Redington Value Journal - September 2016

8
For more information, please write to [email protected] Issue 04 // September 2016 Continued on page 2 Continued on page 2 Continued on page 2 HPE ACQUIRES SGI FOR $275 MILLION Dell-EMC deal set to close in September Oracle MiniCluster S7-2 Engineered System Dell and EMC have announced plans to close the transaction to combine both businesses on 7th September 2016. The new system aims to bring Oracle database customers the required zero downtime and full security compliance. Redington Value is a value added distributor for the following brands in parts of Middle East & Africa: H ewlett Packard Enterprise has announced that it has signed a definitive agreement to acquire SGI for $7.75 per share in cash, a transaction valued at approximately $275 million, net of cash and debt. SGI products and services are used for high-performance computing (HPC) and Big Data analytics in the scientific, technical, business and government communities to solve challenging data-intensive computing, data management and virtualisation problems. The company has approximately 1,100 employees worldwide, and had revenues of $533 million in fiscal 2016. “At HPE, we are focused on empowering data-driven organisations,” said Antonio Neri, Executive Vice President and General Manager, Enterprise Group, Hewlett Packard Enterprise. “SGI’s immediately following the close of the transaction. The announcement follows regulatory approval of the Dell and EMC transaction by China’s Ministry of Commerce (MOFCOM), which has granted clearance for the companies’ proposed combination. MOFCOM approval was the final regulatory condition to closing the transaction. EMC shareholders approved the Oracle has released a low cost SPARC Cluster based on the new low cost SPARC S7-2 servers. The new system aims to bring Oracle database customers the required zero downtime and full security compliance. According to the company, the MiniCluster S7-2 is a simple and efficiently engineered system designed Dell Technologies, the name of the new combined company, will begin operating to run enterprise databases and applications with uncompromising security. It allows users to run remote offices, small offices, and agile software development (DevOps) environments. It is also ideal for highly security- sensitive applications, such as managing patient medical Michael Dell, CEO and Chairman, Dell Technologies

Transcript of Redington Value Journal - September 2016

Page 1: Redington Value Journal - September 2016

For more information, please write to [email protected]

Issue 04 // September 2016

Continued on page 2

Continued on page 2 Continued on page 2

HPE ACQUIRES SGI FOR $275 MILLION

Dell-EMC deal set to close in September

Oracle MiniCluster S7-2 Engineered System

Dell and EMC have announced plans to close the transaction to combine both businesses on 7th September 2016.

The new system aims to bring Oracle database customers the required zero downtime and full security compliance.

Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:

Hewlett Packard Enterprise has announced that it has signed a definitive

agreement to acquire SGI for $7.75 per share in cash, a transaction valued at approximately $275 million, net of cash and debt.

SGI products and services are used for high-performance computing (HPC) and Big Data analytics in the scientific, technical, business and

government communities to solve challenging data-intensive computing, data management and virtualisation problems. The company has approximately 1,100 employees worldwide, and had revenues of $533 million in fiscal 2016.

“At HPE, we are focused on empowering data-driven organisations,” said Antonio Neri, Executive Vice President and General Manager, Enterprise Group, Hewlett Packard Enterprise. “SGI’s

immediately following the close of the transaction.

The announcement follows regulatory approval of the Dell and EMC transaction by China’s Ministry of Commerce (MOFCOM), which has granted clearance for the companies’ proposed combination. MOFCOM approval was the final regulatory condition to closing the transaction. EMC shareholders approved the

Oracle has released a low cost SPARC Cluster based on the new low cost SPARC S7-2 servers. The new system aims to bring Oracle database customers the required zero downtime and full security compliance.

According to the company, the MiniCluster S7-2 is a simple and efficiently engineered system designed

Dell Technologies, the name of the new combined company, will begin operating

to run enterprise databases and applications with uncompromising security. It allows users to run remote offices, small offices, and agile software development (DevOps) environments. It is also ideal for highly security-sensitive applications, such as managing patient medical

Michael Dell, CEO and Chairman, Dell Technologies

Page 2: Redington Value Journal - September 2016

For more information, please write to [email protected]

innovative technologies and services, including its best-in-class Big Data analytics and high-performance computing solutions, complement HPE’s proven data centre solutions designed to create business insight and accelerate time to value for customers.”

SGI’s highly complementary portfolio, including its in-memory high-performance data analytics technology, will extend and strengthen HPE’s current leadership position in the growing mission critical and high-performance computing segments of the server market. The combined HPE and SGI portfolio, including

transaction on July 19, with approximately 98 percent of voting EMC shareholders casting their votes in favour of the merger, representing approximately 74 percent of EMC’s outstanding common stock.

“This is an historic moment for both Dell and EMC. Combined, we will be exceptionally well-positioned for growth in the most strategic areas of next generation IT including

records, processing financial transactions, handling secure communications, running mission-critical enterprise resource planning (ERP) applications, and hosting security-related services.

It has 1 TB of memory with 16.8 TB of raw flash-based storage and 48 TB of raw disk-based storage. The system is also powered by Oracle’s SPARC S7 processor, which delivers higher baseline per-core performance than x86 processors and features

HPE ACQUIRES... From page 1

From page 1 From page 1

2

a comprehensive services capability, will support private and public sector customers seeking larger supercomputer installations, including U.S. federal agencies as well enterprises looking to leverage high-performance computing for business insights and a competitive edge.

“Our HPC and high-performance data technologies and analytic capabilities, based on a 30-plus year legacy of innovation, complement HPE’s industry-leading enterprise solutions. This combination addresses today’s complex business problems that require applying data analytics and

tools to securely process vast amounts of data,” said Jorge Titinger, CEO and President, SGI. “The computing power that our solutions deliver can interpret this data to give customers quicker and more actionable insights. Together, HPE and SGI will offer one of the most comprehensive

suites of solutions in the industry, which can be brought to market more effectively through HPE’s global reach.”

The transaction is expected to close in the first quarter of HPE’s fiscal year 2017, subject to regulatory approvals and other customary closing conditions.

digital transformation, software-defined data centre, converged infrastructure, hybrid cloud, mobile and security,” said Michael Dell, Chairman and CEO of Dell Technologies. “Our investments in R&D and innovation, along with our 140,000 team members around the world, will give us unmatched scale, strength and flexibility, deepening our relationships with customers of all sizes.”

At closing, EMC shareholders will receive $24.05 per share in cash in addition to a newly issued tracking stock linked to a portion of EMC’s economic interest in the VMware business. Based on the estimated number of EMC shares outstanding at the close of the transaction, EMC shareholders are expected to receive approximately 0.111 shares of new tracking stock for each EMC share. Upon close of the transaction, EMC shares under the ticker symbol ‘EMC’ will be suspended from trading on the New York Stock Exchange.

Dell-EMC... Oracle...

silicon secured memory, data analytics accelerators (DAX), cryptographic acceleration, and in-line memory decompression to support its security and analytics performance.

Oracle highlights that this prebuilt Clustered system can bring end-users secured and accelerated cloud infrastructure, including Oracle Database, Java, and enterprise applications. Its unique built-in security technology helps protect data against intrusions by malware and security breaches.

“Our HPC and high-performance data technologies and analytic capabilities, based on a 30-plus year legacy of innovation, complement HPE’s industry-leading enterprise solutions.”

““Combined, we will be exceptionally well-positioned for growth in the most strategic areas of next generation IT.”

Oracle MiniCluster S7-2 Engineered System

Page 3: Redington Value Journal - September 2016

For more information, please write to [email protected]

3

Jai Balasubramaniyan, Director, Security Product Management, Gigamon

Gigamon fortifies security analytics with certificate metadata Certificate metadata allows to leverage the network to shorten the time to detection and response.

Deep Discovery Inspector has achieved a 99.8 percent detection rate in the latest Breach Detection System test.

Using the service, developers can write standard SQL queries on streaming data and gain actionable insights in real-time.

GigaSECURE expedites the time to detection of potentially malicious web servers and unwanted SSL communications by providing security analytics technologies with the information they need to identify invalid SSL certificates.

SSL-based attacks are on the rise, and many phishing sites use fake SSL certificates to appear legitimate so that targets and infected machines will connect to them. Security analytics tools like Security Information and Event Management Systems (SIEMs) can spot these potentially harmful web communications by flagging inconsistencies in the fields of SSL certificates.

helps define the enterprise security space, recognising those that raise the bar for the industry,” said Eva Chen, CEO, Trend Micro. “As advanced threats continue to increase in sophistication, effective breach detection is an essential part of a connected threat defence for enterprises. Our customers need an effective BDS as part of a layered approach to security to not only detect, but also respond to and protect against new threats.”

Deep Discovery, which is also sold as Trend Micro TippingPoint Advanced Threat Protection, uses extensive detection techniques to identify advanced threats, and ransomware. It monitors all network traffic traversing physical and virtual segments, on over 100 protocols and applications across all network ports.

Firehose and can automatically recognise standard data formats within data streams and suggest a schema, which is easy to edit using Kinesis Analytics’ interactive schema editor.

MLB Advanced Media (MLBAM) is a full service solutions provider that delivers digital experiences through all forms of interactive media. “We capture telemetry and clickstream data from our video streaming clients using Amazon Kinesis Streams. We process that data in real-time to monitor the video streaming experience we provide our customers,” said Rob Goretsky, Director, Data Engineering, MLBAM. “Insightful analysis of streaming data previously involved building dedicated data pipelines to derive specific metrics. We can now interactively develop queries in minutes using Kinesis Analytics.”

Still, the certificate data needed for the detection can be difficult to retrieve pervasively and continuously from broad and distributed networks.

“Sifting through raw packet streams to identify malicious network activity can be a slow and cumbersome process in a world where real-time threat identification and remediation is critical,” said Robert Lowe, Information Security Manager, Fannie Mae. “Gigamon’s network visibility and new HTTP SSL certificate metadata capabilities provide an added layer of intelligence and the context needed to more quickly, effectively and efficiently protect both network infrastructure and data.”

Certificate metadata lets Gigamon, together with its ecosystem partners in the security analytics and SIEM markets, leverage the network to shorten the time to detection and response.

“Organisations know that their network traffic contains a lot of potential intelligence that can help remediate breaches,” said Jai Balasubramaniyan, Director, Security Product Management, Gigamon. “Gigamon is revolutionising Big Data security analytics by uniquely extracting metadata from this data-in-motion and delivering it at network speeds to security technologies that use it to detect and remediate threats faster.”

Gigamon has announced that the Metadata Engine, a key part of the GigaSECURE Security Delivery Platform (SDP), can now generate Hypertext Transfer Protocol (HTTP) Secure Sockets Layer (SSL) certificate metadata.

Trend Micro’s Deep Discovery Inspector has been recognised for the third consecutive year as a recommended breach detection system by NSS Labs.

Deep Discovery achieved a 99.8 percent detection rate in the latest Breach Detection System test, demonstrating a consistent ability to detect network and endpoint-based targeted attacks, advanced threats and ransomware.

“The Breach Detection System test by NSS Labs continuously

Amazon Web Services has announced the availability of Kinesis Analytics, a fully managed service for continuously querying streaming data using standard SQL.

Using Kinesis Analytics, developers can write standard SQL queries on streaming data and gain actionable insights in real-time, without having to learn any new programming skills.

Today’s digital businesses generate massive quantities of streaming data from diverse sources. Being able to continuously query and gain insights from this information in real-time – as it arrives – can allow companies to respond more quickly to business and customer needs. AWS claim that with Kinesis Analytics, continuously querying streaming data in real-time is as simple as writing SQL queries. It integrates with Kinesis Streams and Kinesis

Trend Micro achieves recommended status from NSS Labs

AWS announces Kinesis Analytics

Eva Chen, CEO, Trend Micro

Page 4: Redington Value Journal - September 2016

For more information, please write to [email protected]

4

VMware VSP - VTSP Bootcamp in Dubai, U.A.E. – 2nd August 2016

Fortinet ATP Framework Technical Day in Manama, Bahrain – 11 August 2016

Fortinet Wireless Framework Technical Day in Muscat, Oman – 16-18 August 2016

Fortinet Security Roadshow in Amman, Jordan – 22 August 2016

Fortinet Security Seminar in Lebanon – 23 August 2016

Vision Solutions Partner Bootcamp in Dubai, U.A.E – 10 August 2016

SonicWALL Security Partner Update in Dubai, U.A.E. – 15 August 2016

VMware Airwatch Enablement Session in Dubai, U.A.E. – 21-25 August 2016

Entrust Datacard Partnership Launch in Dubai, U.A.E. – 22 August 2016

Fortinet Wireless Framework Technical Day in Doha, Qatar – 23-25 August 2016

Trend Micro Deep Security ATC Training in Dubai, U.A.E. – 16-18 August 2016

EVENTS

Page 5: Redington Value Journal - September 2016

For more information, please write to [email protected]

5

Avaya Partner Bootcamp in Nairobi, Kenya – 11th August 2016

Fortinet ATP Framework Technical Day in Riyadh, Saudi Arabia – 10 August 2016

EMC End User Forum with Partner IMPC in Ghana – 17 August 2016

Symantec Partner Bootcamp in Nairobi, Kenya –18 August 2016

Fortinet ATP Framework Technical Day in Abu Dhabi, U.A.E. – 25 August 2016

Tripplite Partner Bootcamp in Ethiopia – 16 August 2016

Palo Alto Partner Bootcamp in Riyadh, Saudi Arabia – 10 August 2016

EMC End User Forum with Partner ISON Technologies in Kenya – 18 August 2016

SAP, Dell and EMC End User Forum in Nairobi, Kenya – 24 August 2016

Oracle Security Solution Workshop with partner IITC in Muscat, Oman – 23 August 2016

Page 6: Redington Value Journal - September 2016

For more information, please write to [email protected]

6

Cisco releases Midyear Cybersecurity Report The report highlights that organisations are unprepared for future strains of more sophisticated ransomware.

Configuring devices with apps, email and Wi-Fi easily, it enables the data encryption and security as well.

The solution allows firms to secure and manage all privileged accounts in the cloud.

Cisco highlighted in its 2016 Midyear Cybersecurity Report (MCR) that organisations are unprepared for future strains of more sophisticated ransomware.

According to the report’s findings, the struggle to constrain the operational space of attackers is the biggest challenge facing businesses and threatens the underlying foundation required for digital transformation. Other key findings in the MCR include

VMware has released AirWatch Express, a simple mobile device management (MDM) cloud solution designed to get devices up and running quickly. AirWatch Express aims to make it easy to configure devices with apps, email and Wi-Fi, while enabling the data encryption and security that is necessary in today’s environment.

It delivers an “affordable, consumer-friendly MDM,” built on the same platform as VMware AirWatch, an enterprise mobility management solution. The solution intends to allow more organisations globally to protect their company by securing their employee’s devices in just a few clicks.

“The transformative nature of mobility has caused the mobile endpoint to become the primary

adversaries expanding their focus to server-side attacks, evolving attack methods and increasing use of encryption to mask activity.

So far in 2016, ransomware has become the most profitable malware type in history. Cisco expects to see this trend continue with even more destructive ransomware that can spread by itself and hold entire networks, and therefore companies, hostage.

It underscored that new modular strains of ransomware will be able to quickly switch tactics to maximise efficiency. For example, future ransomware attacks will evade detection by being able to limit CPU usage and refrain from command-and-control actions.

Mike Weston, VP, Cisco ME said, “Attackers are going

computing device for many businesses, and these same organisations are struggling to keep up with the device and app proliferation. The truth is managing mobile devices can be a timely and complicated

process,” said Blake Brannon, Vice President of Product Marketing, End-User Computing, VMware. “Without the need for technical knowledge or additional IT staff, AirWatch Express empowers organisations to support an ever increasing mobile workforce.”

AirWatch Express is a solution that doesn’t require extensive set up or training, and is available for iOS, macOS, Android and Windows 10. It starts at $2.50 per device and is available today.

undetected and expanding their time to operate. To close the attackers’ windows of opportunity, customers will require more visbility into their networks and must improve activities, like patching and retiring aging infrastructure lacking in advanced security capabilities. Cisco is working with our customers to help them match and exceed their attackers’ level of sophistication, visbility and control.”

Visibility across the network and endpoints remains a primary challenge. On average, organisations take up to 200 days to identify new threats. Cisco’s median time to detection (TTD) continues to outpace the industry, hitting a new low of approximately 13 hours to detect previously unknown compromises

CyberArk has announced new capabilities for reducing cyber security risk in the cloud.

The CyberArk Privileged Account Security Solution allows organisations to secure, manage, control access, rotate credentials, monitor and audit all privileged accounts in the cloud. Working with automation and orchestration tools such as Chef, Puppet, Windows PowerShell, Jenkins and others, CyberArk helps build privileged account security into cloud environments with automatic provisioning and integration during cloud migration and on-going management. Enhanced REST APIs available in CyberArk Privileged Account Security

for the six months ending in April 2016. This result is down from 17.5 hours for the period ending in October 2015. Faster time to detection of threats is critical to constrain attackers’ operational space and minimise damage.

As attackers innovate, many defenders continue to struggle with maintaining the security of their devices and systems. In the Europe, Middle East, and Africa region, Ukraine and Romania were the greatest sources of blocked traffic as a proportion of their overall traffic; and in Asia-Pacific, Australia topped the list. Just 8.4 percent of the total vulnerable Cisco devices detected globally were in the Africa region – a small collection compared to 24 percent found in Europe, and 35.5 percent in Asia.

Solution v9.7 enable broader cloud automation capabilities and greater security for DevOps environments.

CyberArk secures assets running in the cloud, but also integrates privileged account security into DevOps processes, facilitating cloud migrations and enabling organisations to get the full benefit of the agility and elasticity of the cloud.

“When investing in the business benefits of the cloud and DevOps strategies, organisations shouldn’t have to make trade-offs between speed, efficiency and security,” said Roy Adar, Senior Vice President, Product Management, CyberArk. “CyberArk is a trusted advisor and partner in our customers’ cloud migration strategies. An effective cloud strategy must include security from the beginning – not after the fact. We bake privileged account security into cloud automation tools and the processes they enable to create repeatable, reliable security that is responsive to the elasticity of these environments.”

VMware launches AirWatch Express CyberArk secures enterprise cloud orchestration and automation

Mike Weston, VP, Cisco Middle East

Blake Brannon,VP, Product Market-ing, End-User Computing, VMware

Page 7: Redington Value Journal - September 2016

For more information, please write to [email protected]

7

Check Point introduces SandBlast Agent for BrowsersSandBlast Agent for Browsers is designed to protect users from evolving threats by seamlessly incorporating key components of the security model into the browser.

The new QoS includes data protection, application integration, scheduling, and performance enhancements.

The FortiAP-U series of universal wireless AP is designed to reduce complexity.Addressing the exponential

growth in web-based malware, phishing and social engineering attacks, Check Point Software Technologies has announced SandBlast Agent for Browsers with Zero Phishing technology.

It is designed to protect users from evolving threats by seamlessly incorporating key components of

Pivot3 has extended the capabilities of its patented Dynamic Quality of Service (QoS) software to include policy-driven data protection capabilities.

The software’s new QoS includes data protection, application integration, scheduling, and performance enhancements to the existing QoS capabilities of the Pivot3 flash arrays, providing customers with more automation and flexibility in how they guarantee service level agreements (SLAs) for critical business applications.

With data protection QoS, customers can simply define policies specifying snapshot, replication and retention and apply them to volumes or groups of volumes. The addition of QoS scheduling capabilities lets customers set pre-defined

the security model into the browser. It provides real-time protection, all while reducing the resources required to prevent today’s most advanced attacks.

For better business results, users now expect unconstrained internet access and immediate delivery of downloaded content and email. At the same time, enterprises must contend with the changing threat landscape, as they strive to prevent the theft of sensitive customer information and their own intellectual property, while maintaining the efficiency of their critical business systems. Files downloaded from the web represent a leading entry point for malware today, and data shows this threat is growing.

Web-based malware and social engineering attacks targeting organisations are increasing in volume and sophistication, with cyber-attackers using the latest evasion techniques and persuasive scams to infect their victims.

“Existing technologies ask users to wait for content to be evaluated, or require multiple, intrusive software installations on every system,” said Nathan Shuchami, Head of Advanced Threat Prevention, Check Point. “SandBlast Agent for Browsers brings the highest level of protection to users in a simple browser plug-in that blocks unknown and zero-day malware delivered via web downloads, while quickly delivering safe content within seconds.”

Fortinet has announced the launch of its new FortiAP-U series of universal wireless access points (AP), designed to reduce complexity with what the company claims to be the most flexible, enterprise-grade wireless solution on the market.

The universal APs combine unified access network control and visibility, with the protection of Fortinet’s Security Fabric. FortiAP-U claims to simplify deployment and administration of access networks by offering a single appliance that is compatible with all of the company’s access management platforms.

Seamless integration with Fortinet’s Security Fabric also enables access network segmentation capabilities to deliver the only security strategy capable of protecting enterprises against threats targeting IoT and endpoint devices before they can access critical internal data.

The access points feature innovative plug-in-play implementation, enabling each device to automatically determine the type of management and pull down configuration information to deliver rapid deployment without the need for IT to manually update every appliance.

Fortinet Universal APs are also designed to suit the wireless needs of the largest enterprises with cutting-edge features such as quad special streams, extended 5 GHz channel support, wide-channel 160MHz and Multi-User MIMO. These technologies maximise bandwidth and device capacity, supporting even the densest wireless needs with multi-gigabit throughput.

Pivot3 adds policy-driven data protection capabilities

Fortinet launches universal wireless access points

schedules for both performance and data protection policies, allowing them to change automatically at pre-determined times. By automating policy changes, IT can support the business with greater agility as application priorities and workloads change.

“By eliminating contention issues, Pivot3’s QoS has allowed us to improve the performance of our most critical member-facing systems, such as online banking,” said Chris Visocnik, Director of IT, Consumers Credit Union. “Now with the addition of data protection QoS, we have the option of simplifying and automating our data protection policies for mission-critical and member-facing credit union applications.”

“IT organisations are pushing to consolidate multiple application

workloads onto common infrastructures to reduce their capital and operating expenses,” said Ahmad Chamseddine, Vice President and Chief Operations Officer, Pivot3. “Customers need guaranteed performance and data protection in line with their business priorities, which is why we’re continuing to innovate with Quality of Service and hyperconvergence. This is another step in the development and integration of the Pivot3 and NexGen Storage technology sets following our recent acquisition as we move toward achieving the software-defined data centre.”

The new QoS capabilities are now available with vSTAC SLX Hyperconverged and N5 Flash Storage systems through Pivot3’s authorised resellers and to Pivot3 customers on support contracts.

“SandBlast Agent for Browsers brings the highest level of protection to users in a simple browser plug-in.”

Page 8: Redington Value Journal - September 2016

For more information, please write to [email protected]