Redington Value Journal - August 2016

8
Klarich says enterprises require con- sistent security regardless of where their applications reside. EMC Corporation recently announced the re- sults of new research revealing that organisa- tions are failing to appreciate the growing chal- lenges of protecting their data and, as a result, are experiencing the economic impact of data loss. New findings from the EMC Global Data Protection Index 2016, an independent study by Vanson Bourne of enterprise backup in 18 countries around the world, revealed that, while businesses have been successful in reducing the impact of the four biggest traditional data loss Cyberthreats’ impact highlighted in the new EMC Global Survey Tripp Lite, a manufacturer of power protection and con- nectivity solutions, is now featuring new lower prices on their B070- and B072- Series of Cat5 rack-mount KVM switches. The recent price drops al- Tripp Lite slashes prices for Cat5 KVM Switches Palo Alto widens breach prevention to the cloud Palo Alto Networks, the next- generation security company, has announced advancements to its Next-Generation Securi- ty Platform that is designed to extend the breach prevention capabilities of the platform and address the security needs Issue 03// August 2016 Goulden says EMC continues to innovate to stay ahead of both existing and new challenges. Continue on page 2 Vendor’s new isolated recovery solutions protect data against destructive cyberattacks and ransomware PAN-OS Version 7.1 deliv- ers Universal protection across multi-cloud envi- ronments and SaaS Apps Move brings IT managers the lowest-priced rack- mount KVM solutions risks, they are unprepared for new, emerging threats, which are taking their toll instead. When compared to the EMC Global Data Protection Index 2014, 13% more businesses experienced data loss or disruption in the last 12 months, costing them an average of $914,000. EMC commissioned the updated research to help organisations recognise and prepare for the rapidly changing landscape of threats to en- terprise data. The survey results from the EMC Global Data Protection Index 2016 identified the following three major challenges to modern data protection namely threats to protection data, threats to data in the cloud and evolving protection needs. Continue on page 2 Continue on page 2 The new KVM solutions provide innovative features and exceptional quality. Redington value is a value added distributor for the following brands in parts of Middle East & Africa:

Transcript of Redington Value Journal - August 2016

Page 1: Redington Value Journal - August 2016

Klarich says enterprises require con-

sistent security regardless of where

their applications reside.

EMC Corporation recently announced the re-sults of new research revealing that organisa-tions are failing to appreciate the growing chal-lenges of protecting their data and, as a result, are experiencing the economic impact of data loss. New findings from the EMC Global Data Protection Index 2016, an independent study by Vanson Bourne of enterprise backup in 18 countries around the world, revealed that, while businesses have been successful in reducing the impact of the four biggest traditional data loss

Cyberthreats’ impact highlighted in the new EMC Global Survey

Tripp Lite, a manufacturer of power protection and con-nectivity solutions, is now featuring new lower prices on their B070- and B072-Series of Cat5 rack-mount KVM switches.

The recent price drops al-

Tripp Lite slashes prices for Cat5 KVM Switches

Palo Alto widens breach prevention to the cloud

Palo Alto Networks, the next-generation security company, has announced advancements to its Next-Generation Securi-ty Platform that is designed to extend the breach prevention capabilities of the platform and address the security needs

Issue 03// August 2016

Goulden says EMC continues to innovate to stay

ahead of both existing and new challenges.

Continue on page 2

Vendor’s new isolated recovery solutions protect data against destructive cyberattacks and ransomware

PAN-OS Version 7.1 deliv-ers Universal protection across multi-cloud envi-ronments and SaaS Apps

Move brings IT managers the lowest-priced rack-mount KVM solutions

risks, they are unprepared for new, emerging threats, which are taking their toll instead. When compared to the EMC Global Data Protection Index 2014, 13% more businesses experienced data loss or disruption in the last 12 months, costing them an average of $914,000.

EMC commissioned the updated research to help organisations recognise and prepare for the rapidly changing landscape of threats to en-terprise data. The survey results from the EMC Global Data Protection Index 2016 identified

the following three major challenges to modern data protection namely threats to protection data, threats to data in the cloud and evolving protection needs.

Continue on page 2 Continue on page 2

The new KVM solutions provide

innovative features and

exceptional quality.

Redington value is a value added distributor for the following brands in parts of Middle East & Africa:

Page 2: Redington Value Journal - August 2016

2

For more information, please write to [email protected]

EMC...

Palo Alto...

David Goulden, CEO, EMC Infor-mation Infrastructure, said: “Our customers are facing a rapidly evolving data protection landscape on a number of fronts, whether it’s to protect modern cloud computing environments or to shield against devastating cyberattacks. Our re-search shows that many businesses are unaware of the potential impact and are failing to plan for them, which is a threat in itself.”

Goulden said as a leader in data protection and cloud computing, EMC continues to innovate to stay ahead of both existing and new challenges by providing modern cloud-centric data protection so-lutions. “In addition, today we are introducing the first in a range of new Isolated Recovery Solutions, that are designed to help protect customer data against cyberattacks such as ransomware and destruc-tive hacking,” he said.

Nearly a quarter (23%) of busi-nesses surveyed had experienced

data loss or unplanned systems dis-ruption due to an external security breach and that number increased to over one third (36%) when tak-ing internal breaches into account, the survey found. Businesses are increasingly facing threats not just to their primary data, but also to their backup and protection data.

On the other hand, more than 80% of survey respondents indi-cated that their organisations will run at least part of eight key busi-ness applications in the public cloud in the next two years; yet less than half said they protect cloud data against corruption and less than half against deletion.

EMC said it is critical for or-ganisations to include cloud ap-plications in their overall data protection strategies. EMC of-fers a comprehensive portfolio of solutions for cloud-to-cloud and on-premise-to-cloud data protection to facilitate this, the company stated.

of businesses working with cloud-based environments and software-as-a-service (SaaS) applications.

According to Palo Alto Net-works, the demand for organ-isations to become ever more agile and competitive is driv-ing a change in the way busi-ness applications are devel-oped, deployed, and adopted.

The company said work-loads and data are increasingly distributed across physical and cloud computing envi-ronments and this changes the threat landscape and increases the risk of exposure to cyber-attacks, which is compounded by the limitations of legacy se-curity products that were not designed for this distributed, cloud-based infrastructure.

Palo Alto Networks said it has addressed these chal-lenges, and many more, in PAN-OS 7.1. The vendor said this version of the operating

system extends the breach prevention capabilities of the security platform to all major clouds and provides visibility, control, and threat prevention designed to protect customer data regardless of where it resides.

In addition, among the new features are certificate and two-factor authentication ad-vancements that help protect user credentials or neutralise them if they are stolen.

Lee Klarich, executive vice president, product manage-ment at Palo Alto Networks, said: “Enterprises require consistent security regardless of where their applications reside. The latest release of PAN-OS addresses new chal-lenges presented by the cloud, enabling organisations to take advantage of agile cloud-based infrastructure and applica-tions while maintaining a consistent security posture.”

Vendor launches its latest innovations to adapt to changing role of data centres

‘Smart Choices for Digital

Infrastructure’ is a concept which

supports managers through the

decision process.

Cabling systems and optical fibre solutions vendor Nexans, recently launched its data centre innova-tions under the name of “Smart Choices for Digital Infrastructure”.

According to Nexans, the dif-ferent data centre infrastructure technologies will help managers to support the exponential increase in data transmission.

The company said the digi-tal transformation requires ag-ile, carefully planned IT infra-structure, efficient data access and exchange.

Nexans added that each of these factors is vital to success, but net-work managers face difficult de-cisions to provide the optimum platform for their specific needs.

‘Smart Choices for Digital In-frastructure’ is a concept which supports managers through the decision process by incorporating cabling systems which support several consecutive generations of active equipment and that are ro-bust, flexible and scalable to adapt to new requirements.

Nexans’ latest offering include flexible, cost-effective bandwidth architectures, optimised space us-age, performance protection and enhancement, faster modular deployment and design through to operation’ support services.

Nexans introduces ‘Smart Choices for Digital Infrastructure’

low IT managers to choose from several highly fea-tured KVM switches and consoles for controlling an entire network while still managing expenses.

According to Tripp Lite, these KVM solutions pro-vide innovative features and exceptional quality, along with the reliability for which Tripp Lite has long been known.

The company said key fea-tures of Tripp Lite’s KVM switches include connection of up to 32 servers with inex-pensive Cat5 cabling, sleek, compact design that helps reduce cable clutter and im-prove airflow and console switches that include built-in LCD, keyboard and mouse.

Other features according to Tripp Lite include models with IP access that add flex-ibility of remote monitoring from virtually anywhere in the world, multi-user capa-bilities, password protection and advanced encryption to simplify IT tasks while keep-ing server access secure.

“With these price reduc-tions, IT departments of all sizes can now centralise device management easily and affordably,” said David Posner, Tripp Lite’s Direc-tor of Marketing for Cables and Connectivity. “Our KVM solutions are simply the best value available in the market.”

Tripp Lite is a leading manufacturer of products that power, connect and protect computers and IT equipment in any envi-ronment, from desktops to data centres.

The company’s innova-tions include the world’s first UPS system designed specifically for personal computers and the world’s most trusted premium surge suppressor–the Isobar, with more than 19 million in use.

Tripp Lite...

Page 3: Redington Value Journal - August 2016

3

For more information, please write to [email protected]

Redington Value Distribu-tion, a value-added distributor across MEA, has announced that it has partnered with Pivot3 to bring the vendor’s dynamic hyper converged in-frastructure (HCI) solutions to enterprise customers across the region.

Under the agreement, Redington Value Distribu-tion with its vast network of channel partners, will offer Pivot3 products and solutions in the enterprise data cen-tre domain across technolo-gies ranging from compute,

Redington Value Distribution partners with Pivot3Distributor to offer the vendor’s hyper con-verged infrastructure solutions across MEA

Mathrani says HCI solutions are only

just beginning to penetrate the enter-

prise data centre.

storage, network, software, security, virtualisation, high availability, business conti-nuity and cloud. In addition, the distributor will also have offerings in voice and unified communications space.

The vendor’s acquisition of NexGen Storage makes Pivot3 the only company in the industry to offer custom-ers solutions that allow IT to prioritise application per-formance based on business priority along with complete implementation flexibility and QoS management.

“While the HCI market has been growing exponentially for years, this innovative tech-nology is only just beginning to penetrate the enterprise data centre,” added Rajesh Math-rani, General Manager, Sales, Middle East at Redington Value Distribution.

Mathrani said with Pivot3’s dynamic offerings to cus-tomers in industries such as hospitality, surveillance, healthcare, transportation, entertainment, education, insurance and retail, Red-ington Value and its channel

partners now have a unique solution which can address the needs of these industries while providing customers complete control over their deployments helping them move from legacy data cen-tre storage environments to software defined storage.

Redington said together with Pivot3, it will empower its channel partners to ad-dress the requirements of mid-market and enterprise customers offering a practi-cal and proven path to the software-defined data centres of the future without com-promising on simplicity and economics of easy-to-manage HCI platform.

“This is a great opportunity for both our organisations to expand our footprint in the MEA markets,” said Anand Chakravarthi, area vice presi-dent, Pivot3 Dubai. “Red-ington Value and its large network of partners gain a competitive advantage with the technology offerings from Pivot3 and we gain access to markets across MEA with this association,” he said.

Chakravarthi explained that being a very channel oriented organisation, Pivot3 recognise the strength in addressing the needs of enterprise customers through channel partners and Redington’s partners are a key element in the joint growth strategy. “Over the last few years we have built quite a good set of enterprise cus-tomer references within this region and the partnership will help us scale higher with the help of Redington’s elab-orate partner network,” he pointed out.

This partnership between Redington and Pivot3 will also be an opportunity for channel partners to address the enterprise data centre space and will help many to penetrate deeper into their clients’ accounts while cre-ating much closer alliances with customers.

Distribution industry honours Veeam Software

Veeam Software, the innovative pro-vider of solutions that deliver avail-ability for the “Always-On Enter-prise”, has announced that it recently received a “Gold EMEA Rising Star” award from the Global Technology Distribution Council (GTDC).

The Rising Star Awards recog-nise technology companies with exceptional sales growth through European, Middle East and Africa distributors over the past year.

This year’s awards were pre-sented during an evening dinner event at the 2016 GTDC Sum-mit EMEA conference at the

Vendor recognised for outstanding sales growth in the EMEA region

Pommier says Veeam’s business

depends on the channel and the

excellent work of partners.

Grand Hotel Huis ter Duin.Veeam was among only 15 overall

winners chosen from hundreds of manufacturers and publishers who rely on distributors to meet the product and service requirements of technology solution providers in the EMEA market.

Gold, Silver and Bronze Rising Star Award winners were selected in four revenue categories and over-all software business, respectively, with each category winner based on sales growth over the past year, as tracked by the Context SalesWatch Distribution Panel.

“We’ve enjoyed great success in the ‘Rising Star’ award in the past – it’s an honour for us – and to win it again is testament to Veeam’s hard work, impressive growth and foresight,” said Gilles Pommier, Vice President, Channel and Cloud EMEA at Veeam Software. “Our business depends on the channel and the excellent work of our partner community. Like Veeam, they have acknowledged the need for

the Always-On Enterprise, and rec-ognise that products such as Veeam Availability Suite can help their cus-tomers make this a reality.”

To be eligible for a Rising Star award, vendors must have sold cor-responding products through GTDC members for at least one year. Se-lections for Gold, Silver and Bronze winners in each revenue category are based on Context SalesWatch data from April 2015 – March 2016.

“This year’s winners span a broad range of product categories – our most diverse yet - representing to-day’s most progressive and innovative market segments,” commented Tim Curran, GTDC CEO. “It’s impressive to see so many winners focused on the hottest trends, from cloud, mobility and big data to security, virtualisation and hyper-converged infrastructure, for example.”

Curran said the growth of these companies showcases the value and impact of distribution partnerships throughout the EMEA region.

Page 4: Redington Value Journal - August 2016

4

For more information, please write to [email protected]

Vendor uses Google Cloud Platform and adds software-defi ned networking

Fitzgerald says CloudForms 4.1 is the

most comprehensive, hybrid cloud

management solution.

Open source solutions maker Red Hat Inc, has announced the general avail-ability of Red Hat CloudForms 4.1, the latest version of its open hybrid cloud management solution.

With support for Google Cloud Plat-form, Red Hat CloudForms 4.1 now supports greater choice and flexibil-ity for customers who want to run hybrid cloud workloads on Google Cloud Platform, Microsoft Azure or Amazon Web Services.

In addition, Red Hat CloudForms 4.1 expands the scope of its management capabilities with software-defined networking (SDN), providing a more unified management experience for software-defined data centres.

According to Red Hat, CloudForms 4.1 makes it easier to automate com-plex IT processes through integration with Ansible Tower, and provides cus-tomers with a simpler, cloud-friendly subscription model.

Joe Fitzgerald, vice president, Man-agement at Red Hat, said: “We hear constant customer demands focus-ing on rapidly advancing their hybrid cloud strategies and the need for one, consistent management view across their physical, virtual, and cloud envi-ronments. CloudForms offers that, and we believe CloudForms 4.1 is the indus-try’s most comprehensive, hybrid cloud management solution on the market. CloudForms now not only supports the world’s largest public clouds, but also integrates with Ansible to dramatically simplify automation.”

Red Hat CloudForms expands public cloud management

Networking giant Cisco has an-nounced it will help engineers, de-velopers, partners and customers embrace a monumental change in how networks are built and man-aged—preparing the industry for the transition to digital-ready networks.

Cisco is also building on the in-tersection between security and networking with new technologies designed to simplify branch office security and make it more effective.

In March this year, Cisco launched the Digital Network Architecture (Cisco DNA)—a radical new ap-proach to networking designed for the digital era.

The vendor said as customers embrace mobility, cloud, analytics and the Internet of Things (IoT) to digitise their business, IT teams are

Cisco prepares digital-ready networksNetworking giant improves threat visibility and enforcement capabilities with new embedded security technology

Reed says organisations need to ad-

dress the expanding threat landscape

across mobility and cloud.

struggling to keep up with the ever-increasing complexity of the network, sophistication of security attacks and growing customer expectations.

Cisco said it realised that tradition-al networks simply could not scale to meet the increasing demands of the digital business and a new network was needed for the digital era.

The company added that Cisco DNA helps IT address these de-mands by moving networking from hardware-centric to software-driven, from manual to automated, and from reactive to adaptive.

“Organisations need to address the expanding threat landscape across mobility and cloud, while facing increasingly sophisticated security attacks,” said Jeff Reed, senior vice president, Networking Infrastruc-

CyberArk unveils cloud-based privileged account for endpoint

CyberArk, the company that protects organisations from cyberattacks that have made their way inside the network perimeter, has announced new capabilities for CyberArk View-finity that deliver privileged ac-count security to the endpoint.

With CyberArk Viewfin-ity version 5.5, customers can benefit from an enhanced, single privilege management and application control solu-tion to reduce the attack sur-face while being able to block

CyberArk Viewfi nity integrates privilege management with app control to protect against malware-based attacks

With CyberArk Viewfinity version 5.5

customers can benefit from an en-

hanced, single privilege management.

the progression of malware-based attacks, and balance business user productivity and enterprise security.

Following the acquisition of Viewfinity in Q4 2015, CyberArk Viewfinity is now available as part of the CyberArk Privileged Account Security Solution.

The company said with the latest release, customers can gain greater privilege manage-ment and application control features in an on-premises or software-as-a-service (SaaS)-based offering.

“As malware continues to be a frequently-used and successful means for hijacking credentials, organisations must realise that the endpoint problem is a privi-lege problem,” said Roy Adar, Senior Vice President, Product Management, CyberArk. “The fact is, motivated attackers will

eventually get inside your net-work – it’s what happens next that matters.”

Adar added that establishing a foothold on endpoints and escalat-ing privileges enables attackers to jump from endpoints, to servers, to domain controllers until they own the network. “CyberArk Viewfinity extends privilege security to the endpoint to mitigate these risks without excessively restrictive controls on users,” Adar said.

New integration with the Cyber-Ark Shared Technology Platform enables all privileged audit logs to be stored and reviewed centrally, as well as new flexible, customisable reporting capabilities.

According to the security solu-tions vendor, evidence shows that advanced attacks often start with phishing emails sent to non-privi-leged business users, and a campaign of just 10 emails will typically yield a greater than 90% chance that at least one person will become the criminal’s prey.

ture and Solutions at Cisco. “With DNA, Cisco is reinventing how we secure networks for the digital era by embedding advanced security capabilities into a single network architecture. But technology alone isn’t enough. We are also preparing IT professionals with new skills, training network-savvy developers and help-ing customers navigate the journey to digital-ready networks.”

Page 5: Redington Value Journal - August 2016

5

For more information, please write to [email protected]

Technology major Hewlett Packard Enterprise (HPE) has announced a new high-performance comput-ing (HPC) solutions that includes a comprehensive software-defined platform, enhancements to its Apollo servers, as well as, a new ANSYS computer-aided engineer-ing (CAE) software based solution designed to help manufacturing or-ganisations optimise their design simulation deployments.

Once the domain of academics and research institutions, HPC is rapidly making its way into industries like energy, life sciences, financial services and manufacturing. While organisations in these industries recognise the technology’s strate-gic importance, perceived complex-ity and diversity of HPC environ-ments may appear to outweigh the business benefits.

HPE Unveils Software Defined HPC platform

New software platform delivers Simplicity, Speed and Flexibility

Mannel says HPC is rapidly becoming

one of the essential ingredients for

the digital economy.

HPE’s announcement dramati-cally simplifies the deployment and management of HPC solutions, en-suring companies of all sizes can now accelerate their HPC projects and create competitive differentiation for their business.

“HPC is rapidly becoming one of the essential ingredients for the digi-tal economy across organisations of all types and sizes,” said Bill Mannel, vice president and general manager, HPC, Big Data and IoT Servers at HPE. “Today we are excited to un-veil new additions to our recently announced portfolio capabilities designed to accelerate accessibility and time to value for HPC by sig-nificantly simplifying deployments, streamlining management and boosting performance.”

“As the global HPC market leader with 35.9% market share

HPE is upping the ante with new additions to its already-large HPE Apollo portfolio of purpose-built solutions,” said Steve Conway, Research Vice President in IDC’s High Performance Computing group. “These innovative solu-tions aim to accelerate HPC adop-tion by organisations of all sizes and segments by enabling faster time to value and increased com-petitive differentiation through better parallel processing perfor-mance, along with reduced com-plexity and deployment time.”

Gigamon to Offer First Visibility Solution for Public Cloud

Gigamon Inc, a provider of traffic vis-ibility solutions, has started trials for the world’s first solution that allows enterprises to see information travers-ing public clouds.

Gigamon’s visibility solutions for public cloud kicks off with field trials of its Amazon Web Services (AWS) Elastic Compute Cloud (EC2) offering.

The percentage of workloads hosted in the public cloud is set to explode from 16 to almost 40% over the next five years, according to JP Morgan.

Innovative solution to enable enterprises monitor and secure workloads hosted by Amazon Web Services

Hooper says Gigamon is a market pio-

neer that has transformed the world

of IT through the power of visibility.

New Firewall enables organisations to operate secure, distributed, cloud-based network environments

Gheri says as threats became more

targeted, traditional port blocking

firewalls are no longer enough.

With this rapid growth comes in-creasing concern for network secu-rity vulnerability, compliance risk and compromised performance.

Gigamon said seamless public cloud adoption hinges on enterprises being able to take advantage of the agility offered by on-demand compute and confidence that hosting business criti-cal applications on shared infrastruc-ture does not mean compromises in security or availability.

In addition, the vendor said the an-nouncement takes a significant step forward for the industry by allowing enterprises to for the first time ever, gain visibility into previously un-available public cloud applications and information.

“Gigamon is a market pioneer that has transformed the world of IT through the power of visibility. Whether it’s delivering more effec-tive and efficient security, bringing

unprecedented subscriber awareness to service providers or scaling perfor-mance management, our Visibility Fabric has been at the center of help-ing our customers navigate disruptive changes around their next-generation infrastructure,” said Paul Hooper, CEO, Gigamon. “With this milestone, Gigamon enters a new phase in ex-ecuting our company vision. We are expanding our market yet again to the thousands of businesses that want to confidently and securely host their IT infrastructure on public clouds.”

According to Gigamon, this in-dustry-leading capability is key to accelerating public cloud adoption and reducing its associated migration disruption and risks. With Gigamon’s visibility solution, enterprises gain unprecedented flexibility to design and provision the public cloud moni-toring infrastructure that meets their business needs with the freedom to choose the most appropriate public cloud provider to address their specific requirements, the company said.

Network security solutions vendor Bar-racuda has announced the availability of Barracuda, NextGen Firewall F-Series version 7.0, which is designed for or-ganisations adopting cloud-based ap-plications, operating dispersed network environments and leveraging public cloud platforms.

Then vendor’s NextGen Firewall Ver-sion 7.0 provides security and reliability in these environments, especially for organisations leveraging public cloud platforms like Microsoft Azure and Am-azon AWS. Barracuda said organisations are increasingly adopting virtualisation, software defined networks and cloud applications such as Office 365, Sales-force and video conferencing. As such, the vendor stated that the role of the firewall has evolved from a perimeter-based security device to a distributed security solution that must intelligently optimise traffic to improve network performance and provide reliable access to these mission critical applications for all users across all locations.

According to the company the Barra-cuda NextGen Firewall is designed from the ground-up for the cloud era and enables intelligent network perimeters at headquarters, remote and branch offices, and satellite locations to deliver secure, direct, business quality access to applications hosted in private and public cloud environments while minimizing the need to backhaul traffic.

Barracuda Expands Cloud-Ready Next-Generation Firewall Technology

Page 6: Redington Value Journal - August 2016

6

For more information, please write to [email protected]

Amazon Web Services Inc (AWS), an Amazon.com company, has an-nounced that Amazon Elastic File System (Amazon EFS), a new, fully managed service that makes it easy to set up and scale file storage in the AWS Cloud, is now available to all customers.

With a few clicks in the AWS Management Console, custom-ers can use Amazon EFS to create file systems that are accessible to multiple Amazon Elastic Compute

AWS launches Elastic File SystemNew elastic fi le storage service makes it easy to deploy and scale fi le systems in the AWS Cloud

Cloud (Amazon EC2) instances via the Network File System (NFS) protocol.

According to the company, Amazon EFS can automatically scale without needing to provi-sion storage or throughput, en-abling file systems to grow seam-lessly to petabyte scale, while supporting thousands of con-current client connections with consistent performance.

“As customers continue to move more and more of their IT infra-structure to AWS, they’ve asked for a shared file storage service with the elasticity, simplicity, scalability and on-demand pricing they enjoy with our existing object (Amazon S3), block (Amazon EBS) and ar-chive (Amazon Glacier) storage services,” said Peter DeSantis, Vice President, Compute Servic-es, AWS. “Initially, our custom-ers most passionately asking for a file system were trying to solve

for throughput-heavy use cases like data analytics applications, large-scale processing workloads, and many forms of content and web serving. Customers were excited about Amazon EFS’s performance for those workloads, and pretty soon they were asking if we could expand Amazon EFS to work excel-lently for more latency-sensitive and metadata-heavy workloads like highly dynamic web appli-cations. That’s what we’ve been working on for the last few months and we’re excited to release it to customers today.”

Amazon EFS is designed to sup-port a broad range of file workloads – from big data analytics, media processing, and genomics analysis that are massively parallelised and require high levels of throughput, to latency-sensitive use cases such as content management, home di-rectory storage, and web serving. Amazon EFS is highly available and durable, redundantly storing each file system object across multiple availability zones.

Amazon EFS can automatically scale

without needing to provision storage

or throughput.

Fidelis Cybersecurity unveils threat intelligence database

Fidelis Cybersecurity says the new

security resources are available at no cost.

Fidelis Cybersecurity, a provider of products and services for de-tecting and stopping advanced cyberattacks, has announced the availability of a new threat intel-ligence database and freeware tools designed to help the secu-rity community stop attacks and prevent data theft.

The company said the new re-sources are available at no cost and include the Barncat Threat Intelli-gence Database, the ThreatScanner tool for finding malware residing on an endpoint, and CCNumberFinder to support PCI DSS compliance.

Hardik Modi, Vice President, Threat Research at Fidelis Cyberse-curity, said: “After years of ongoing research and thousands of hours of incident response engagements, we are eager to give back to the security community by sharing some of the threat intelligence we have curated and free tools we have developed.”

Modi said by making these tools and intelligence available to re-searchers and security analysts, Fidelis Cybersecurity is hop-ing organisations will be able to find and stop attackers faster and more efficiently.

According to the company, the Fidelis Barncat Intelligence Data-base includes more than 100,000 records with configuration settings extracted from malware samples gathered during Fidelis’ incident response investigations and other intelligence gathering operations over the past decade.

New tools to help security practitioners fi nd attack-ers faster

Check Point’s new security appliances for SMBs

Security vendor Check Point Soft-ware Technologies Ltd, recently announced two new additions to the Check Point 700 Series appli-ances, both addressing the unique security needs of small businesses.

The new Check Point 770 and 790 appliances, together with the 730 and 750, provide advanced threat prevention features such as

New 770 and 790 appliances extend the Check Point 700 series family

The 770 and 790 extend the capa-

bilities of Check Point’s 700 Series

appliance array.

firewall, VPN, antivirus, anti-bot, application control, URL filtering and email security.

In addition, the appliances de-liver optimised network perfor-mance of up to 4 Gbps of firewall throughput and up to 330 Mbps when threat prevention functions are activated.

According to the 2016 Verizon Data Breach Investigations Re-port, cyber criminals use several avenues to infiltrate small busi-nesses – such as phishing, ran-somware and denial-of-service attacks. With the cost of these attacks on a small business av-eraging more than $35,000 (ac-cording to First Data Market Insight), the impact of today’s cyber threats can have a devas-tating effect in an increasingly competitive marketplace.

“With small businesses playing such a big role in the economic growth and innovation across the globe, there is a need for a simple solution that helps keep these small, often resource-strapped organisations a step ahead of to-day’s cybersecurity challenges,” said Gabi Reish, Vice President of product management, Check Point. “The 770 and 790 extend the capabilities of our 700 Series appliance family, providing the advanced protection necessary to protect small business customer networks from threats and un-necessary exposure.”

Check Point said the new 770 and 790 deliver security optimised for small businesses. These compact ap-pliances are simple to configure and manage, providing advanced threat prevention against cyber-attacks.

Page 7: Redington Value Journal - August 2016

7

For more information, please write to [email protected]

Fortinet touts Security Fabric solution in Middle East

Commercial espionage key reason for cyberattacks; report

Vendor moves to address the enterprise network and challenges CIOs face

Trend Micro reveals advanced technologies in the mining industry could lead to advanced threats

Zakhour says the Fortinet Security

Fabric has traits that allow organisa-

tions to adapt and avoid becoming

obsolete.

Trend Micro says data stolen through

corporate espionage can have devas-

tating effects on the targeted firm.

Technology powerhouse Dell Middle East has urged the regional systems integration (SI) channel to embrace business process and solutions life-

Dell urges systems integrators to embrace business process sellingUnderstanding business process and solutions lifecycle crucial for partner success

Hasan says there’s a big gap and

demand for SIs in the market who

understand solutions lifecycle.

cycle when integration solutions in a customer’s environment.

The call comes at a time when the Middle East IT industry is trans-forming and the growing emphasis in the region on business process and specifically solutions lifecycle when it comes to solutions integration.

Shams Hasan, Enterprise Prod-uct Manager, Dell Middle East, said while the need for business process and solutions lifecycle is growing in the channel, the emphasis seems to be more from the growing concerns of customers rather than solution integrators. Hasan observed that there’s still a big gap in the market between the demand for SIs who understand, speak and bring a so-

lutions lifecycle commitment and supply. “SIs who take heed of this supply gap would be big winners tomorrow,” Hasan said.

He continued that Dell is already well-positioned for customers, solu-tion integrators, and partners look-ing for technology strategies and solutions that are future ready for digital transformation.

“Dell’s Future-Ready Enterprise strategy gives organisations a way to build IT certainty in uncertain times, with the speed, scale and savings business demands,” he added. When we talk to our business partners, we emphasize our ability to serve as a partner who can provide a complete solution – one created with a holistic

view that takes advantage of the full spectrum of IT to deliver successful business outcomes. We talk about our unique position as the only technol-ogy company that actually delivers on the promise of integrated, end-to-end solutions – from the data centre to the farthest endpoint and all along the clouds and networks in between.”

Hasan said with Dell’s end-to-end solutions, organisations can become nimble and competitive everywhere in the enterprise, in the manner that best fits their budget, staffing and tim-ing requirements—whether deploy-ing pre-configured systems, using validated reference architectures for guidance or building “do-it-yourself” with best-of-breed platforms.

Security vendor Fortinet Middle East, has revealed that it is push-ing the Fortinet Security Fabric, launched earlier this year, as a re-sponse to the current state of the enterprise network and the chal-lenges that CIOs face today.

According to the manufacturer of fast and secure cyber security solutions, which offers enterprise-level next generation firewalls and a vast array of network security products, the Fortinet Security

IT security vendor Trend Micro has revealed that the UAE is among 22 victims of cyberattacks reported glob-ally in the mining sector, according to the vendor’s latest report.

The report stated that with Saudi Arabia’s mining sector to represent 10% of its non-oil revenue by 2030, and with other countries like Oman and the UAE investing in newer technologies, the outlook for integrated IT platforms and cloud operations in the mining sector is set to grow in the region.

Fabric provides organisations with a framework for meeting today’s and tomorrow’s security challeng-es, bringing the power of threat intelligence to all four corners of a network.

Maya Zakhour, Channel Direc-tor, Middle East at Fortinet, said: “The Fortinet Security Fabric has characteristics that allow organ-isations to adapt as necessary and avoid becoming obsolete with the next wave of new trends that will hit the market.”

Zakhour said the company is wit-nessing a growing trend of speciali-sations, which works to the advan-tage of channel partners, especially in the network security market. She added that since Fortinet has prod-ucts that cater to every layer of the network, the company is pushing Fortinet Security Fabric by edu-cating partners on the solutions best suited for them, based on their specialisations and the industry vertical they are targeting.

With this, stated Trend Micro, companies in the sector will have to be prepared for the security challenges these technology advances bring.

According to the Trend Micro report, the mining industry is be-ing targeted by cybercriminals and is now investigating 17 inci-dents involving cyberattacks on 22 entities operating in the sector since 2010. The most recent at-tack was recorded in April 2016, when hackers leaked 14.8GB of data from the Canadian mining corporation Goldcorp.

Though the report does not have major cases from the Middle East and Africa, companies in the region are not immune to these attacks. The UAE based firm Minerals and Marine Assets Corporation (MAC) and Canadian company Nautilus were the victims of a targeted cy-ber scam, wherein Nautilus paid a $10m deposit intended for MAC into an unknown bank account.

Page 8: Redington Value Journal - August 2016