9 minute read

PRODUCTS

Lenovo ThinkEdge SE70

Lenovo has introduced ThinkEdge SE70, a powerful and flexible artificial intelligence (AI) edge platform for enterprise.

Advertisement

The ThinkEdge SE70 is designed to meet the expanding intelligent transformation needs from logistics, transportation and smart cities to retail, healthcare and manufacturing. The new edge solution from Lenovo is created in cooperation with Amazon Web Services (AWS) leveraging AWS Panorama and is powered by the NVIDIA Jetson Xavier NX platform.

The ThinkEdge SE70 is purpose built to unlock the power of CV applications for enterprise. A version of the ThinkEdge SE70 will be offered with AWS Panorama Device SDK pre-installed, allowing enterprise customers to transform every-day IP cameras into ‘smart’ cameras that run CV apps at the edge. AWS Panorama enables tasks to be automated that have traditionally required human inspection to improve visibility into potential issues. For example, AWS Panorama can be used to track assets for optimizing operations in facilities and monitoring inventory levels on retail shelves–even in environments with limited internet bandwidth.

The new ThinkEdge AI-capable edge appliance is powered by NVIDIA Jetson Xavier NX, a production ready, highperformance, small form factor, power-efficient system on module that is cloud-managed for enhanced security and ease of training and deploying a variety of AI and machine learning models to the edge. It delivers up to 21 trillion operations/ second (TOPS) of accelerated compute, runs modern neural networks in parallel and processes data from multiple highresolution sensors. Jetson Xavier NX leverages NVIDIA CUDA-X, a comprehensive AI software stack with highly optimised, domain-specific libraries that reduces complexity and speeds time to market.

Logitech Logi Bolt

Logitech has announced the expansion of its enterprise business offerings to include individual work setup solutions in addition to existing, meeting room video conferencing technologies to meet the evolving needs of today’s enterprise IT – from the hybrid workplace to global connectivity – to enhance the overall employee experience. Powering this expansion is the introduction of Logi Bolt, a new high-performance, secure wireless technology offering that provides a solution to key imperatives for enterprise IT – secure wireless connection, robust wireless signal and cross-platform compatibility for mice and keyboards. Logitech is bringing Logi Bolt to the enterprise on a global scale to drive enhanced productivity.

Logitech engineered Logi Bolt to conquer IT challenges that can emerge whether users occupy the office or work remotely. Other salient features include: • Security: Delivers a secure level of wireless connectivity for wireless peripheral connectivity for Logitech mice and keyboards with Bluetooth Low Energy Security

Mode 1, Level 4, when paired with a Logi Bolt USB receiver, also known as Secure Connections Only Mode • Robust Signal: The Logi Bolt USB receivers also provide a strong, reliable, drop off free connection up to 10 meters (33 feet), even in congested wireless environments, with up to eight times lower average latency in many cases than other commonly deployed wireless protocols in congested, noisy enterprise environments. • Great Compatibility: Logi Bolt devices are more universally compatible than most leading peripheral brands on the market. Their connections are reliable, allowing IT managers to efficiently source, purchase and distribute without compatibility or connectivity issues, and they work with just about every operating system and platform, including but not limited to: Windows, macOS, iOS, iPadOS, Linux, Chrome OS and Android.

Users can connect via Logi Bolt USB receivers when security and signal strength are paramount, or by using the Bluetooth Low Energy wireless technology installed on the host computer, giving IT managers the flexibility to roll out Logi Bolt wireless mice and keyboards across platforms, functions, and operating systems.

IBM Power Server customers to do more with less. The E1080 also features four matrix math accelerators per core, enabling 5x faster inference performance as compared to the E980. IBM has announced the new IBM Power E1080 server, • New security tools designed for hybrid cloud the first in a new family of servers based on the new IBM environments including transparent memory encryption so Power10 processor. there is no additional management setup, 4x the encryption

The new server is designed specifically for hybrid engines per core, allowing for 2.5x faster AES encryption as cloud environments. The IBM Power10-equipped E1080 compared to the IBM Power E980, and security software for server is engineered to be one of the most secured server every level of the system stack. platforms and is designed to help clients operate a secured, • A robust ecosystem of ISVs, Business Partners, and frictionless hybrid cloud experience across their entire IT support to broaden the capabilities of the IBM Power infrastructure, said the firm. E1080 and how customers can build their hybrid cloud

The new IBM E1080 was designed to introduce several environment, including record-setting performance for SAP key features including: applications in an 8-socket system. IBM is also launching • Enhancements for hybrid cloud like planned industry- a new tiered Power Expert Care service to help clients as first, by the minute metering of Red Hat software they protect their systems against the latest cybersecurity including Red Hat OpenShift and Red Hat Enterprise threats while also providing hardware and software

Linux, 4.1x greater OpenShift containerized throughput coherence and higher systems availability. per core vs x86-based servers[i], and architectural consistency and cloud-like flexibility across the entire hybrid cloud environment to drive agility and improve costs without application refactoring. • New hardware-driven performance improvements that deliver up to 50% more performance and scalability than its predecessor the IBM Power E980, while also reducing energy use and carbon footprint of the E980, allowing

D-Link has introduced their newest Outdoor Industrial AC1200 Access Point DIS-3650AP and Indoor Industrial Access Point DIS-2650AP. Industry X.0 has been described as the digital reinvention of industries by leveraging advanced digital technologies to drive innovation and growth. With this accelerated rate of technological transformation, organizations require solutions such as D-Link’s industrialgrade access points to improve operational efficiency and facilitate the success of Industry X.0.

D-Link’s DIS-3650AP and DIS-2650AP are a vital part of any organisation’s network infrastructure in applications such

D-LINK INDUSTRIAL ACCESS POINT

as Smart Cities, Smart Transportation, and Smart Factories, as they provide mission-critical connectivity for industrial environments. With dual-band 802.11ac Wave 2 Wi-Fi, the access points deliver superior speeds and throughput up to 1200 Mbps. They support MU-MIMO for better handling of multiple data streams, and Airtime Fairness, Band Steering, and Fast Roaming optimize connectivity for all devices. The DIS-3650AP and DIS-2650AP are also PoE ready and feature WPA2 security for powerful protection. Setup and installation are easy with the included DIN rail mounting kit, and centralized management is convenient with D-Link’s free network management solution Nuclias Connect.

Both D-Link industrial access points are built for harsh environments with a wide temperature tolerance. The DIS3650AP is IP-67 rated for robust protection against dust and water, and the DIS-2650AP is IP-30 rated for protection against solid objects. The DIS-2650AP also provides additional features, including a removable 4-contact terminal block that facilitates power supply redundancy. With built-in 2KV surge protection and 15KV ESD protection, the DIS2650AP is compliant with IEC international standards for industrial use.

BRINGING IN THE EXPERTS

SUNIL PAUL, MD OF FINESSE, ON THE BUSINESS CASE FOR MANAGED SECURITY SERVICES

2021 has been a busy year for cybersecurity professionals so far. With global security incidents such as the Colonial Pipeline and Kaseya cyber-attacks, as well as the Microsoft Exchange data breach, business leaders are recognising that cybersecurity can no longer take a back seat.

As remote work models increasingly become popular and the push towards digital transformation intensifies, customers have their hands full as they step up their environments and workloads to the cloud, train staff to operate with new technologies, and simultaneously ensure productivity and profitability. However, having dedicated personnel and resources to constantly monitor the threat landscape can prove to be an expensive and arduous task. This is where managed security services can come to the rescue.

There are several benefits to outsourcing your cybersecurity to a third party, the biggest one being cost savings and unparalleled expertise. In addition, enterprises can save on expenses across different areas such as salaries for dedicated in-house cybersecurity talent, office space, trainings, and so on, which would otherwise require deep pockets.

Managed Security Services Providers (MSSPs) offer a competitive edge to customers as they house the latest cybersecurity solutions and technologies with in-depth knowledge about the evolving threat landscape. These unique skillsets allow for early detection of any security vulnerabilities, continuous monitoring, and immediate solutions. With business environments becoming digitally advanced and more connected than ever before, threat actors are having a field day. In fact, a report by research firm Cybersecurity Ventures revealed that cybercrime will cost companies globally an estimated $10.5 trillion annually by 2025, up from $3 trillion in 2015. This would mean enterprises must invest heavily into cybersecurity tech and talent to keep their ships afloat. Offering 24/7 support, MSSPs can help take this load off so that customers can focus on their core business objectives. What’s more – MSSPs can also custom-built cybersecurity solutions catering to a customer’s specific business requirements and budgets.

By contracting an MSSP, organisations have access to enterprise-grade holistic cybersecurity hubs. These shared Security Operation Centers (SOC) allow companies of any size to leverage advantages such as flexibility, scalability, relevant skillsets, 24/7 support, and so on, without having to commit significantly financially.

There is no debate that MSSPs are the need of the hour in today’s cybersecurity climate. At the onset of the COVID-19 pandemic, the region has experienced an alarming increase in cybercrime. A Kaspersky study reported that in the Middle East alone, there were 2.57 million phishing attacks over a period of just three months in 2020. According to the security leader, both UAE and Saudi Arabia saw a significant increase in phishing attacks. And it’s not just phishing – from ransomware, malware, DDoS, data breaches to insider threats – the region has been earmarked by cyber perpetrators. Cybersecurity vendor Mimecast’s ‘The State of Email Security’ report revealed that 78% of organisations in the UAE indicated they had been impacted by ransomware in 2020, a big increase from 66% in 2019.

Customers are realising that these are not just random figures or statistics with recent news of local entities such as Moorfields Eye Hospital Dubai, confirming cyber-attacks. These reports close to home are further driving organisations to rely on MSSPs for their end-to-end security needs. This is further reinforced in a Kaspersky study earlier this year, which found that around 70 percent of organisations plan to outsource security to an MSSP or an MSP over the next 12 months.

Maintaining an effective cybersecurity program can often be a challenging undertaking for any organisation. It also puts immense pressure on security leaders. However, it is important for them to know that they are not alone. Partnering with MSSPs can enable them with the right capabilities, talents, and tools in the continuous battle against cyber threat actors.

This article is from: