas-ing goods and services to paying for them, thereby reducing working capital requirements in the business. This objec-tive of maximising the credit period must be carefully balanced to ensure relation-ships with suppliers are not damaged and stock levels optimised.

The accounts payable profession (if that’s an appropriate term to use) is unregulated though there are inter-national standard-setting bodies, an example of which is the International Accounts Payable Professionals (IAPP), an association of more than 5,000 members in the US, Canada, the UK and other countries. What is interesting is that as part of its Professional Standards Framework, the IAPP has established a new definition of the accounts payable function: Accounts Payable (AP) is a stra-tegic, value-added accounting function that performs the primary non-payroll disbursement functions in an organisa-tion. As such, the AP operation plays a critical role in the financial cycle of the organisation. AP enables an organisation to accomplish its objectives by bringing a systematic, disciplined approach to evaluate and improve the effectiveness of the entire payables process. In addition to the traditional AP activities whereby liabilities to third-party entities (suppli-ers, vendors, taxing authorities, etc.) are recognised and paid based on the credit policies agreed to between the company and its suppliers, today’s AP depart-ments have taken on much wider roles, including fraud prevention, cost reduc-tion, workflow system solutions, cash flow management, internal controls and vendor (supply chain) financing. So

Working capital is the cheapest and the most accessible finance avail-able. It provides busi-

nesses with the crucial opportunity to pay down costly debt and regain borrowing headroom. A focus on working capital can help management drive transpar-ency and accountability throughout the organisation. Most companies focus on reducing debtor days, delaying vendor payments and/or bringing down inven-tory instead of taking a more holistic view while managing working capital.

Create long-term value. Focusing on working capital management provides companies the opportunity to create lasting value. Working capital is a lens through which management can examine an organisation’s productivity

and efficiency. Implemented correctly, working capital management will make companies much stronger tomorrow than they are today. In order to drasti-cally improve management of working capital, companies need to take a cross-organisational view of the cash-conver-sion cycle, including procurement to pay, forecast to fulfillment and orders to cash cycles. They need to break down and evaluate individual components of each element of the cashconversion cycle and then bring about lasting changes in how cash is managed.

Holistic approach. The fundamental problem with enhancing working capital management is that typically the whole function doesn’t come under a single person. The responsibility for procure-ment, inventory management, customer

DIGIT CHANNEL CONNECT 27

best of biz Working Capital

FEBRUARY 2010

BURZIN DUBASH

Today, many electronic apps are

available to integrate the procurement, receipting and

payment activities and to make less burdensome the need to

re-key invoice information or to match

invoices with receipts

manually.

All companies should set a

clear policy on creditor man-agement that will underline their approach to sourcing and

negotiating terms and con-ditions. That policy should

take account of optimal stock holding levels

and timing of other cash flows within the business.

let’s examine how businesses and their AP professionals can do justice to the following objectives:

Create cross-functional responsibilitiesOur experience has shown that compa-nies can best manage working capi-tal by creating cross-functional teams with the CFO as the “overall sponsor”. This helps create a common view and shared responsibility for outcomes. Team members need to collectively agree on cash targets and key performance indi-cators (KPIs). This ensures that every team is held accountable to each other and also to the organisation. Also, it is critical that non-performance is prop-erly dealt with; reward and compensa-tion need to be tied to these collectively reached cashflow targets and KPIs.

Have a clear AP policyAll companies should set a clear policy on creditor management that will underline their approach to sourcing and negoti-ating terms and conditions. That policy should take account of optimal stock holding levels (including the impor-tance of holding buffer stocks to avoid stockouts) and timing of other cash flows within the business. The purchas-ing strategy should be aligned to busi-ness goals and priorities should be set. Is price the most important issue, or is certainty of supply or quality of product paramount? Determining the key drivers for the business will guide you in your approach to managing AP.

Negotiate credit smartlyYour ability to optimise the credit period will be driven by a range of factors, including the relative importance and dependence of your business on partic-ular suppliers and their dependence on your business as a customer. Where goods required in the business can be sourced from a number of suppliers there may also be opportunities to negotiate favourable terms with existing or new suppliers—who will be keen to retain or win you as a customer.

Reduce number of suppliersBy reducing the number of suppliers by striking up key strategic sourcing part-nerships, companies can usually negoti-ate better payment terms, and greater reliability in terms of product quality and supply, while decreasing the AP workload and the risk of payment errors. However, care must be taken to ensure that over-dependence on too few suppliers does not carry too high a risk.

Partner with your suppliersPartnering with your suppliers is by agreeing to pay them on set dates— which could assist in negotiating extended credit terms for yourself. Stockholding considerations will be important in negotiating with suppli-ers, in terms of the holding costs to both your business and the supplier. Better terms can often be agreed by negoti-ating purchasing agreements where commitments to take set (or minimum) quantities at set dates are made, thereby enabling your suppliers to better plan their production schedules.

Boost fraud prevention and detection measuresAP fraud techniques have increased in recent years, as more people have learnt to penetrate AP systems and make fraud-ulent transactions. Companies now must protect themselves against a variety of AP fraud techniques. In response to these security issues, leading companies estab-lish systematic antifraud controls that focus simultaneously on fraud preven-tion and detection. Key fraud preven-tion and detection measures include the following:n��Publishing a clear code of ethics

regarding financial fraud;n��Segregating AP job functions so

that no individual employees can single-handedly authorise and access payments;

n��Employing stringent controls to moni-tor AP applications;

n��Managing vendor master files closely to reduce potential for payment error and fraud;

n��Using data analytics to constantly monitor key AP trends; and

n��Performing random procurement audits.

Use compliance efforts as process improvement oppsAs an integral part of corporate finance operations, AP departments are likewise heavily engaged in compliance efforts. Rather than viewing this as a burden, however, forward-looking AP depart-ments use compliance efforts to build world-class performance. It is impor-tant that management takes a step back periodically to critically review their operating processes and strive to bring in greater efficiencies and controls lead-ing to an overall improved AP function.

Strategies for bringing in effi-ciencies in your AP processn��Automate or eliminate steps in invoice

processing.n��Leverage technologies such as opti-

cal character recognition (OCR) and work-flow systems to digitise invoice documents.

n��Integrate ERP systems; use electronic invoice matching applications.

n��Implement a No-PO (purchase order) No-Pay policy.

n��Use electronic fund transfers for just-in-time payments to maximise your credit terms.

n��Rationalise payment terms to a few standard periods.

n��Rationalise payment-approving authorities.

n��Keep your payment date commitments to your vendors.

n��Explore payment discounts from your vendors.

n��Eliminate disputes; create a single point of contact within the organisa-tion with whom vendors can interact to resolve their disputes.

n��Reduce er rors; overpayments, payments made to the wrong vendors, fake invoices, or even late payments are a common problem for payables.

n��Train personnel; provide your accounts payable staff with regular formal training. Too often, the AP process breaks down precisely where invoice processing begins. Companies commonly find themselves spend-ing a lot of time tracking delinquent invoices or re-keying information erro-neously into the AP database. Worse yet, suppliers sometimes add to the confusion by issuing a single invoice for multiple shipments or in some cases, multiple invoices for the same shipment, thus making the task of matching invoices to receipts difficult. As a result, companies end up wasting time correcting invoice errors, delay-ing the entire payment process.Fortunately, companies that apply

best practices have found a way to circumvent the problem by leveraging information systems and redesigning the AP process to automate or eliminate steps in invoice processing. Today, many electronic applications are available to integrate the procurement, receipting and payment activities and to make less burdensome the need to re-key invoice information or to match invoices with receipts manually. And, with most of the routine transaction processing tasks in AP becoming automated and process driven, AP professionals can take part in more value-added activities, including being a catalyst for cost-control efforts while at the same time ensuring strict compliance with the organisation’s procurement policies. n

Burzin Dubash is Executive Director, Axis Risk Consulting.

analysis Oracle-Sun

As one of the world’s top business software makers takes over one of the leading hard-ware stalwar ts in a

whopping $7.4 billion transaction, the technology industry has been agog with unprecedented expecta-tion. Unprecedented, because a pure-play software giant, Oracle, has bought a hardware-dominant player, Sun Microsystems.

Recently, with the acquisition being cleared by the European Union and

With the Oracle-Sun mega merger finally coming through, customers and partners are anxiously waiting for the fog surrounding it to dispel SHWETA VERMA

with Oracle CEO Larry Ellison finally putting to rest all doubts about the deal, the industry is looking forward to what happens next. That is, how the process of integrating Sun into Oracle actually takes place. This is important for the customers as well as channel partners of both the companies.

Indications to the future roadmap of the combined entity are beginning to appear, even though a lot of clarity is still required from top management.

For one, Oracle is going to up its research spending. At a recent event

organized just after closing the deal, Oracle President Charles Phillips told customers and analysts, “Spending on research and development will surge to $4.3 billion from $2.8 billion in the prior year.” In Ellison’s words, “the proof will be in the pudding in the integrated products we deliver to our customers.”

Ellison went on to say at the event, “The combined company will be able to produce everything that businesses use in their data centers, from semi-conductors and operating systems to computer servers, databases and accounting software.”

The company has been trying to boost market confidence through such forward-looking statements, but customers and partners are anxious to see the results. “We run a good part of our business on Sun and Oracle. We are intrigued to see what advantages may be gained from partnering with a single vendor who has a complete vision for how to support our tech-nology,” the Oracle website quotes David Buckholtz, VP of Enterprise Technology and Quality at Sony Pictures Entertainment as saying.

Impact on the Indian marketThe anxiety has spilled over to the Indian market as well, with different partners viewing the situation depend-ing on their stakes in the two compa-nies.

Many customers of Sun have decided to hold their future invest-ments. “The market situation is very tough. Customers are quite fearful,” says Anindya Sinha, Manager, Accel Frontline, one of Sun’s solution provid-ers in India.

Ranjan Chopra, Managing Director, Team Computers, also expresses his apprehension: “The situation is not very clear. I hope MySQL doesn’t suffer.” Chopra is voicing the same concern that many in the comput-ing world have about the open-source database that Sun acquired some time back and which is now in Oracle’s kitty. With Oracle already a domineering player in the database market, people fear that acquisition of MySQL will jeopardize innovation.

And then, there are those who express doubts on the synergies between the two companies. “Why should a software company take over a hardware company? I don’t understand. The product lines are so different, the sales approach is different,” asserts Ranjan Sukumar, Business Head,

In Search ofSUNSHINE

DIGIT CHANNEL CONNECT 28 FEBRUARY 2010

analysis Oracle-Sun

Relitronics, a mid-size channel partner of Sun in India.

Oracle has not yet issued any specific directions with respect to the Indian market and any delay in doing so will only add to the worries. “We have not received any roadmaps so far. I guess we’ll have to just wait and watch,” says Chopra.

“The company is working out some-thing and we hope to hear something soon,” adds Sukumar.

Sources in Oracle India say, “It is too early in the transaction to say anything specific with respect to the Indian market. The integration process has just begun and it will take at least a month before we can say anything.”

Shift in channel strategyThe strategic changes outlined by Oracle at the global level will obviously have repercussions on India. The state-ments issued so far indicate a shift in channel strategy. While Sun depended largely on channel partners for its sales, Oracle believes in going direct, at least to the bigger customers.

In a presentation on Oracle’s busi-ness and technology roadmap for this acquisition, Phillips stated, “We want more strategic, direct relation-ships with our largest customers. Our model is for our largest, most strate-gic customers that are making huge investments with us -- they deserve to have a direct relationship with us.”

The shift applies to Sun's 1,700 larg-est customers. Oracle plans to organ-ise Sun's sales force into three areas of product specialization - servers, tape and storage - following the specialisa-tion model of Oracle.

Although Oracle says i t wi l l continue to rely on partners for sales to mid-market customers, the emphasis will be on working with resellers that provide integration services and other “specializations” as Oracle does now with its software resellers.

How this global and strategic shift in channel alignment reflects in India is still not clear but partners don’t seem to be very upbeat. “You can’t handle software and hardware products in the same way,” says Sukumar.

Chopra of Team Computers puts it more severely. “In my opinion I have found both organizations very inward-looking and not very channel-friendly,” he says.

The shift in channel strategy has even prompted some to consider moving towards rival companies. According to IBM Global Services, it has been contacted by several Sun resellers over the last two months or so.

However, there are many who would want to wait before taking any such decision. Sinha says, “We have been loyal to Sun for a long time. We can’t switch so easily; we would want to wait and watch for some time.” Seconding him is Sukumar, who says, “We have a majority of our customers in the Education sector, where the deal hasn’t impacted much of our sales. So, we would want to continue.”

Till the actual results of the acqui-sition start showing or until the company breaks its silence, the anxi-ety among customers and partners will continue to prevail. n

[email protected]

We have not received any roadmaps so far. I guess

we’ll have to just wait and watch. I hope MySQL does not suffer.”

RANJAN CHOPRA, MD, TEAM COMPUTERS

DIGIT CHANNEL CONNECT 29 FEBRUARY 2010

guest expression Cloud Computing

DIGIT CHANNEL CONNECT 30 FEBRUARY 2010

By following a few golden rules of how power is distributed, organisations can save big time in the overall costs incurred in data centres RAJESH SANWATSARKAR

As data centres strive to become highly available as well as efficient, an important aspect of the entire data centre infra-

structure that needs special attention is their power distribution strategy. Traditional ways of distributing power to the racks are being constantly chal-lenged with power densities as well as power consumption costs among data centres constantly rising. A recent study conducted by IDC found that the number one challenge facing data centres today is power/cooling. In this study, more than half of the respon-

guest expression Data Centre

Power Distribution in Data Centres

dents are taking a serious look at how to reduce data centre costs by control-ling power consumption. In addition, an EPA study mentioned that the power consumption costs of a data centre can account for as much as 30 percent of a company’s IT budget.

According to a study by the US Environmental Protection Agency, 20% of the operational cost of a data centre is for energy and 60 billion kilowatt hours are used annually to operate data centres within the United States alone. IDC research says by 2010 the expense to power and cool the worldwide installed base of serv-

ers is expected to grow to $44.5 billion, equivalent to 70% of new server spend-ing. Growth of data centre energy consumption within APAC increased at a rate of 23% between 2003 and 2005, compared against 17% for Western Europe, 14% in the US, and 14% in Japan.

Clearly, understanding and control-ling energy costs will help meet busi-ness objectives. Beyond controlling energy costs, IT administrators are always being asked to find ways to make IT operations more produc-tive, while at the same time improv-ing availability. Technologies that can

DIGIT CHANNEL CONNECT 31 FEBRUARY 2010

guest expression Data Centre

effectively monitor and control what is going on within the IT infrastructure while at the same time reducing staff workload can help focus resources on what’s really important to the business and impact on the environment.

Challenges facedIncreasing energy costs are becoming the nemesis of every IT organization, with these costs robbing money from more productive business purposes. Engineers are required to make many trips to the data centre site to recycle the power so that SLAs can be maintained, and MTTR reduced. It has become very difficult to accurately assess whether additional equipment can be safely added to an individual equipment rack or to a data centre. This further adds to difficulty indentifying power wast-ing devices and lack of granular power control. There is a need for environ-mental, real-time power consumption analysis, pre-emptive alerts monitor-ing that give complete understanding of hot and cold spots within the data centre, allowing for the optimization and tuning of air conditioning assets.

Major power distribution considerationsTo overcome such challenges and support GREEN Power Management one must discuss how to choose the appropriate power distribution prod-ucts at the rack level. Interestingly enough, several of these consider-

ations also help data centre operators manage and control the largest portion of data centre power consumption, which are the actual IT loads.

Voltage to run all the IT equipment: Most modern day IT equipment typi-cally requires 1-ph power to operate. However, most IT equipment can accept voltages within the range of 100V – 250V. It is recommended that customers choose the higher voltage means a lower current draw for the equipment which translates into lower losses and better efficiency. Industry studies have revealed that running servers at higher voltages can bring as much as two percent efficiency advan-tage to the servers alone. Counting the added benefit of lower cooling, the real gains might be as high as three percent to four percent. In view of this benefit, several enterprise level UNIX, blade servers as well as large networking switches are being built with power supplies that can only accept 200 – 250V.

Electrical circuits within the rack: Most IT equipment today comes with dual redundant power hence data centre operators should plan on bringing a minimum of two sets of completely independent circuits (N + N) into each rack coming from differ-ent power sources handling antici-pated load capacity of the rack.

Load densit ies >5KW / rack, customers should consider bringing 3-phase power to the rack level which provides several benefits. This helps on Lower cost of cabling and higher reliability of electrical infrastructure using rack-mount PDUs with phase level metering. Reducing the circuit can help in maximizing the air flow both under the raised floor and within the racks keeping IT equipment from overheating. Increased rack scalabil-ity can also help in plugging in more equipment in the future.

Physical characteristics of power distribution units: One must consider three physical characteristic for rack mount PDUs like Form, Type and Number of Outlets. The Form factor the IPDU’s are either vertical or hori-zontal within 1U of rack space. Most modern day IT equipment are stan-dardized with an IEC input power connector and modular input cords except for customers in North America have some equipment that has a hard-wired input cord with a NEMA plug. The PDUs should have the appropriate number of outlets required to power

all IT load within the racks and we should keep in mind the power supply redundancy.

Other Important features within power distribution units: In order to ensure the highest availability levels for all mission critical equipment, it is important that data centre operators consider power distribution units that have metering as well as switching capabilities.

PDUs having metering and current thresholds capability protect rack from overloading and also helps data-centre operator to gauge actual power consumed which helps in appropri-ately sizing the upstream electrical infrastructure when adding new racks.

Optimizing the electrical infrastruc-ture improves the efficiency of the entire power chain, thereby cutting down on the power consumption costs.

Remote recycle, turn ON/ OFF is required for non-responsive serv-ers or network equipment when in hung or distress situation. This helps to minimize the downtime keeping operational costs low by reducing the number of expensive trips to the physi-cal location of equipment.

Several modern day servers are equipped with embedded service processor technologies such as IPMI, Dell’s DRAC or HP’s ILO. But still switched PDU solutions provide several other enhanced capabilities that are important to improve the availability of the loads. Some of these features are Sequential startup, shutdown and Electronic over-current protection:

Remote management of power distribution: In order to make the maximum utilization of monitoring and control features and to help real-ize the vision of a “lights-out” data centre, it is important that switched and metered PDUs can be managed remotely.

One must consider that Remote management should have centralized, secure and single window to manage console and Intelligent Power Device Units (iPDUs). PDUs should work in OUT-OF-BAND management and should be give global integrated view of all PDUs within the data centre. PDUs should have features of auto discovery and grouping capabilities for outlets, which ensures that the power to the entire server can be recycled.

Rajesh Sanwatsarkar is Regional Manager - West and Industry Specialist

(BFSI), Avocent India.

IN A NUTSHELLn A well planned rack level power

distribution strategy is impo tant to ensure continuous power to all IT equipment and to monitor and con-trol power consumption.

n Proper consideration should be given to the electrical, physical as well as the manageability characteristics of the PDUs.

n Electrically, IT equipment should be chosen to run within the 200 – 250 range whenever possible.

n When loads within a rack exceed 5kW, a 3-phase PDU should typically be chosen while a 1-ph PDU is good enough for loads below 5kW.

n Physically, PDUs need to be easily in-stallable and they need to have the appropriate number of outlets to power all equipment.

n Remotely manageable PDUs with switching and metering capabilities provide the ideal feature set for high-est levels of availability as well as data centre efficiency.

RAJESH

SANWATSARKAR

IDC research says by 2010 the expense

to power and cool the worldwide

installed base of servers

is expected to grow to

$44.5 billion, equivalent to 70% of new

server spend-ing. Growth

of data centre energy consumption within APAC

increased at a rate of 23% be-

tween 2003 and 2005, compared

against 17% for Western

Europe, 14% in the US,

and 14% in Japan.

DIGIT CHANNEL CONNECT 32 FEBRUARY 2010

guest expression Cloud Computing

Just as companies use advanced security, cyber criminals, too, keep upping the ante on innovation. Here is an inside look at how the fraud underground operates ARTHUR W COVIELLO, JR

Online fraud has devel-oped into a sophisticated underground criminal operation that continues to evolve every day. Much

like a real-world business, fraudsters offer products and services for a profit; they fight to gain competitive advan-tage and market share, are continually innovating to improve their offerings and meet customer needs.

This article will examine how the fraudster underground operates, the intricate supply chain which supports it, and how it continues to evolve.

Job specialisationHarvesting: The fraudster under-ground is a marketplace for selling compromised credentials and tools and services used in the commission of fraud. Harvesting is the process of collecting credentials and personal information from online users. A harvester works to steal and collect compromised credentials with the intention of reselling them to other fraudsters to cash out. Harvesters leverage technical infrastructure and tools such as phishing kits, trojans, ATM skimming devices, and advanced infection delivery platforms.

The technology and methods used to harvest credentials have evolved dramatically in the last few years, and continue to advance in order to circumvent established security measures employed by organizations and consumers. The infrastructure developed and used by harvesters today offers great scalability and a high degree of customization per specific target. The cost to deploy an attack has also decreased. Zeus has been the most predominant Trojan since last year and sells for $1000. Amateur fraudsters can purchase the more modest Limbo Trojan for $350.

Cashier: Harvesters steal credentials and sell them to Cashiers. The goal of a cashier is to develop the operational infrastructure and strategy to empty a victim’s account without leaving any traces. Cashiers are likely to practice in the service industry, offering services to enable other fraudsters to cash out credit cards and bank accounts. Cashiers utilize complex networks and often recruit bands of money mules. A money mule is a person that receives funds into their accounts, withdraws the money, and sends it overseas to the fraudster, often through a money transfer provider. Mules can also be

guest expression Online Fraud

Watch Your Click!

DIGIT CHANNEL CONNECT 34 FEBRUARY 2010

guest expression Online Fraud

used to receive and reship goods that are purchased online with a stolen credit card or account.

Money mule recruitment networks and “mule herders” – managers who control the network of mules – are a specialized service offered for sale within the fraud underground. Many mule recruitment scams are sent through spam attacks that direct the user to websites that offer allegedly legitimate jobs to perform money transfers. People apply for a posi-tion described as a “money transfer agent” or “regional manager.” In reality, honest people (and in some cases, dishonest people) are hired to become part of the fraud and money laundering cycle. They move cash that originates from compromised bank accounts, from one criminal to the other. Depending on the amount of money laundered, a mule will receive a small commission.

Cashiers in the underground are also evolving phone fraud services to cash out accounts by taking advan-tage of inherent weaknesses in the Call Centre. A new service uncovered by RSA shows fraudsters offering profes-sional call services that can spoof any number in the United States and also offers cash out in multiple languages. The service costs $12.00 and allows phone numbers to be customized depending on the state where the account holder resides and enables fraudsters to accept incoming calls, posing as the genuine account holder.

Innovation and technologyAs organizations continue to strengthen security and awareness of online threats increases, fraudsters are left to continue developing new

ways to launch attacks. Through a combination of advanced technology, new distribution channels and social engineering techniques, fraudsters have continued to innovate in order to work around these challenges.

Phishing and fast-flux networks: Phishing is the process of attempting to acquire personal information from online users through communication such as email. Despite its lack of sophis-tication, phishing still remains widely popular in fraudster circles because of its low execution cost and the fact that little technical knowledge is required to set up an attack. Fraudsters can buy phishing kits for just a few dollars.

In 2009, the number of phishing attacks detected by the RSA Anti-Fraud Command Centre grew an astounding 66% over the number of attacks detected in 2008. But because the lifespan of phishing attacks gets shorter and shorter, fraudsters have had to innovate and develop new ways to launch phishing attacks such as fast-flux networks.

First used by the online gang Rock Phish, fast-flux is an advanced Domain Name Server (DNS) technique that utilizes a network of compromised computers, known as a botnet, to hide the true origin of the server that hosts phishing and malware websites. The botnet acts as an army of proxies, or middlemen, between the victim and the website. Exposing and shutting down attacks hosted on a fast-flux network is difficult as the server host-ing the attack hides behind a cloud of compromised computers, thus the IP address is constantly changing. Of the tens of thousands of phishing attacks identified by RSA in 2009, 44% were hosted on fast-flux networks.

Trojans: A Trojan is a form of mali-cious software (malware) that typically resides on a user’s computer. Unlike phishing which can be identified by online users, a Trojan resides invisibly in the background, waiting to facili-tate unauthorized access to a user’s computer system. Trojans such as Zeus and Limbo follow a website session in real-time so there are no visible cues. In other cases, they are capable of injecting additional HTML fields – for example, those requesting credit card numbers and PIN codes – in order to harvest supplementary data.

It is estimated that one in 100 computers is infected with a Trojan. In addition, fraudsters are able to evade Anti-Virus (AV) systems more easily and operate testing labs to test their Trojans against leading AV soft-ware. When a signature is developed to defend against a specific Trojan, the fraudsters simply build a new variant.

Drive-by-downloads: Historically, phishing and Trojans have been recog-nized as two unique means of attack. However, the combination of phishing and Trojans is becoming more preva-lent among fraudsters. This is accom-plished through what is known as a “drive-by download” and social engi-neering plays a key role in the success of these attacks. A typical ruse used by fraudsters is to take a current topic of high interest. Fraudsters send emails to unsuspecting users directing them to view a video or read a news article. When users click on the link or the video, they are infected with a Trojan.

Man-in-the-browser (MITB) attacks: RSA has recently seen an increas-ing number of MITB Trojan attacks against financial institutions. An MITB attack enables fraudsters to perform unauthorized online transactions by hijacking a user’s online session in real-time, and intercepting and chang-ing the user’s online transactions in real-time. Unlike a phishing attack, where the user is directed to a fraudu-lent website, an MITB attack occurs when the user accesses the website of a targeted organization and initiates an online transaction – independent of being triggered by a prompt such as an e-mail or other notification. A Man-in-the-Browser attack is harder to detect as it is done in the browser and closer to the user rather than on the traffic stream. n

Arthur W Coviello, Jr is Executive VP, EMC Corporation, and President, RSA,

the Security Division of EMC.

The fraud ecosystem consists of harvesters who collect stolen data and cashiers who use the data to empty a victim’s account.

Technical Infrastructure

Tools Hosting Delivery Mules Drops Monetizing

Operational Infrastructure

HarvestingFraudster

Cash outFraudster

User account

Communication via fraud forum / chat room

A harvester works to steal

and collect compromised

credentials with the intention of

reselling them to other fraudsters

to cash out. Harvesters leverage technical

infrastructure and tools such

as phishing kits, Trojans and

ATM skimming devices.

In 2009, the number of

phishing attacks detected by

the RSA Anti-Fraud Command Centre grew an astounding 66% over the number

of attacks detected in 2008.

But because the lifespan of

phishing attacks gets shorter and shorter,

fraudsters have had to innovate

and develop new ways to launch

phishing attacks.

Arthur Coviello, Jr

DIGIT CHANNEL CONNECT 35 FEBRUARY 2010

1 More scams: The recession will lead to more scams. Whenever the US has faced a dif ficult time, thieves have found a way to use the problem to their advan-

tage. I’ve never seen more variations of old scams and such a wide range of sophistication in newer scams.

2 Job scams: Criminals will take advantage of increas-ing unemployment rates by tricking desperate people searching for job listings. These fake job listings and

work-at-home scams will result in

The new year begins with new challenges. Here is a guide to the existing and emerging identity thefts for 2010ROBERT SICILIANO

job seeker providing Social Security Number (SSN) and other important details to the criminals.

3 Low-tech desperate iden-tity theft: There will be an increase in the number of individuals – who have no criminal history – begin-ning to explore the crime

of identity theft for financial gain. For these thieves, it will be about quick money. Once desperate people wreck their own credit histories, they will start to use SSN for easy access.

These new identity thieves will take advantage of low-tech methods

such as stealing credit card numbers, dumpster diving, making phone calls, or phishing for credit card numbers. These techniques may also include placing ads in auctions to lay their hands on credit card numbers or cash.

4 All-in-the-Family identity theft: Desperation will lead to more ‘allin- the-family’ cases, as well as the fraudulent use of numbers belonging to close friends,

roommates and fellow workers. It has long been documented that a signifi-cant percentage of identity theft cases are perpetrated by people close to the

guest expression Identity Theft

TOP IDENTITY THEFT PREDICTIONSFOR 201010

DIGIT CHANNEL CONNECT 36 FEBRUARY 2010

guest expression Identity Theft

victim. We predict that this number will increase during these tough economic times.

5 Child identity theft: The ITRC has noted that nearly 10 percent of its case load, for the past six months, involved child identity theft issues. These cases often

involve more varied components of identity theft than ever before. Some people have finally realised that a child’s SSN can be used for more than just opening a line of credit.

6 Medical identity theft: While not a new crime, this will re f lect the distress of those who have become unemployed. High insur-ance premiums, growing

individual medical insurance costs and the inability to afford insurance or medical care will cause a spike in this area of identity theft. The Social SecurityAdministration has noted an increase in uninsured people using the coverage of a friend, relative or even a

stranger to get medical care.

7 Insider identity theft: In the coming year, identity theft will increase due to the failure to follow simple security protocols in the workplace. This

will create opportunities for thieves to gain access to personal identifying information retained in databases or paper files. Additionally, the lack of computer security measures and the increasing skill levels of hackers will lead to larger and more financially harmful breaches. These thieves are also educating young protégées on high-tech methods to access secured information and will likely continue to coordinate malicious attacks from their jail cells.

8 G ove r n m e n t a l i d e n t i t y theft: More individuals will discover that they have become identity theft victims as they apply for gove r n m e n t s c h e m e s .

Not only will their own SSN be used,

but they may be temporarily denied benefits due to the fraudulent use of their child’s SSN. This type of iden-tity theft will also include complica-tions with the IRS, Social Security Administration, Departments of Motor Vehicles, Medicare and Welfare.

9Criminal identity theft: The number of cases of criminal identity theft will continue to grow. This type of crime is defined as the use of an individual’s

personal information to avoid being tied to their own criminal record. In the current environment, the effects of criminal identity theft on the victims will be more apparent with the loss of employment, loss of benefits and the increased number of arrests of victims ranging from failure to appear warrants for traffic citations all the way to felony level crimes.

10S o c i a l M e d i a identity theft: The meteoric rise in social media use has also created a

launch pad for identity thieves. Social media identity theft happens when someone hacks an account via phish-ing, creates infected short URLs or creates a page using photos and the victims identifying information. My prediction for 2010 is that the increase in social networking activity, along with a user’s failure to implement secu-rity and privacy settings and protocols, will lead to an increased exposure of not only the user’s personal informa-tion but possibly that of their friends.

Bottom line, there will be an increase in identity theft crimes and the number of victims over the next two years unless significant changes are made in information security. Our most impor-tant asset is our identity. And we are functioning under a completely anti-quated system of identification.

When state governments agree withfederal agencies on effective identi-

fication and industry comes together, only then will a secure environment will prevail. n

Robert Siciliano is an expert on personal security and identity theft as the CEO of IDTheftSecurity.com.

THERE WILL BE AN INCREASE

IN THE NUMBER OF INDIVIDUALS

– WHO HAVE NO CRIMINAL

HISTORY – BEGINNING TO EXPLORE

THE CRIME OF IDENTITY THEFT FOR FINANCIAL

GAIN. FOR THESE THIEVES,

IT WILL BE ABOUT QUICK

MONEY.

THE METEORIC RISE IN SOCIAL MEDIA USE HAS ALSO CREATED A LAUNCH PAD FOR IDENTITY

THIEVES. SOCIAL MEDIA IDENTITY THEFT HAPPENS WHEN

SOMEONE HACKS AN

ACCOUNT VIA PHISHING, CREATES INFECTED

SHORT URLS OR CREATES

A PAGE USING PHOTOS AND THE VICTIM’S IDENTIFYING

INFORMATION.

analyst speak Application Acceleration

DIGIT CHANNEL CONNECT 38 FEBRUARY 2010

F5 Networks, an application deliv-ery networking provider, recently announced the results of a Frost & Sullivan survey that looked

at enterprise views towards applica-tion delivery and cloud computing with respect to their business needs as well as their understanding of the technology drivers behind these needs.

Commissioned by F5, the survey found that CIOs and senior IT decision makers in Asia Pacific (APAC) recognize the importance of Web applications in driving their businesses, and that their strong recognition of the seriousness of Web-based attacks makes security a top concern. However, the survey also exposed a need for more awareness about the differences between traditional network-based vulnerabilities versus Web application attacks as there appeared to be some confusion among respondents about the capabilities of network-based firewalls versus Web application firewalls.

Also, the findings revealed a preference for utilizing more bandwidth to overcome Web application performance issues. Since adding bandwidth does not over-come latency issues caused by physical distances between source and destination,

A recent Frost & Sullivan survey of Asia Pacific IT executives underscores the need for proactive approach to application delivery and cloud computing

The Agenda for Agility

this potentially means that the prevalent issue of application latency remains unre-solved for many enterprises.

Further, the study shows that custom-ers see an important association between cloud computing and business agility putting an onus on aspiring cloud services providers to assure enterprise-level avail-ability, security, and performance.

“Applications are the lifeblood of enterprises today, and it is essential that decision makers take the right approach that includes creating strategic points of control that give complete visibility. Whether application protection, high availability, or performance, the business objective can only be achieved when the solutions are part of an overall Application Delivery Networking strategy that ensures full visibility and control of end-to-end traffic between users and application serv-ers,” stated Song Tang Yih, Vice President of APAC, F5 Networks.

“As technology convergence continues unabated in the IT realm, the concept of a Server Load Balancer has rapidly evolved into a converged Application Delivery Controller capable of offering more capabilities on top of its base func-tion and dominated by the three pillars of

application delivery; availability, security, and performance,” said Nitin Bhat, Senior Vice President - ICT, Frost & Sullivan. “On the cloud computing front, the study showed that whilst perception towards cloud computing as a business enabler is encouraging, security and access control are key challenges that could poten-tially affect an enterprise’s willingness to embrace cloud computing as a viable business tool in the immediate future.”

The study, conducted in the fourth quarter of 2009 across Australia, China, Hong Kong, India, Singapore, and South Korea, surveyed large enter-prises’ attitudes on a range of topics such application delivery, application security, application acceleration, and cloud computing.

Overall findingsInterest in unifying application delivery capa-bilities on a single platform is high: Seventy-three percent of CIOs and senior decision makers want two or more integrated features on a single platform. Top of their list are Global Server Load Balancing (GSLB) and security.

Mismatch between the perceived enter-prise needs and the corresponding technolo-gies deployed: Bandwidth dependence and fallacies still exist. Forty-four percent believed that simply utilizing more band-width is the best way to boost application performance levels. What’s more, applica-tion security is still not well understood. Sixty-one percent believed that network firewalls can prevent Web attacks, and twenty-three percent indicated that their existing IDS/IPS deployments are forms of protection against Web attacks.

Cloud computing is viewed as the next generation application delivery channel: Enterprises believe that cloud computing will increase their agility and scalability in a cost-effective manner. However, more than half cited security issues as a key barrier to adoption of cloud computing.

The survey was commissioned by F5 to understand end-user perceptions about application delivery and cloud computing with respect to their business needs as well as their understanding of the technology drivers behind these needs. The survey consisted of around 300 enterprises, spanning six markets, and included five verticals—financial, telecommunica-tions, government, manufacturing, and IT. The executives who participated were mainly IT executives who played an influ-encing role in the purchasing decisions for IT infrastructure. n

The survey found that CIOs

and senior IT decision makers in Asia Pacific recognize the importance

of Web applications in driving their businesses,

and that their strong

recognition of the seriousness of Web-based attacks makes security a top

concern.