@entitworld
@enterpriseitworld
@enterpriseitworld R S 2 0 | PA G E S 3 6 | V O LU M E 0 2 | I S S U E 0 5
WWW.ENTERPRISEITWORLD.COM
JUNE 2017
SYNCHRONIZED SECURITY:
THE NEED OF THE
SUNIL SHARMA VICE PRESIDENT, SALES, SOPHOS INDIA & SAARC
HOUR FOR CIOs AND CISOs
Recent number of growing attacks directed towards Indian enterprises has given cybersecurity its deserved place as one of the biggest concerns of the corporate world....p 19
INTERVIEW
WITH STRONG LOCAL PRESENCE...,
TIM TI, CEO & DIRECTOR, UTSTARCOM....p 21
INTERVIEW
SOFTWAREDEFINED STORAGE ...,
ANUROOP GUPTA, COUNTRY MANGER- SAN BUSINESS, BROCADE INDIA....p 30
1
INNOVATION MARRIED TO EXCELLENCE
Our Structured Cabling Solutions have innovative technology that provide Secured, Reliable and Uninterrupted networking experience.
DIGISOL is proud to provide end-to-end Structured Cabling Solutions which include CAT 5e, CAT 6 and CAT 6A technology in Copper range as well as a whole range of Fiber and FTTH products. The products are of a quality that industry yearns for. We are also proud to Make In India !
www.digisol.com helpdesk@digisol.com
1800 209 3444
For any enquiries, kindly e-mail us on scs.sales@digisol.com
Corporate Office: DIGISOL SYSTEMS LTD. Smartlink House, Plot No. 5, Off CST Road, Bandra-Kurla Complex Road, Santacruz (East), Mumbai - 400098.
WIRELESS | BROADBAND | 4G/3G PRODUCTS | SWITCHING | SURVEILLANCE SOLUTIONS | STRUCTURED CABLING SYSTEMS
X2
X2
EDITOR’S LETTER
ON OUR WAY TO CREATE CIO200 Finally, we are able to profile top 100 CIOs who have been instrumental in their organiza-
Without security planning, you cannot go ahead with other things. Today, WannaCryramsomware attack turns out to be a surprise package for the entire world, which was not expected. Similarly, many such attacks may surface into the market and one needs to be prepared. It means one must make the strategy clear, the CIOs must take the CISOs on a single page while speaking to the board members on the entire architecture. However, this issue speaks about the WannaCryramsomware attack and its intent. We also have tried to decode the smart city challenges and opportunities. Along with that, we have brought out a special coverage of Sophos, a global security company which had launched products much before WannaCry outbreak happened. Hope you will be happy reading this issue. If you have any feedback, pls. do not hesitate to send in.
tional growth by creating right technology strategy.This has encouraged us to profile 200 CIOs who have been in this space. Therefore, our July edition will be known as Next100. These 200 CIOs will be felicitated in the award event on 4th of August. This event would bring together award ceremony along with a panel discussions and some corporate presentations on unique technologies that would influence the enterprise IT. Besides, we are also planning to bring out CISO50 in August 2017, which will be followed by Cyber Sentinels Awards for the CISOs 50. This issue will be couple with a special supplement called ‘Cyber Sentinels’ for different security technologies. We clearly understand the importance of the CISOs along with the CIOs because in today’s world in the entire IT infrastructure architecture, security is a given thing.
NEXT MONTH SPECIAL
S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M
COVER STORY
SUPPLEMENT
‘NEXT 100’ CIOs
Digitizing Healthcare
Following up the three month CIO Story titled ‘ChangeAgents 100’, we are back with CIO profiling in the July issue. These CIOs have been outstanding in their deployments of third platforms. We take a look at how ably they have been able to digitize their organization. Featured IT heads will be from BFSI, Manufacturing, FMCG, Retails, Hospitality etc.
The story observes how digital transformation and technologies like IoT, SMAC and Robotics have been driving stakeholders in the domestic market towards making healthcare easily accessible and efficient for the billion strong population of India.
PLUS
Interviews and Case Studies
Catch interviews, guest articles and case studies of recent applications from the Industry stakeholders, IT/ITES Vendors and CIOs from the Enterprise IT World Community.
Send in your inputs to sanjay@accentinfomedia.com
4
ENTERPRISE IT WORLD
JUNE 2017
CONTENTS VOLUME 02 | ISSUE 05 | JUNE 2017 | W W W. E N T E R P R I S E I T W O R L D . C O M
Publisher: Sanjib Mohapatra Editor: Sanjay Mohapatra Associate Editor: Chitresh Sehgal Designer: Ajay Arya Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan Lead Visualizer: DPR Choudhary Visualizer: Ravish MARKETING Marketing Manager: Kajal Sharma kajal@accentinfomedia.com SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016
FEATURE
Phone: 91-11-41055458 E-mail: info@accentinfomedia.com
26
INDIAN SMART CITIES: A POOL OF IT OPPORTUNITIES
As Modi Government’s most dynamic initiative gains momentum, the investments and efforts are surging at both Public and Private fronts. With the numbers going into billions and colossal plans for transforming 100 cities,... PRODUCTS /34 TP-Link
TP-Link AC1200 Wi-Fi Range Extender RE305
MORE INSIDE Editorial~ ~~~~~~~~~~~~~~~~~~~~~~~~~ 04 News~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06 Products~~~~~~~~~~~~~~~~~~~~~~~~~~ 34
16
21
30
32
COVER STORY
INTERVIEW
INTERVIEW
IXIA
Sophos
“Synchronized Security: The need of the hour for CIOs and CISOs”
UTStarcom
“With strong local presence, we are positioned to efficiently work with customers directly”
Brocade
“Software-defined storage is the logical next step”
EDITORIAL OFFICE Delhi: 6/103, (GF) Kaushalya Park, New Delhi-110016, Phone: 91-11-41657670 / 46151993 info@accentinfomedia.com
Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/103, (GF) Kaushalya Park, Hauz Khas New Delhi-110016
Phone: 91-11-46151993 / 41055458
Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.
32
Ixia
“Visibility and control over the network has become critical” JUNE 2017 ENTERPRISE IT WORLD
5
INTERVIEW INISDE
SOFTWARE-DEFINED STORAGE IS THE LOGICAL NEXT STEP Page 30
ITWORLD
ROUND UP Number of Attacks
Top 10 Target Countries for Web Applications Attacks,Q1 2017 250M 200M
221.9M
150M 100M 50M
24.2M
10M U.S
Brazil
14.2M U.K
13.4M Japan
10.8M Germany
10.6M Spain
7.0M Australia
6.7M India
5.8M
4.5M
Netherlands
Singapore
Figure 3.6 The Visit majority of targets of web apllications attacks were in the U.S.
India 8th among top targets for Web Application Attacks
B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M
Akamai Technologies released its first quarter, 2017 State of the Internet / Security Report. The report, using data gathered from the Akamai Intelligent Platform, provides analysis of the current cloud security and threat landscape, as well as insight into attack trends. “If our analysis of Q1 tells us anything, it’s that risks to the Internet and to targeted industry sectors remain and continue to evolve” said Martin McKeay, senior security advocate and senior editor, State of the Internet / Security Report. “Use cases for botnets like Mirai have continued to advance and change, with attackers increasingly integrating Internet of Things vulnerabilities into the fabric of DDoS botnets and malware. It’s short sighted to think of Mirai as the only threat, though. With the release of the source code, any aspect of Mirai could
6
ENTERPRISE IT WORLD
JUNE 2017
be incorporated into other botnets. Even without adding Mirai’s capabilities, there is evidence that botnet families like BillGates, elknot, and XOR have been mutating to take advantage of the changing lands cape.” The United States remained the top source country for web application attacks, showing another significant year-over-year increase — up 57 percent from Q1 2016. The top three attack vectors used against web applications in Q1 of 2017 were SQLi, LFI and XSS. The Netherlands, in second for the top source of web application attacks of Q1 2017, dropped to 13 percent from 17 percent in the previous quarter, remaining a consistent source of attack traffic and a large proportion of attacks from a country of only 17 million citizens.
D ATA BRIEFING
50% Population that will rely on Virtual Private Health Assistants for primary care.
ITWORLD // NEWS BRIEF
India to have 5G rollout standards in place by 2018
Tech investments by APAC CEOs not aligned with biz expectations Asia/Pacific CEOs expect productivity in their organizations to increase by 24 percent by the end of 2018, with revenue (cited by 26 percent of respondents) and profitability (15 percent) as the top two metrics of success, according to Gartner 2017 CEO survey. However, the survey uncovers a gap between what they want to achieve and where technology investments are being made. To achieve such aggressive productivity gains, Asia/Pacific CEOs believe that conventional technologies (cloud, ERP, analytics and CRM) will help them, rather than technologies that support digital transformation (digital environments, blockchain, the Internet of Things [IoT], robotics, artificial intelligence [AI] and 3D printing). “Asia/Pacific CEOs want to increase profit margins while maintaining sales growth, and they expect IT to play a strong role in this,” said Partha Iyengar, vice
president and Gartner Fellow. CEOs expect IT to play a strong role in fueling this profitable growth. “IT-related” appears as the second business priority after growth, reflecting the importance CEOs give IT. This continues a trend that first appeared in our 2015 survey, when IT reached the top five business priorities of CEOs. This year’s ranking of No. 2 is the highest ranking IT has achieved in the last three years. “Digital” means different things to different people, and APAC CEOs hold less transformative views of digital business than their global counterparts, according to the Gartner survey. It found that 45 percent of Asia/Pacific CEOs think of digital transformation as a way to optimize their current business versus 42 percent globally.
GLOBEL
EVENTS
31 MAY – 2 JUNE 2017
4–6 JUNE 2017
5–8 JUNE 2017
12TH FUTURE BUSINESS TECHNOLOGY CONF (FUBUTEC) 2017
INTL CONF ON CLOUD COMPUTING AND APPLICATIONS (CCA’17)
DATA SCIENCE CONGRESS 2017
Warsaw, Poland Tech research beyond building blocks of present day biz practices such as “Operations Research” or “Business Process Simulation”.
8
ENTERPRISE IT WORLD
The standards are likely to be ready by 2018. This was stated by the D P De, Sr. DDG, Telecom Engineering Centre (TEC) at the 5G India 2017 Conf here. TEC is the nodal agency of the Dept of Telecom, GOI responsible for drawing up of standards, generic requirements, interface requirements, service requirements and specifications for telecom products, services and networks. The first 5G India 2017 Conference was organized in national capital by Bharat Exhibitions with support from COAI, 3GPP, TSDSI and saw massive participation from various telecommunication industry verticals including networks, service providers, manufacturers etc. “Connected devices, digitized lifestyle where almost every aspect of human life will be consumed digitally calls for a new paradigm shift in telecommunication eco-system,” said Shyam P Mardikar, CTO (Mobile Networks), Bharti Airtel Limited. Experts across board did agree that sooner or later the telecommunication services will migrate to 5G architecture and time has come to start serious preparation for standardization and network up-gradation.
JUNE 2017
Rome, Italy Develop new collaborations and meet experts on the subject of cloud computing and applications.
Navi Mumbai, India The event would be rich with information about latest methods, tools and best of the best practices in the world of data science.
6–9 JUNE 2017
Geneva, Switzerland Explore new territories of IoT including emerging researches, technologies, sustainable developmnt, security, privacy biz, finance, and Industry 4.0. IOT WEEK 2017
ITWORLD // NEWS BRIEF
Dell’s venture arm debuts in public after years of stealth operations
S/HE SAID IT
RAJAN S MATHEWS,
DIRECTOR GENERAL, CELLULAR OPERATORS ASSOCIATION OF INDIA (COAI)
“It may be easy to rollout 5G in countries like Japan or South Korea but India is a fundamentally different market with diverse needs. There would be huge financial and structural challenges. We have to make India specific case for 5G.”
Dell Technologies brought out of stealth its venture practice Dell Technologies Capital. Since its inception a few years ago, Dell Technologies Capital has been an active investor in more than 70 early-stage startups, with the mission of helping founders and their teams develop innovative technology solutions and bring them to market. “At Dell Technologies Capital, we have a fundamental understanding of what promising young companies need to change the world,” said Michael Dell, chairman and chief executive of Dell Technologies. “We provide the resources, scale and expertise to help them continue innovating and maximize their potential.” The ventures team focuses on emerging technology areas that are relevant to the Dell Technologies’ unique family of businesses including Dell, Dell EMC, Pivotal, RSA, SecureWorks, Virtustream and VMware. Examples of Dell Technologies Capital ‘s investment areas include storage, software defined networking, management and orchestration, security, machine learning/artificial intelligence, Big Data/analytics, cloud, Internet of Things (IoT) and DevOps. “Capital is merely table stakes to set a startup company on the path to success. New companies are looking for active investment partners who provide breadth and depth of expertise and access to resources and scale,” said Scott Darling, president, Dell Technologies Capital. “Dell Technologies Capital is comprised of a team of highly experienced investors with an extensive network of industry contacts to help our portfolio companies achieve escape velocity. We’ve been making these investments in stealth mode for a number of years and are accelerating our pace of investments.” Dell Technologies Capital offers experienced board members, deep technical expertise as well as access to the global scale, channel, OEM and go-to-market relationships that are unique to the Dell Technologies’ family of businesses. In addition, we provide access to industry-leading technologists, investors and company executives.
QUICK BYTE ON
10 ENTERPRISE IT WORLD
FINANCIAL
JUNE 2017
“We are going to India with a qualified delegation. There exist opportunities linked both to ongoing infra and development processes particularly suitable for the penetration of Italian excellence.” I VA N S C A L FA R OT TO , I TA L I A N D E P U T Y M I N I S T E R O F E C O N O M I C D E V E LO P M E N T.
Polaris announces Q4 & Full Year FY17 Results. FY17 revenues Rs. 2,080Cr i.e. 1.4% growth against FY16. In USD, rev $310.2Mn against $303.2Mn in FY16 up 2.3%. Q4 rev Rs.562Cr, up 9% over Q3. FY 17 PBT Rs. 236Cr, 15.4% up. Q4 FY17 PBT Rs. 45.7Cr, down 33.1% from Q3 FY17 due to reported Forex loss of Rs. 17Cr in Q4 FY17.
NEWS BRIEF // IT WORLD
UnoMinda, Microsoft to bring connected vehicle technologies to India
VMware Pulse Iot Center DEVICE MANAGEMENT
Onboard
Configure Maintain
INFRASTRUCTURE ANALYTICS ADMIN CONSOLE & API Perform
EDGE LIOTA
ALERTS & NOTIFICATIONS
Monitor
IoT Devices
HARDWARE
VMware empowers customers with complete control over IoT deployments VMware unveiled Pulse IoT Center, a secure, enterprise grade IoT infrastructure management solution that will enable IT and OT teams to have complete control of their IoT infrastructure and things. The first solution in a new family of VMware IoT offerings will help customers to more efficiently manage, operate, scale and protect their IoT projects from the edge to the cloud. As IoT becomes prevalent in enterprises, they need a simplified approach to manage, monitor and secure infrastructure and data. “As enterprises look to transform into digital businesses, this creates an opportunity for IT and OT teams to collaborate as
EXECUTIVE
they embrace IoT to improve operations within their business, while generating new forms of revenue,” said Mimi Spier, vice president, IoT, VMware. Customers investing in IoT face significant challenges as they move from Proof of Concept to production. They are seeking a simpler way to track, visualize, monitor and secure hundreds of thousands of different types of edge systems and connected devices across their IoT use cases. Pulse IoT Center is expected to become available in 2017. The solution will be sold as both a standalone solution by VMware and partners as well as a bundled offering via partners such as Dell EMC.
Minda iConnect, the connected vehicle and telematics arm of UNO MINDA Group, and Microsoft India announced a strategic collaboration to drive connected vehicle technologies for the automotive industry in India. Microsoft will help UNO MINDA develop technologies that will bring together AI, advanced machine learning, and IoT capabilities on Azure. These technologies will help create highly personalized, smart and safer driving experience for vehicle drivers. Rajiv Sodhi, Cloud and Enterprise Lead, Microsoft India, stated, “Minda iConnect is a pioneer in developing connected vehicle technologies in India. We believe that the power Microsoft Azure cloud and Azure IOT services will bring secure and faster connected experiences to vehicle drivers in the country.”
MOVEMENT Schneider Electric names Venkatraman Swaminathan as VP, IT Division – India Zone to drive growth of overall IT Business. Ritesh Gandotra to lead Document Management Services biz for Xerox India, implementing strategies for India business
Digital Shadows ropes in Dan Lowden as new CMO. Dan will lead all aspects of company’s strategic marketing efforts.
Apps Discover appoints Muhammad Jumhari as Country Head Indonesia. The company expands global footprint with 2 intl offices in SEA.
Tata Communications Board elects private equity veteran Renuka Ramnath as Chairperson. Independent Director since Dec 2014.
Polycom names Amy Barzdukas as CMO. Barzdukas joins a new executive lineup including new CEO, CHRO and EVP. JUNE 2017
ENTERPRISE IT WORLD
11
ITWORLD // NEWS BRIEF
Forcepoint highlights need to combat insider threats
Themed ‘The Human Point – A Known Unknown, Forcepoint’s first annual premier business technology event - Forcepoint Solution Day is one of India’s largest annual conferences focused on Security. Forcepoint Solution Day is a forum for articulating and elevating Forcepoint’s Vision and strategy. The forum brings together global security experts sharing their insights and perspectives on how to combat cyber threats across a wide spectrum of users. Partners and customers attended this three-day event to participate in discussions focused on the current state of cybersecurity and how to best prepare for the future. The event was done across 3 cities in Bangalore on 3rd May, followed by Mumbai on 4th May and concluding in New Delhi on 5th May. Over 700+ attendees including partners and customers attended this three-day event to participate in discussions focused on the current state of cybersecurity and how to best prepare for the future. The solution day threw light on how organizations today need to combat cyber threats across a wide spectrum of users – parents, children, SMEs, corporate and government. It also focused on how Forcepoint technologies are enabling enterprises to run their operations in secure manner. Forcepoint’s “Inside-Out” approach will revolutionize how you protect your critical data. Insider Threat Data Protection delivers deep visibility into threats from within by linking data movement to your users’ behavior, wherever they may be. Early visibility into risky user behavior gives you advanced warning into threats to your data from within. Insider Threat and Data Protection provides an early warning to an insider threat and prevents the exfiltration of your intellectual property and regulated data. 12 ENTERPRISE IT WORLD
JUNE 2017
Oracle validates Cloud Platform for India Stack
Oracle Cloud Platform has been validated to develop applications using India Stack services. Key to the country’s “Digital India” vision, India Stack is a set of APIs that allows developers working with government, businesses, and startups to utilize a unique digital Infrastructure to deliver secure presence-less, paperless, and cashless service delivery. With this validation, developers and partners can leverage Oracle Cloud at Customer to create and
INTERESTING
test next generation cloud applications that invoke core India Stack APIs, including Aadhaar Authentication and eKYC, eSign and DigiLocker. “Oracle is committed to empowering developers around the world to take advantage of the latest technologies to build the next generation of innovative applications,” said Amit Zavery, senior vice president, Oracle Cloud Platform and Middleware.
TWEET
“Stay safe from #Ransomware Cyber threats. Watch expert Scientists of @ GoI_MEITY sharing important safety tips.” Ravi Shankar Prasad, IT Minister, GOI
Shows how the Ransomware WannaCry breakout became an issue of national importance.
NEWS BRIEF // IT WORLD
Vertiv flags off multi-city ‘Avatar’ event series with Mumbai chapter Netgear launches highest density rackmount network storage for SMBs The new ReadyNAS 4360X is ideally suited for businesses that have ultra-large storage capacity needs and demand high levels of data reliability and security. It’s appropriate for applications such as multi-service/ multi-tenant data center operations, virtual machine backup, disaster recovery backup, archiving and IP surveillance camera video storage. With 5 levels of unrivaled data protection, ReadyCLOUD flexible file sharing, and ReadyDR block-level backup and disaster recovery, ReadyNAS 4360X Network Storage offers outstanding performance and scalability with the industry’s lowest TCO for a storage solution in its class. It’s also the easiest to manage with the Insight management application for iOS and Android that enables setup, monitor-
ing and management from a mobile device. The new ReadyNAS OS 6.7 offers new enterprise-level capabilities such as synchronization with public cloud storage services including Amazon S3, Amazon Cloud Drive, Google Drive and Dropbox. “Our innovation in storage over the last decade has been to bring enterprise-class functionality to the SMB, without the typical Big IT premium. The new ReadyNAS 4360X for rack deployment is no exception,” said Marthesh Nagendra, Country Manager, Netgear India & SAARC. ReadyNAS 4U 60-bay 10GbE Rackmount Network Storage (RR4360X or RR4360S) is available ready in India, at an MSRP of 9 Lakhs .ReadyNAS 4360X with two 10GBase-T ports and the ReadyNAS 4360S with two SFP+ ports.
Vertiv, formerly known as Emerson Network Power,rolled out its multi-city ‘Avatar’ event series in association with its partner Network Techlab to connect with its current and potential customer base in India. The event was attended by over 100 customers and Vertiv sales, service and channel teams. Vertiv hosted second chapter of this series in Chennai on May 10. Upcoming chapters will be held at Bangalore & Kolkata. Vertiv will take its new Avatar event series to tier-1 metro cities this quarter, followed by upcountry tier-2 cities next. These events will unveil Vertiv next-generation solutions from its Lieber, Avocen and Smart Solutions product portfolios. Sanjay Zadoo, India country channel manager, Vertiv said, “Through newly launched products, we want to demonstrate agility and thoughtleadership that Vertiv brings to the Indian market. Together we intend to showcase the availability of energy-efficient solutions that will change the way businesses address their data center needs.”
Cadyce security tools support enterprises across verticals Cadyce’s latest technologies provide powerful security tools across sectors and verticals. Highprofile security breaches damage the reputation of stores, creating longterm repercussions for brands that are negatively
affected. Cadyce offers wide range of IP cameras which includes Day/Night vision, Wireless, PoE, PTZ, Outdoor cameras. Complimentary camera management SecuGuard software monitors 64 cameras simultaneously.
Camera’s wide angle HD view makes it suitable for monitoring larger areas like malls, offices, warehouses etc. It supports 3GPP mobile surveillance as well as advanced Complimentary software supports up to 64 Internet
cameras. Cadyce NVRs allows you to view, record and control IP Cameras connected in your network with the help of one centralized interface. These NVRs can also be accessed remotely over the Internet.
JUNE 2017
Cadyce provides 4/9/16 channel NVR’s depending upon the customers ‘ requirements. Cadyce’s PoE switches are IEEE 802.3af compliant and specially designed for powering network devices.
ENTERPRISE IT WORLD
13
ITWORLD // NEWS BRIEF
BOOK
GLOBAL UPDATE
Smart Factories to pump in $500Bn revenue globally by 2022
SELF
People-Centric Security: Transforming Your Enterprise Security Culture AUTHOR
LANCE HAYDEN
PRICE
RS. 3,441.29 (PAPERBACK) AVAILABLE AT
AMAZON.IN
About The Book Capgemini has announced the findings of its Smart Factories report. According to the research from Capgemini’s Digital Transformation Institute, manufacturers expect that their investments in smart factories will drive a 27% increase in manufacturing efficiency over the next five years which would add $500 bn in annual added value to the global economy. As a result of productivity, efficiency and flexibility improvements, smart factories will benefit from significant reductions in operating costs. For example, the report estimates that the average automotive manufacturer could drive up to a 36% improvement in operating margin through
improved logistics and material costs, equipment effectiveness and improved production quality. As such, the majority of industrial companies have already embarked upon their digitalization of plants to stay competitive; only 16% of those surveyed say they don’t have a smart factory initiative in place, or upcoming plans to implement one. Early-adopters, including factories in the US and Western Europe are leading the pack; half of respondents in the US, France, Germany and the UK have already implemented smart factories as opposed to 28% in India and 25% in China.
The book shows, step-by-step, how to analyze and articulate your organization’s cultural security posture and migrate to a reliable, people-focused data protection model.
Key Features Discover how to develop a structured implementation strategy, build behavioral models, identify problems, and transform security effectiveness.
Konica Minolta unleashes high performance enterprise imaging portfolio Konica Minolta has unveiled new Accurio Press series combining digital print quality that rivals offset prints with advanced workflow and color management. The new series comprises of Accurio Press C2070 & C2060 and replaces the bizhub PRESS C1070, C1060 high-end printing devices. Accurio Press combines the quality and performance of previous models with additional features to adapt to customer requirements and 14 ENTERPRISE IT WORLD
JUNE 2017
also helps in optimizing the processes and workflows in order to streamline customer print production. Accurio series is armed with industry leading technology and offers cost efficiency and HQ print outputs to help maximise profits. The series also comes packed with a host of modular tools including software and cloud based tools for integration, digital press suites, managing workflow etc.
NEWS BRIEF // IT WORLD
MANAGEMENT
MANTRA
Profitability is coming from productivity efficiency, management, austerity and the way to manage the business
Infosys, HP strategic alliance to drive transformation in retail
—– CARLOS SLIM, MEXICAN BUSINESS MAGNATE
Ola, Google drive transformational growth across India
Ola launched its Progressive Web App (PWA), a lightweight mobile website that offers users, especially in smaller towns and cities, an app-like experience on simple smartphones, requiring a fraction of the data used by native apps. Ola’s PWA will enable the use of its platform across hundreds of cities in India and addresses a significant market opportunity of customers and drivers. Announced at Google I/O developer conference in San Francisco, Ola is strategically leveraging cutting edge technology that has the reach of the web and offers a native-applike immersive customer experience. The PWA will overcome technological barriers to entry in key markets and make Ola the first ride-sharing platform in hundreds of cities across India, where there is limited connectivity and a prevailing use of low-end smartphones.
Ankit Bhati, Co-Founder and CTO, Ola, said, “The launch of PWA technology represents another milestone in Ola’s commitment to building innovative technology that is made for India. As the first ride-hailing app in the APAC region that is using PWA technology, this represents an important development that will enable us to reach an ever greater number of customers and driver partners in rural India.” “At Google, we are deeply committed to making the mobile web better for everyone. Our PWA journey began a few years ago and we are delighted to see the traction this technology has had, especially in mobilefirst countries like India. It’s exciting to see Ola create their PWA ensuring users have an engaging experience,” said Rahul Roy-chowdhury, VP Product Management Chrome, Google.
Infosys and HP recently launched a joint Retail Point of Sale (RPOS) and Enterprise Device as a Service (DaaS) solution to help businesses accelerate digital transformation as part of the HP Global System Integrator (GSI) Alliance Program. The joint RPOS solution offers a digital approach across the supply chain, enabling real-time collaboration between shoppers, retailers and vendors at the point of purchase, providing a true omni-channel experience. The joint Enterprise Device as a Service solution defines and delivers technology-enabled transformations that optimize how organizations acquire, manage and use devices with end-to-end services, enterprise applications, fleet reporting, analytics, insights and more. “Together, HP and Infosys can improve end-customer experience, while forging deeper, more valuable relationships with joint customers across industries, enabling them to embark on their own business reinvention journeys,” said Jon Flaxman, Chief Operating Officer, HP. “The launch of the RPOS and Enterprise DaaS solutions validates our joint vision with HP for revolutionizing the retail industry through constant innovation, and deep analytics,” said Sandeep Dadlani, President and Head of Americas, Infosys. “Digital transformation is being steadily embraced by businesses and as this transformation evolves further, we will continue our focus to create newer experiences across industry segments.”
JUNE 2017
ENTERPRISE IT WORLD
15
COVER STORY // SOPHOS
SYNCHRONIZED SECURITY:
THE NEED OF THE
HOUR FOR CIOs AND CISOs
Recent number of growing attacks directed towards Indian enterprises has given cybersecurity its deserved place as one of the biggest concerns of the corporate world. Heading Sales for Sophos in the subcontinent, Industry veteran Sunil Sharma talks about how enterprise boards are warming up to CIOs and CIOs, newer challenges as cyber - attackers advance their own skills and how synchronized security is the key to security for enterprises today. BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM
I
ndia Inc. has been witnessing phenomenal growth in the recent times. The economy is growing at a GDP of 7 % plus with massive projects being executed. With the rate at which this growth is taking place, digitization has been playing a very vital role in the economy. “Our Prime Minister Narendra Modi has been emphatically reiterating that digitization is a must for us to grow to the next league,” Sunil Sharma, VP - Sales at Sophos exclaims. In the corporate world, where this growth has been exemplified, cyber attacks have been on a perpetual upward track. As per a recent Geo-malware survey conducted by the SophosLabs it was observed that India is among the top 5 vulnerable countries in the world to malware attacks with a threat exposure rate of 16.9% which is a big number compared to global levels,” Sunil continues, “This is testimony to the fact that as to how our burgeoning economy, with an almost unparalleled growth is attracting cybercriminals and attacks from all over the world.” There has been no discrediting the fact that Indian corporates are becoming victims each and every
16 ENTERPRISE IT WORLD JUNE 2017
day as these cyber creeps target enterprises of all sizes. “In the last five years, this growth has come in a hockey stick pattern. We cannot blame the CIOs and CISOs as the organizations never had much focus on information security. The budgets for information security had been miniscule all the time.” As per Sophos, by and large there had been two fundamental aspects to enterprise security that had been major challenges to organizations. First and foremost, user awareness or rather the lack of it across all organization has been a major contributor towards such kinds of attacks being executed every now and then. “Bad guys will attack but how does the organization secure itself? Are you aware that a simple .doc file you receive in an email could be a phishing attack?” Sharma affirms. Joining user awareness in this task is the security infrastructure that these organizations have deployed. “The safety measures, the security solutions which all these major corporate have deployed; have they mitigated all those risks or are there still loopholes that may be exposing them to cyber-attacks?” Cybercriminals have been readily taking advantage of these
SOPHOS // COVER STORY
SUNIL SHARMA VICE PRESIDENT, SALES, SOPHOS INDIA & SAARC
“We cannot blame the CIOs and CISOs as the organizations never had much of a focus on the information security part. The budgets for information security had been miniscule all the time.”
JUNE 2017 ENTERPRISE IT WORLD
17
COVER STORY // SOPHOS
uncertainties in enterprise security. Are corporate on the right path today? Sharma believes organizations have started maturing in their approach when dealing with threats. “Enterprises are gradually realizing that information security is fundamental to any business operation. It is like a palace where the treasure hasn’t been locked and secured properly.” Enterprises have deployed a huge number of network storage devices. There has been complete digitization of infrastructures. Now, with the right understanding, they have realized the need to follow security practice as business practice to protect the precious data which is vital to them. They have understood that only then can their business be immune of such kinds of cyber criminals and their damaging attacks. “They are on the right path starting from performing audits to vulnerability assessment and management tests. This enables them in understanding what gaps exist and what are the areas they need to work on.” Enterprise security has transformed today with the availability of right capabilities and competent security professionals. Boards have started to give them a fair ear on budget issues. “This is happening now because businesses are concerned about the rising severity of data breaches. Cybercriminals have our CEOs more aware, whether it is manufacturing as an industry, or finance, hospitality or the IT/ITES. The trend is being witnessed across all kinds of verticals.This is certainly impacting how businesses approach security, including the high-risk and potentially sensitive area of securing corporate data. ”
transform CIOs and CISOs have been heading the security banner for enterprises. “Old setups using legacy platforms are generally silo-ed. It is impossible for sales teams to talk to people at all levels. Most of the times, we have been talking to the CIOs and CISOs only.” Sharma continues, “If you talk about the enterprise class of segment, people are very well aware. CIOs and CISOs willfully own up to the responsibility of securing data and infrastructure completely.” In the mid –market segment, the situation isn’t spot on. “They need to take precautionary measures and integrate the data and systems which are in silos to ensure that they have the specific output they are looking for.” However, as Sunil points out, things are improving. “We deal with pragmatic enterprise and midmarket segment quite a lot. My observation is that mid-market segment is becoming more aware nowadays. As the awareness is increasing and reaching CEOs and CFOs, it has become easier for CIOs and CISOs to get approval on security budgets.” Sophos witnessed this trend when a very famous recent virus breakout crippled hundreds of businesses globally. “Ransomware which has made whole world cry,” Sunil exclaims, “WannaCry has made a huge impact! We have had CIOs coming back to us and saying that now management has given a go ahead to IT security projects. Earlier the boards did not understand this type of an attack but the media coverage that this attack has received has made a lot of people understand as to what the meaning of ransomware is and why anti-ransomware solutions are the need of the hour.”
Security conversations as enterprises
Security, not just a product but a process
INDIAN CYBERATTACK LANDSCAPE 3.2mn
Rate at which attack percentage for India is rising
Credit card details compromised last October
17mn
Zomato users with names, email addresses and hatched passwords leaked
16.9% 13.5Cr. Number of citizens whose Aadhar details were leaked
18 ENTERPRISE IT WORLD JUNE 2017
1.4mn Pensioners personal details hacked from Jharkhand Directorate of Social Security website
and a practice From the perspective of the enterprises, the fact that they are not able to protect themselves against a malware is a major challenge. “There are different ports which are open with the end users, like, web ports, SMTP and HTTP.” A number of people in organizations today use social networking sites, something which has become fairly common with consumerization. “With LinkedIn, Facebook, emails coming in and going out; everything is available on the mobile. When you have such important information stored and there are a lot of ports open; cybercriminals can easily attack and enter into an enterprise network. This is a challenge from the technology perspective.” The remarkable thing in this context is that there are safety measures which are available for organizations but haven’t been proactively deployed. “This is a major cause of worry. If something has been happening in US and Europe, we need to do it proactively in our own environment here too.” Sophos cited a few recent examples that point straight towards this shortcoming that enterprises have to deal with. Security breaches like leaked Aadhar details of 13.5 crore citizens, 3.2 million debit cards which were compromised in October last year and personal detail of 1.4 million pensioners which hacked of a website run by the Jharkhand Directorate of Social Security are but a few famous ones. Very recently, Zomato which is the largest online restaurant guide had a security breach on May 18th and names, email addresses and hashed passwords of 17 million users was leaked. “Now you have WannaCry on top of it.” Sunil further reveals that a number of users from the lower strata are being attacked with phishing mails and ransomware. “This particular data is not being collated and collected. We don’t have a proper picture as to how many users have been impacted across India.” Synchronized security as a best practice for CIOs and CISOs Security today doesn’t just end on an anti-virus or a firewall. Newer kinds of threats have given two newer aspects of security and corresponding technologies like UTM, DLP, Endpoint and encryption. Often organizations have various solutions coming from different vendors. There is a perpetual communication gap in these solutions, vulnerability which cyber crooks have been happily taking advantage of. “Sophos has introduced the concept of synchronized security where your networks and endpoints share threat intelligence in real-time to combat cyber threats. We believe all CIOs and CISO should follow this concept. Enterprises have a lot of pin-point products in their infrastructure but none of the
SOPHOS // COVER STORY
products are talking to each other.” When we talk about synchronized security, it primarily consists of two things, the network security side and the endpoint security side. In endpoint security, you have different products starting from the advanced anti-virus and ransomware to encryption, endpoint security, DLP, UTM and mobile security everything put together. On the right hand side which is network security, you have access point, email, web, the complete UTM and firewall. It is vital that both these crucial interfaces work together as a system to ward off any potential cyber-attacks. “When you consider all these security products, there is a dire need to communicate and work together as a system. They need to ask each other if everything in the network is okay. This real-time communication or a Security heartbeat is a technology which was uniquely introduced and successfully executed by Sophos.” Sophos has been advocating this concept to its CIO community, urging them to adopt synchronized security technology to combat cyber-attacks. Sophos introduced InterceptX in September last year. This specialized offering has three components to it: anti-ransomware, anti-exploit and root cause analysis. “The recent Wannacry ransomware attack,” Sharma explains, “It had two components. One was the data encryption that came in combination with a worm kind of malware named EternalBlue. That malware was primarily a network-layered malware. This tries to enter into networks which do not have security against those kinds of variants available. It will enter into a network and compromise the end points.” InterceptX from Sophos has been able to check this malware’s capabilities. “If the customers have deployed InterceptX, the moment this malware will try to encrypt data, the solution automatically detects the problem. and reverses files back to its original state.” Sophos is confident that this solution will protect even if there is a new variable of the malware that comes along in future which has not yet been analyzed. “Even zero-day attacks can be stopped with Intercept X.” Sophos recently introduced a product called Phish Threat Simulator which is an educational tool for training people how to identify phishing emails. “We have executed it in house as well. We also ask the CIOs to make steps to ensure their users aware so that when they come across a malicious email they will know simply hit delete and remove it from their systems.” A substantial 25% of Sophos’ workforce is working in India of a total 3000 people which are globally present. “This is something which talks a great deal about our commitment towards the audience in India.” Boasting a large footprint in India, Sophos operates a Research & Development Center based out of Bangalore and a Sup-
SUNIL SHARMA VICE PRESIDENT, SALES, SOPHOS INDIA & SAARC
“With WannaCry, we dealt with a lot of customers and all customers that deployed InterceptX are safe today.”
port & Product Development Center based out of Ahmedabad. For Sales and SE operations, which is the cap worn by Sharma for Sophos India & SAARC, he heads an 82 people strong workforce spread across 17 cities. “I am a very sensitive guy and I wake up every morning proud of the fact that today I have the responsibility of protecting the precious data of my customers.” Sharma believes cybersecurity is like a policeman’s job in the physical world and the cybersecurity community should feel honor and pride in the work they are doing. “The revenue we are going to earn comes second. It is a passion for us to do this kind of a job for our customers. Customers who deployed InterceptX were completely protected from Wanna Cry or have been able stop ransomware in its tracks” Support from inside and out of the organization A number of organizations have been facing challenges lately because of the legacy products they have. There is an unwillingness to replace them because of budget issues. “When we launched InterceptX, this particular point was kept in mind. It works with any kind of anti-virus and security solution. It works along with all of our competing products as well, it can practically coexist.” IT security delivered and leveraged through the cloud “If a customer wants a reporting mechanism, we have Sophos Central which is a tool that gives integrated reports. It has proactive reporting and an automated response system. It’s not possible for CIOs and CISOs to go to each and every particular product and find out where the vulnerability is,” Sharma explains, “As a CIO; I would be looking for an automated response system. That
is what we offer with Sophos Central. The report is available in form of dashboards and they are customizable.” The industry, according to assessments from Sophos, has been striving to make security more consolidated and collaborative. Yet, even today a number of premium enterprise solutions lack the capability to work efficiently in tandem with our security solutions. “All products should have the capability to work with each other. As of today, such kind of facilities are not available. Having worked with the industry for a long time, I believe such collaborations are essential. Of course, there could be challenges in attaining the compatibility but we would love to have that in our portfolio while stepping toward the future.” Security for businesses with workforce in multiple cities Sophos believes that the right customers are the ones that have unbridled growth, which expands to multiple offices in different locations. With big enterprises having large presence across country, security is always going to be a huge headache. This is where Sophos comes into the picture, “You can absolutely trust Sophos. We have SEs based out of 17 branches across India. One of our USPs is that we do not have third party contract people. We have our own employees who are further working with our channel network of 2000 partners out of which we have Gold partners, Platinum partners and Distributors. If you add the channel resources - SE and sales teams, our channel strength and power will run into thousands. That is a formidable presence. Rest assured, no matter where you go; you will have solutions, deployment and support from Sophos.” Sharma further elaborates on the expertise of Sophos when it comes to providing secure soluJUNE 2017 ENTERPRISE IT WORLD
19
COVER STORY // SOPHOS
tions to infrastructure in multiple locations for enterprise customers. “Server protection from Sophos is one of the best in the industry and can be of great value to our customer. We cover all kinds of operating systems, not many vendors are able to offer it. In terms of business, we are growing better than the market. We intend to aggressively ramp up our end-user security business in India this year. Executing Proof of Concepts for CIOs & CISOs Sharma reiterates that Sophos, being a 100% channel driven company, has a policy to put the partner first in conversations with CIOs and CISOs. It is the partner ecosystem that performs demonstrations and PoCs for customer. “Our one hundred percent of our business is through our channel partners. With a well-established ‘Channel-first’ model, we help our partners wherever they get stuck while carrying out PoCs. It is our partners who lead the Demos and PoCs with the customers. Wherever a need arises, our SE steps in to troubleshoot.” Sharma continues, explaining his own ideology on which he has been able to build a lot of recent success for
Sophos, “We believe partners should be more selfreliant and self- confident. We want our partners to grow with us and this can only happen when they have confidence in us.” From the perspective of CIOs, addressing the issues in his organization and satisfying his queries is a joint responsibility of Sophos and its partners. “When our partners have the right capabilities, they deliver the training programs without any assistance from Sophos. Whenever help is required from us, we go along with the partners and deliver those programs.” Building trust within the customer community Sophos has a very niche position among a number of vendors plying their trade in cybersecurity. “Sophos is the only company which is focusing on the mid-market and pragmatic segment. What sets us apart from others is that we are much focused, in making security simple for our customers. Sophos remains committed to IT security, and we believe our focus gives us an advantage verses other players who often try to address multiple and unrelated areas of technology. Sophos is the only security vendor who has
SOPHOS’ CREDENTIALS Number of endusers secured and protected by Sophos
Growth rate of Sophos’ India business
$632mn
37.5%
50-50
Global worth of the company (As per 17th of May 2017)
2mn
Sophos global share in both endpoint and network security markets Countries and OEM partners providing real-time feed to Sophos Global Lab
2000
20,000
150
Gold, Platinum partners and Distributors in India
20 ENTERPRISE IT WORLD JUNE 2017
Number of partners in Sophos’ global channel ecosystem Sales and SE force from Sophos’ Partner ecosystem
3000
82
1000+
Total Sophos’ global workforce with 25% focused on India
people strong Sales and Support workforce spread across 17 cities
built a leading and balanced business at scale in enduser and network security. We continue to invest in technology and market leadership to support our security-only strategy, adding depth and breadth to our security portfolio through both organic development and where appropriate by targeted and disciplined acquisitions, reiterated Sunil. “Sophos has one of the broadest portfolios of cutting-edge Cloud-first technologies that they deliver to their customers. We are the only company enabling our customers to come on cloud first. All our new solutions are being launched first on Cloud. This demonstrates how customer friendly and cloud friendly company we are. Any customer from any place can easily move to the cloud and start using our solutions.” The flagship Sophos lab gets real-time feed from over a hundred and fifty (150) countries and OEM partners. “This speaks volume about our research and the quality of products which we are coming out with. Most of our products are part of Gartner’s leadership quadrant. As of today, we are protecting almost 100 million+ end users, which again talks big as to our customer capabilities around the globe. We serve across all market verticals starting from IT/ ITES, BFSI, Manufacturing, hospitality, etc. To serve these customers, we have 30,000+ partners globally.” The fact that Sophos conducts all its business through these partners helps in building the trust which lacks in security brands who partly do their business through partners and partly directly. “There is no trust in such an ecosystem.” Sophos announced its financial results recently on 17th of May. India has been a major driver to the growth of the company globally. “We are a $632Million company globally. In India, we have grown around 37 percent Y-o-Y (FY16) which I believe would be amongst the highest across all industry.” At the global level, in terms of revenue bifurcation, Sophos has an almost equal share in the endpoint security and network security business. We have approximate 50-50 % share in both endpoint and network security which is testimony to our leadership on both the sides.” As per Sharma, around eight thousand customers worldwide use Sophos’ signature-less anti ransomware solution. This is a substantial number in comparison to market statistics. “Our simple and effective partner program helps us deliver the best solutions to the customers,” Sharma summarizes, “Whether it is in terms of enablement, profitability or in terms of managing and moving security from one level to the next, we have an edge against our competition in almost all aspects. This is the primary reason why our stakeholders acknowledge and trust our strong force in Enterprise Security.”
UTSTARCOM // INTERVIEW
WITH STRONG LOCAL PRESENCE, WE ARE POSITIONED TO EFFICIENTLY WORK WITH CUSTOMERS DIRECTLY One of the fastest growing big economies, India is the second-largest telecom market in the world and the third largest market for 4G handsets. Already having a strong presence among domestic telecom operators, UTStarcom has big plans and high hopes of supporting the lightning fast pace at which networks in India continue to evolve.
“We have been working in India for long time and and have a strong presence with customers and partners including
TIM TI, CEO & DIRECTOR, UTSTARCOM
some of the largest telecom market players.”
What is UTStarcom’s current footprint in India? Do you have any expansion plans in the pipeline? We have been working in India for long time and have a strong presence with customers and partners including some of the largest telecom market players. We have multiple offices in different parts of the country to efficiently provide sales, deployment, and post-sales services to customers. Over the last decade we have seen massive deployments like the upgrade of staterun telco BSNL’s network. We are deeply involved iwith Indian telecom operators for deployment of Wi-Fi hotspots across cities. We have already deployed 14,000 access points for 3329 hotspots for BSNL. The company is planning the start of local manufacturin, followed by an EMS factory. We are finalizing selection and arrangements with a local partner. What global trends do you see coming to India in the near future? Rapid development of cloud services, streaming video and other bandwidth-hungry applications, as well as popularity of smart mobiles have been driving explosive growth of traffic recently. Adoption of new technologies including IoT, M2M, Smart City, etc. brings about a change in terms of very low latency, high service availability, energy
efficiency, etc. The coming of 5G in 2020 is going to address these issues in addition to promise of higher speeds and large capacity. We expect that initial deployments and tests of 5G technologies in India will start not much later than globally. ASDN and NFV technologies will address unprecedented programmability, automation, and network control for improved network flexibility, service agility, and extended feature set. Where do you see yourself positioned in the Indian smart city ecosystem? Where UTStarcom’s solutions in particular come into play: data collection and delivery requires 100% network infrastructure penetration both fixed line and wireless with use of smart, flexible, resilient and scalable telecom solutions that will be able to efficiently address the constantly growing need for traffic delivery and serve various existing applications and emerging technologies such as IoT and M2M. Our product portfolio serves telecom needs of smart city deployments from access to aggregation and core. Our access networking solutions offering for Smart City initiatives include multiple technologies both fixed line and wireless. The later is extremely important to provide ubiquitous connectivity regardless of location. The solution provides highly scal-
able transport network solution for number of applications including (1) mobile backhaul solution to facilitate implementation of full city mobile coverage by various mobile technologies, and (2) metro aggregation network for efficient data exchange between various elements of Smart City infrastructure, and reliable data delivery to Data Centres. How do you see Indian communications infra market shaping up by 2020? Thanks to several favorable factors including swift growth of economy, liberalization of telecom industry, strong govt support, we would expect Indian telecom market to continue growing at significantly high rates resulting in higher broadband penetration, improved service coverage and quality. In 2020, it is expected that commercial deployments of 5G networks will start worldwide, giving a huge technological boost to wide adoption of IoT driving upgrades of backhaul and transport infrastructures. On the other hand, we can expect major acquisitions and mergers on Indian telecom market to be finalized by that time, decreasing competitive pressure, improving profitability and allowing market players to focus their attention and resources on development of their telecom infrastructure. (To read full interview check www.enterpriseitworld.com) JUNE 2017
ENTERPRISE IT WORLD
21
FEATURE // SMARTCITIES
WANNACRY
HOW, WHAT AND WHY? With over 300,000 computers in 150 countries already infected and the numbers continuing to grow, WannaCry is turning out to be the biggest attack of its kind. Microsoft has released patch for its complete portfolio of operating systems but the threat is here to stay!
BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM
T
he menace of cybersecurity reached new levels when a new ransomware attack, unprecedented in magnitude, plagued computers across the world. The quickly spreading global virus, WannaCry was launched on Friday 12th May 2017. Being addressed by different names such as WannaCrypt WanaCrypt0r 2.0, Wanna Decryptor across the internet, the ransomware spread across servers and organizations in no time, becoming a nuisance in as many as 70 countries over the weekend. Although there has been wide-spread knowledge of the attack over the last two days, the ransomware is still active and has been spreading rapidly. Specific to Windows PCs, it has been encrypting information in affected PCs and asking a sum of 300 USD in Bit coins as ransom for the release of the information. Ram Punamaraju, CEO & CoFounder, Yitsol said, “The ransomware threat is a challenging one for the networks across the globe, spread through emails, the human element responsible for its spread is equally responsible for the threat to grow.” Microsoft has released patch for its complete portfolio of operating systems but with the enormity of the widespread window PC networks and the fact that most of them aren’t prompt in installing updates and patches, the ransomware has continued with its attacks across the globe.
HOW IT STARTED AND WHO IS BEHIND IT? In quite recent news, a league of black-hat hackers known as Shadow brokers broke into the servers of the National Security Agency, United States’ apex cybersecurity body. They leaked the US Spy agency’s hacking tools and vulnerabilities on public domain. One of these vulnerabilities, called Eternal Blue exploit, which relied on a SMB Exploit to hack into other connected / networked 22 ENTERPRISE IT WORLD
JUNE 2017
SUNIL GUPTA,
PRESIDENT AND COO, PALADION NETWORKS
“The creators of WannaCry have integrated this critical exploit into its worm module (initial dropper), thus taking advantage of the vulnerable instance of SMB protocol to propagate.”
PCs in a network. Like previous ransomware attacks, WannaCry spreads by phishing emails but also uses the EternalBlue exploit and DoublePulsar backdoor developed by the U.S. National Security Agency (NSA) to spread through a network which has not installed recent security updates to directly infect any exposed systems. According to John Miller, Sophos Threat Researcher, “Despite encouraging reports of waning threat activity, WannaCry continues to pose significant risks. Given this malware’s effective repropagation mechanisms, virtually any organization that hasn’t applied Microsoft’s recommended mitigation mechanisms is at potential risk of attempted WannaCry
SMARTCITIES // FEATURE
KARTIK SHAHANI,
INTEGRATED SECURITY LEADER, IBM ISA
“Enterprises constantly struggle to stay on top of regular patching cycles as this can impact day-to-day
operations in some cases.”
RAVI SHANKAR PRASAD,
SANJAY KATKAR,
“Kerala and Andhra Pradesh have been affected partly. We are keeping a close eye on the situation and strengthening our cyber
“India is getting hit hard by such attacks as India has a large number of Windows users who do
IT MINISTER, GOVT. OF INDIA
system.”
MD & CTO, QUICK HEAL TECHNOLOGIES MD & CTO, QUICK HEAL TECHNOLOGIES
not have proper security patches applied and rely on inadequate internet security.”
JUNE 2017
ENTERPRISE IT WORLD 23
FEATURE // SMARTCITIES
SUNIL SHARMA,
Bhaskar Bhaktavatsalu,
RAJESH MAURYA,
“It is imperative that businesses everywhere update operating systems,
“Businesses should ensure a backup is available that is not shared on the network and
“Organizations isolate infected devices immediately by removing them as
VICE PRESIDENT – SALES AT SOPHOS, INDIA & SAARC
their security software and educate their users against phishing attacks. This is a best practice to reduce the risk from any attack.”
propagation.” Trying to check the spread of the attack, a ‘critical’ patch was issued by Microsoft on 14 March 2017 to remove the underlying vulnerability for supported systems. Also, those still running exposed older, unsupported operating systems were initially at particular risk, such as Windows XP and Windows Server 2003, but Microsoft has now taken the unusual step of releasing updates for these.
WHAT IS THE IMPACT? WannaCry has infected more than 300,000 computers in over 150 countries already. The software is capable of demanding ransom payments in the crypto currency Bitcoin in 28 languages which answers its viability as a global attack. Top security agencies like Europol have described it as ‘unprecedented in scale’. In its initial stages, the virus affected Telefónica and several other large companies in Spain, as well as parts of Britain’s National Health Service (NHS), FedEx, Deutsche Bahn, and LATAM Airlines. Around the same time, similar targets in at least 99 countries were also reported to have been compromised. Specific only to Windows PCs, WannaCry appears to travel across corporate networks, spreading quickly through file-sharing systems. 24 ENTERPRISE IT WORLD
JUNE 2017
MANAGING DIRECTOR, INDIA AND SAARC, CHECK POINT SOFTWARE TECHNOLOGIES
block encrypted password protected attachments from email gateways.”
Kartik Shahani, Integrated Security Leader, IBM ISA said, “The incident could have been avoided if critical patches were applied in time throughout companies across all industries. Enterprises constantly struggle to stay on top of regular patching cycles as this can impact day-to-day operations in some cases. Companies will need to have an incident response plan in place to quickly recover and also ensure that employees, suppliers and others who work with them receive regular security training.” Sunil Gupta, COO, Paladion Networks added, “The creators of WannaCry have integrated this critical exploit into its worm module (initial dropper), thus taking advantage of the vulnerable instance of SMB protocol to propagate.” The corporate computers are typically controlled by IT departments that choose when to send updates to computers. So if one computer is vulnerable, it’s likely all the computers on a corporate network are too, making it easy for WannaCry to have a large impact. It has further been analyzed that networks of computers, like schools, companies, hospitals and businesses, are particularly vulnerable. That’s because security researchers say the ransomware is spread through standard file sharing technology used by PCs called Microsoft Windows Server Message Block or “SMB” for short. It also appears able to spread
REGIONAL VICE PRESIDENT, INDIA & SAARC, FORTINET
possible to prevent ransomware from spreading to the network or shared drives.”
to other computers outside corporate networks. Researchers have already found variants of the attack, so there isn’t just one way it works Although CERT-In has come out saying that it has not received any formal report of cyber attack on India’s vital networks by Wanna Cry, reports are doing rounds that India might be among the worst affected countries from the ransomware attack. There have been unconfirmed reports that the Indian government has shut down some ATMs all over the country as a preventive measure against the cyber attack. According to the reports Automated Teller Machines (ATMs) are highly vulnerable to such malware attacks, with most of them presently running on old versions of Microsoft’s Windows OS. This makes a software security patch update a necessary exercise for the total of 2.2 lakh ATMs in India, of which many old ones run on Windows XP. Sanjay Katkar, MD & CTO, Quick Heal Technologies said, “Cybercriminals are not discriminating while attacking and spreading malware. India is getting hit hard by such attacks as India has a large number of Windows users who do not have proper security patches applied and rely on inadequate internet security.” IT minister Ravi Shankar Prasad said, “Kerala and Andhra Pradesh have been affected partly.
SMARTCITIES // FEATURE
SANTANU GHOSE,
STEVE MCGREGORY,
“An adaptive trust approach allows IT to define more personal policies that are mapped to individuals or groups
“If an organization has not backed up critical data, which exclusively resides on the systems affected
We are keeping a close eye on the situation and strengthening our cyber system. In two village panchayats of Kerala, computers were hit with messages demanding USD 300 in virtual currency to unlock the hacked files.” As MHA officials closely monitor the situation, the Reserve Bank of India (RBI) has issued an advisory asking all banks to ‘put in place a software update at ATMs to prevent their systems from a malware that has attacked payment systems across the world.’ Quickheal received over 700 distressed calls regarding the spread of this ransomware. Among the attempted attacks by the malicious WannaCry ransomware, 60% were targeted towards enterprises and 40% towards individual customers. The top five states with maximum detections are West Bengal, Maharashtra, Gujarat, NCR (Delhi), and Odisha.
down procedures for ensuring patch management has taken a severe beating. MS17-010 has been provided as an update globally. As a special oneoff case, Microsoft has also released the update for XP and 2003 operating systems. Security players have been trying to educate their customers. Indian Computer Emergency Response Team (CERT-In) has also come out with a list of do’s and don’ts and webcast on how to protect networks from the global ransomware attack.
DIRECTOR NETWORKING, ARUBA A HP ENTERPRISE COMPANY
that share similar roles and business objectives.”
TIPS TO SECURE YOUR PC From the enterprise perspective, when vulnerabilities exist and patches are made available, it is the responsibility of the Security Administrators to patch up the systems under their control. Microsoft had released a patch MS17-010 way back in March to address this security threat. It has been proved beyond doubt that Security Administrators and the entire process of reviewing the laid
SENIOR DIRECTOR OF APPLICATION THREAT INTELLIGENCE AT IXIA
by an attack, the costs could be considerable.”
Following are some tips with which you can safequard your PC from WannaCry:
• Download and implement MS17-010 patch, which can be found over here: https://technet. microsoft.com/en-us/library/security/ms17-010. aspx • Block executable files from being transmitted via eMails. • Isolate the affected system from your Network. • Restore the encrypted files from the backup or from system restore point (if enabled).Don’t enable macros in documents received as attachments via email. • Do not open attachments if received from
SHARDA TICKOO,
TECHNICAL HEAD, TREND MICRO, INDIA
“When cyber attackers attack a system, and ask for ransom, it is a very
difficult to trust that the files will get encrypted as they are not a legitimate organization.”
unsolicited source. • Deploy and maintain a backup solution. • And last, but most important, protection of Mail server at Gateway Level with Mailscan to prevent delivering of such suspicious emails The information provided above will help you to protect your system from being victim of Ransomware.
FINALLY, The WannaCry ransomware attack has once again confirmed the balance of power in the cybersecurity domain. It has reiterated the fact that cyber security is neither a one off practice nor is it a guarantee from any and every attack. It is a well known fact that cyber attackers are always one step ahead of the security companies and this is a well established fact. The key to security is a gradual unending process, which is collaboration between the enterprises and security vendors. As Budiman Tsjin, Senior Technical Consultant, Asia, RSA said, “It is important to detect and find out which machines have been infected and how bad is the spread of the infection. If you have not, better start documenting detection controls and response procedures for ransomware. This threat is here to stay and will continue to evolve and impact our lives significantly.” JUNE 2017
ENTERPRISE IT WORLD 25
FEATURE // SMARTCITIES
INDIAN SMART CITIES:
A POOL OF
IT OPPORTUNITIES As Modi Government’s most dynamic initiative gains momentum, the investments and efforts are surging at both Public and Private fronts. With the numbers going into billions and colossal plans for transforming 100 cities, stakeholders have been innovating and expanding their portfolios to make the most out of this opportunity. 26 ENTERPRISE IT WORLD
JUNE 2017
SMARTCITIES // FEATURE
BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM
W
ith the growing significance of technology in all walks of life, urban India has seen a surge of population in recent times. The growing sizes and influence of cities on a country’s scale of progress made upgrade of infrastructure and digital transformation of services imperative. To this views, the Central government led by PM Modi set across a rather futuristic and ambitious urban development agenda. The PM’s signature program, called the Smart Cities Mission, aims to improve the quality of life in 109 of India’s fast-growing urban centers. For this sole purpose, the government has put aside a budget of $7.5 billion to the Mission. The core aim of the project is to make these cities citizen friendly and sustainable through the use of technologies like Analytics, IoT, Sensors, video surveillance and by promoting citizen engagement.
THE SMART CITY VISION With increasing urban population and rapid expansion of areas, operators are looking at smarter ways to manage complexities, increase efficiencies and improve quality of life. This has created need for cities that monitor and integrate infrastructure to better optimize resources while maximizing services to its citizens. Many players are beginning to see this as an opportunity to adopt new smart city solutions and insights from IoT that will help make communities a better place to live. In fact, the goal of smart cities is not just limited to enabling the citizens of the nation to become digitally enhanced and enable them with the access to the latest innovations. “While the govt. will contribute a substantial amount to finance these projects, it is estimated that the mission will require about USD 150bn investment from private sector.” – Vishal Agrawal, Managing Director, India and SAARC, Avaya Smart City projects will need the creation of infrastructure – physical, digital, social – influencing the provision of every service in the city. The key focus is on mobility, sanitation and hygiene, energy and water management, communications and connectivity and citizen engagement. These initiatives will ease the daily life of residents, provide better amenities, and improve livelihoods and sociocultural environment.
MARKET OPPORTUNITY AND GROWTH DRIVERS As per estimates from industry experts, the IT opportunity is being projected at around $25 million per city. According to Nasscom, the government’s initiative can create business opportunity of over $30-40 billion for the IT sector over the next 5-10 years. Government of India has committed to spend US $1 Billion on 100 smart cities over the next 5 years. As per Brocade’s George Chacko, “The 100 Smart Cities project, aimed at helping transform India into a country of digitally connected cities, is offering immense opportunities to IT companies. IoT and machine to machine (M2M) will play key roles in the evolution of the smart
cities. M2M establishes intelligent communication between IoT devices, providing online data gathering, remote control and process automation. They can report on the status of IoT devices and sensors being monitored via the internet and enable intelligent, real-time decision-making for an array of services, such as traffic lights, parking and energy usage.” HDS’ SrinivasRao supports the idea saying, “The government’s Digital India vision is expected to drive the country into its next phase of digital growth. Both Smart Cities and Digital India projects are creating new economic and social opportunities for IT players to provide technology solutions to make the Digital India vision a reality.” Vishal Agrawal, MD, Avaya, India and SAARC said, “An all-encompassing initiative which enunciates a clear action plan for ‘Digital India’ encapsulating last mile internet connectivity, better access to services, as well as IT skills development of local talent- the program shows the government’s visionary approach to transform India into a connected knowledge economy while offering world class services.”
PUBLIC-PRIVATE COLLABORATION IS IMPORTANT An industry report from Deloitte in 2016 suggested that an overall investment of US $150 Billion will be needed, most of which will have to come through private sector investments. In a nutshell, India’s Smart City plan is part of a larger agenda of creating Industrial Corridors between India’s metropolitan cities. As HDS’ Rao points out, India has also been inviting foreign partnership in developing the smart cities and has signed deals to build eight cities — three with Germany, three with the US, and one each with Spain and Singapore. The participation of the private sector is very crucial and few of the private players are already in collaboration with the government.” According to the Urban Development Ministry data, 11 projects worth Rs.935.93 Cr of the 167 projects amounting to Rs.12000 Cr under JUNE 2017
ENTERPRISE IT WORLD 27
FEATURE // SMARTCITIES
tions. He states, “One of the key concerns with regard to the execution of the Mission arises from the public private partnerships in project execution. While the government will contribute a substantial amount to finance these projects, it is estimated that the mission will require about USD 150 billion investment from the private sector. This investment will be used in the development of sophisticated technologies such as IoT and M2M. The government need to ensure a stable and predictable regulatory environment including a re-visit of information technology laws.”
VISHAL AGRAWAL,
MANAGING DIRECTOR, INDIA AND SAARC, AVAYA
“While the govt. will contribute a substantial amount to finance these projects, it is estimated that the mission will require about USD 150bn investment from private sector.”
SMART CITIES IN NUMBERS: Total Winning Proposals: 60 Total Urban Population Impacted: 72,266,232 Total Cost of Projects (Cr.): 131,762 Total Area Based Development Cost (Cr.): 105,621 Total Pan City Solution Cost (Cr.): 26,141 Total Number of Projects: 731 Total Cost of Projects (Cr.): 46,366
MAJOR SECTORS FOR TECH DEPLOYMENT: • • • • • • • • • • • • • •
Water Supply Energy Sewerage &Septage Solid Waste Management Storm Water Drainage Urban Transport NMT Housing IT Connectivity Social Sectors Environment Economic Development Area Development Safety and Security
28 ENTERPRISE IT WORLD
JUNE 2017
SRINIVASRAO,
SALES DIRECTOR, GOVERNMENT SECTOR, HITACHI DATA SYSTEMS, INDIA
“Organizations wanting to be associated with
projects are applying predictive and prescriptive analytics to support new wave of intelligent public transportation systems.”
public-private partnership model have taken off so far. Another 21 PPP projects worth Rs.2622.23 Cr are at various stages of tendering process. The involvement of private players will help in establishing creative clusters/ creative districts through consultancy and effective planning. “Organizations wanting to be associated with projects are applying predictive and prescriptive analytics to support new wave of intelligent public transportation systems.” – SrinivasRao, Sales Director, Government Sector, Hitachi Data Systems, India Dr. Sumit D Chowdhury, CEO & Founder, Gaia Smart Cities opines, “Public- Private Collaboration is essential at many levels. At the most basic and crucial level, financing with required partnerships and operations will require governmental and non-governmental organizations to collaborate. This can be taken down to the level of citizens. Private sector firms can start entrepreneurial ventures to build new age solutions. They can come together to build local level infrastructure and behaviour change through CSR activities. Private sector firms can also enable engagement with citizens to enable transparency and use feedback mechanisms to improve quality of delivery.” Avaya’s Vishal Agrawal delves further and addresses the risks involved with such collabora-
LOOKING AT SMART CITIES ACROSS THE GLOBE Gaia’s Dr. Chowdhury explains, “There is a lot of commonality in the provision of basic infrastructure and services. India would do well to look at other Asian cities that have similar high urban densities, economic disparities, and because they are newer, have higher inclusion of new age and environmentally sustainable technologies when compared with cities in developed nations. Avaya’s Vishal Agrawal adds, “Smart Cities are about enabling new services to better service your population. This is about making your city safer, offering new services while enabling consumers to use to drive net new revenues or in some cases focused only on providing a better experience to visitors and tourists.” HDS’ SrinivasRao believes transportation upgrade is synonymous with Smart Cities and a big part of the deployments across the globe. “Public Safety Solutions support Frontline Smart City cases with real-time Internet of Things, advanced analytics, video monitoring and application management. Organizations who want to be associated are now applying predictive and prescriptive analytics to video and analytics to support new wave and intelligent public transportation systems.”
DEPLOYMENTS AND PROJECTS IN PIPELINE On the deployment front, Avaya has been closely working with two State governments in UP and MP to implement an emergency response system which has been updated with faster response time. Avaya is in further discussions with 10 other different State govt. representatives for implementation of this system. Vishal Agrawal elaborates, “For Avaya in India, government projects are major growth drivers, with 15-20 per cent of revenue coming from government projects today, and that number expected to go up to the as much as 30 per cent in the next 18 to 24 months.” Gaia leverages technology to enable cities to deliver new services, monitor and improve operational efficiencies for existing services, develop
SMARTCITIES // FEATURE
GEORGE CHACKO,
DR.SUMIT D CHOWDHURY,
“While urban India is moving fast with tech advancements, the
“At the most basic and crucial level,
PRINCIPAL SYSTEMS ENGINEER & LEAD TECHNICAL CONSULTANT, BROCADE INDIA
vision of 100 smart cities will require rapid transformation across length and breadth of the nation.”
CEO & FOUNDER, GAIA SMARTCITIES
financing with required partnerships and operations will require governmental and nongovernmental organizations to collaborate.”
SHORTLISTED CITIES: Phase 1 1. Bhubaneswar 2. Pune 3. Jaipur 4. Surat 5. Kochi 6. Ahmedabad 7. Jabalpur 8. Visakhapatnam 9. Solapur 10. Davangere 11. Indore 12. New Delhi 13. Coimbatore 14. Kakinada 15. Belgaum 16. Udaipur 17. Guwahati 18. Chennai 19. Ludhiana 20. Bhopal
Phase 2 1. Lucknow 2. Warangal 3. Dharamasala 4. Chandigarh 5. Raipur 6. New Town, Kolkata 7. Bhagalpur 8. Panaji 9. Port Blair 10. Imphal 11. Ranchi 12. Agartala 13. Faridabad
Phase 3 1. Amritsar 2. Kalyan 3. Ujjain 4. Tirupati 5. Nagpur 6. Mangalore 7. Vellore 8. Thane 9. Gwalior 10. Agra 11. Nashik 12. Rourkela 13. Kanpur 14. Madurai 15. Tumakuru 16. Kota 17. Thanjavur 18. Namchi 19. Jalandhar 20. Shimoga 21. Salem 22. Ajmer 23. Varanasi 24. Kohima 25. Hubli-Dharwad 26. Aurangabad 27. Vadodara
citizen engagement and feedback platforms and improve overall quality of life for citizens. Dr. Chowdhury states, “We have worked with 14 cities in preparing their Smart Cities Challenge proposals and provided ICT and network strategy as part of the city infrastructure vision. Of these, 8 cities have been selected among the 60 whose plans have been approved by the government. In the next stage of the Smart Cities Mission, Gaia is working with a few cities as part of the Program Management Unit and an implementation partner. Also, we have designed the “smart infrastructure” for a new green field township being developed by Tata Steel in Kalinga Nagar in Odisha, working in partnership with urban planning firm RJB Associates.” Hitachi’s digital technologies are providing real-time, aggregate and contextual data, supporting public safety initiatives which will transform law enforcement to prevent crimes and ultimately make cities safer. Hitachi’s Video Management Platform (VMP), an appliance-based solution also comprehensively manages all video data, offering rich data integration management and visualization for video applications. We have been leveraging the power of Hitachi and combining them with our IT platforms to make society better. Many projects like the ‘MyGov’ initiative, e-Procure, e-courts and Central Crime Research run on HDS platforms,” comments Srinivas.
FINALLY, Analyzing the progress, with the recent series of deployments and Govt. push catalysing projects, it is expected that the 109 shortlisted cities will have a decent basic infrastructure in place. The first few transformations will be seen in traffic mgmt, city lightings, energy mgmt, citizen engagement etc. While urban India is moving fast with technological advancements, the vision of 100 smart cities will require rapid technological transformation across the length and breadth of the nation. Technological advancements would also give rise to an immense magnitude of data, the security and sovereignty of which, would pose a challenge in keeping the smart cities resilient. The transformation of old infrastructure into smart and well-connected systems with real time updating ability will be the big challenge with smart cities. Also challenging will be limited budgets.The Smart City initiative has opened up huge opportunities for technological advancements of the country. This has further led to spur in employment and has enhanced the quality of living of the citizens as well. Empowering a city technologically is not a new concept, but to earn Smart City Stripes is bigger challenge than just upgrading a city’s ICT infrastructure. JUNE 2017
ENTERPRISE IT WORLD 29
INTERVIEW // BROCADE INDIA
SOFTWARE-DEFINED STORAGE IS THE LOGICAL NEXT STEP As enterprises far and wide undergo digital transformations, the demand for better storage technologies has sky rocketed. Brocade’s Anuroop Gupta talks about the enterprises’ needs today and how newer technologies are redefining storage architectures. How have enterprise digital transformations impacted storage infrastructures? With increased digitization, there is an accelerated demand for immediate access to information, forcing IT departments to focus on modernizing 30 ENTERPRISE IT WORLD
JUNE 2017
their core IT infrastructures. Large and small businesses are increasingly moving to flash-based technologies to create faster, more responsive IT environments. Flash is more than raw performance – it’s being deployed in high capacity storage arrays supporting low latency applications
in a shared data environment. NVMe over Fabrics is a new industry standard announced last year that dramatically reduces latency and eliminates the need for SCSI translation, by directly transferring NVMe commands and structures across an existing network. NVMe over Fabrics is poised
BROCADE INDIA // INTERVIEW
ANUROOP GUPTA,
COUNTRY MANGER- SAN BUSINESS, BROCADE INDIA
“Flash will change the way companies do business by dramatically speeding application performance and
improving efficiency.”
to extend the low-latency efficient NVMe block storage protocol over fabrics to provide largescale sharing of storage over distance. NVMe over Fabrics maintains the architecture and software consistency of the NVMe protocol across different fabric types, providing the benefits of NVMe regardless of the fabric type or the type of non-volatile memory used in the storage target. What are the latest global trends in storage networking industry? The newest and most exciting storage advancement today is flash-based storage. The unprecedented speed and rapidly increasing cost-effectiveness of flash-based products are dramatically accelerating datacenter transformation. Ethernet storage not only helps customers maximize the ROI of existing investments, it also dramatically simplifies storage management. With the scalability to meet business and storage requirements, Ethernet can solve the challenges of rapid data growth by enabling a cost-effective storage solution that can support deployment and management as the storage network evolves. Software-defined storage (SDS) is the logical next step of the software defined data center. By employing SDS, organizations are able to separate and abstract storage elements, as well as combine storage elements and capabilities providing storage solutions/services. Data de-duplication will help reduce the time required to back up all the data and is relevant to large organizations that have similar kind of data being handled in various physical storage devices. The other trend to be noted is that public cloud is often touted as a more scalable and cost-effective than on-premise solutions. In 2016, as more enterprise IT departments wrestle with massive data workloads generated from corporate video marketing, virtualization and IoT, they will also turn to on-premise cloud storage to get the job done quickly and on-budget. How significant is the role of networks in storage? Can you
elaborate? Storage networks provide a centralized repository for digital data that can be accessed by many users, and they use high-speed connections to provide fast performance. The benefits of storage networking can include improved performance, reliability and availability. It can enable greater collaboration among workers, and it can simplify some IT management tasks. Storage networks also make it easier to back up data for compliance and disaster recovery purposes. In addition, they can free up valuable server CPU cycles for more important tasks. A storage network solution can protect company’s data from user error and malicious intent, theft, natural disasters and system failures. Storage network lets enterprise easily add new storage resources anywhere across the enterprise — one can plug in a new box or slot in new disks without ever powering down a server. IP Storage network delivers predictable performance, provides security for storage data flows between data centers, contains failure domains, and maximizes uptime. These attributes are essential for managing growth, mitigating risk, and reducing costs. How is Fiber Channel innovation helping enterprises derive more value from their applications and infrastructure? Fibre Channel is a viable and vibrant storage networking technology that has demonstrated its value over time, and is now the most widely deployed storage network infrastructure for virtualization, cloud, and mission-critical applications. Fibre Channel is the most widely deployed storage networking infrastructure for server and storage virtualization. In fact, Fibre Channel has been an integral part of every wave of storage advancement in the data center. Fibre Channel drives the world’s economies with the most trusted and widely deployed network infrastructure for storage. Thirty billion transactions go through Fibre Channel each day and 96 percent of the world’s banks, airlines and retailers rely
on Fibre Channel. FC may lack some reusability for networking purposes other than storage, and require in-house expertise, but the fact that FC was purpose-built for data storage, doesn’t drop data packets and offers Linux drivers that have been around for more than a decade. Fibre Channel has long been a prime choice for enterprises in need of a high-speed interconnect for SANs. What are the features of Brocade G610 switch and how does Brocade plan to target the market with Brocade G610 switch? Brocade G610, a no-compromise storage switch for always-on connectivity to the all-flash data center. The Brocade G610 is an entry-level switch designed for a variety of environments ranging from small shared storage fabrics to network edge deployments in data centers. This breakthrough switch leverages the power of Brocade Gen 6 Fibre Channel technology, providing up to 32 Gbps performance, unmatched simplicity and enterprise-class functionality that helps organizations adapt to dynamic workloads and new demands for always-on business operations. To support their ever-evolving storage environments, organizations can start with eight ports and grow on demand with up to 24 ports per switch. In addition, the Brocade G610 switch is easy to use and install, with a point-and-click user interface that simplifies deployment to save time. What is your advice to CIOs looking to advance their storage infrastructure to enable enterprise-wide digitization? Today’s flash technology, coupled with the trend to virtualize servers, is changing the way storage is designed into systems. The good news is that flash-based storage is evolving rapidly and getting much faster. Flash will change the way companies do business by dramatically speeding application performance and improving efficiency. The speed of flash is critical to accelerating application performance and throughput. To deliver the speed of these new flash devices, non-volatile memory express (NVMe) is emerging as a new storage protocol that will drive massive performance gains. NVMe is brand new protocol designed specifically for the needs of higher core, faster processors that run the latest generation of high-speed applications, while unlocking the latent value of faster storage media such as NAND flash SSDs. NVMe was built explicitly for flash which provides both flexibility and compatibility, while removing complexity, overhead, and latency. Benefits of NVMe-based storage drives include lower latency, additional parallel requests, and higher performance. JUNE 2017
ENTERPRISE IT WORLD
31
INTERVIEW // IXIA
VISIBILITY AND CONTROL OVER THE NETWORK HAS BECOME CRITICAL
As networks rapidly expand and cyber threats continue to evolve, Enterprises have increased the emphasis on network visibility with more and more organizations realizing the need for appropriate solutions to prevent security failures and translate network insight into clear business value and derive superior ROI.
How has network visibility grown in significance in today’s enterprise infrastructure? Most enterprises today are struggling with network blind spots caused by increase in encrypted traffic on their networks and migrations to public and private cloud environments. They also need to get better visibility across their rapidly-expanding network estates to address performance issues 32 ENTERPRISE IT WORLD
JUNE 2017
and mitigate threats. The reality is that security and analytics tools are only as good as the data they are seeing. The only way to truly address these common and widespread challenges is with a strong visibility architecture. What are the factors driving growth and innovation in the technology? What are some of the global trends
around network visibility? Throughout 2017, we will see an increased emphasis on network visibility, and by 2018 approximately 60 percent of the enterprises implementing the appropriate network visibility will experience fewer security failures. Organizations are moving to a cloud-based environment and they must prepare for the security and control risks associated with the cloud. Organization’s
IXIA // INTERVIEW
BRENDAN LEITCH,
HEAD OF MARKETING, ASIA PACIFIC, IXIA
“Organization’s operations are dependent on an environment with a huge visibility gap, and they are now realizing that
this has to change to keep their data secure.”
operations are dependent on an environment with a huge visibility gap, and they are now realizing that this has to change to keep their data secure. What is the current market size of visibility solutions in India? Where does the Indian demographic stand compared to global market? The market forecast for the NVM sector has been scaled back to reflect a more specific crosssection of the market, representative of industry consolidation, network virtualization and the growth of substitute functionality from networking vendors. Globally, we now anticipate it to grow to over $1.6bn by 2019. India should rank amongst top 10 markets in terms of consumption of such technology. We have a fairly developed financial sector, telecom players and more data centers – upcoming and in place. Within Asia we are expecting India to be our top 3 markets. Enterprise network visibility is quickly becoming a top concern for CIOs. What factors are influencing this change in IT strategy? Enterprises have specific needs to secure and manage the nervous system of their IT infrastructure —which is their network. Network visibility helps ensure application performance because most applications are highly dependent on the network. Compliance, auditing, and security requirements demand visibility into how IT resources interoperate, and network visibility is required to gain insights into how well they are functioning. If IT organizations do not have complete network visibility, resulting blind spots may lead to missing critical security threats and availability or performance anomalies. The use cases that require complete visibility include the introduction of BYOD devices, unknown network devices, and integration with a multitude of security tools. In all cases, missing a complete view of the network can lead to mistakes in criti-
cal IT and business decision making, leaving the enterprise open to security vulnerabilities, as well as poor application and network performance that could be detrimental to revenue generation or even cause reputational damage stemming from security breaches. ESG research has shown that network security and performance are among the critical challenges reported by IT decision makers today. By implementing solutions offering modern network visibility, IT organizations can translate network insight into clear business value and derive superior ROI from these solutions. How has cloud changed the approach to network visibility for enterprises? Organizations in every market sector, even those not typically associated with technology, are migrating to the public cloud. This trend is growing because of the increased flexibility and agility the cloud offers. Whether these applications are web servers or critical business apps, they must ensure the same level of performance, security, and compliance available in their traditional data centers. In a traditional datacenter, these needs are met with robust tools in combination with a zero-packet-loss, application-aware visibility network. In the public cloud, access to packet data is limited, but needs for visibility remain—including the need to see active threats, monitor applications, and diagnose problems. Every CIO/CTO have cloud on their top 5 agenda and so is security. Now, for any public, private or hybrid cloud deployment to be successful the IT leaders want full access and control on the means of security. Ixia’s CloudLens Public helps proving such visibility on private cloud. We integrate with the likes of AWS etc to help clients provide monitoring solutions on public cloud. What are the major sectors where you see big opportunity network visibility technologies? How crucial is network visibility in Government projects
like smart cities? Government organizations, telecom companies, and financial institutions are the key verticals adopting network visibility. It’s no secret that government networks are among the most targeted. The stakes are high, and attackers know they must use more evasive tactics to penetrate these networks. Attacks on government networks can lead to tremendous loss, whether of strategic, political, monetary or intelligence value.Attacks on telecommunication operator’s network could also scale up to other networks through the interconnection interfaces. The intruders can, therefore, gain access to their targets irrespective of the geographical location. They use highly sophisticated arsenals, not leading to physical destruction, but stealing organizational and personal sensitive information for financial benefits, competitive advantage, and state-sponsored attacks. Networks are becoming complex with IoT being embedded across all city functions in a smart city. To tackle that, there is a need to intelligently route traffic and use underutilized network resources. Visibility and control over the network has become critical. Network infrastructures need to embrace open source software-defined networking (SDN) components to be able to support the highly mobilized and virtualized environments faced by smart cities. Having more network control via open SDN will allow developers to innovate independent of hardware and software. The ability to build new products or services has increased dramatically. By keeping SDN open, the challenges faced in building a smart city can be collectively overcome from a larger R&D effort. What should a CIO look for when procuring new network visibility solutions? Where do Ixia’s offerings slot in the scheme of things? While procuring new network visibility solutions, CIO’s must have a clear understanding of the key gaps in information security capabilities. It is equally important to make sure the intended product & solutions will meet the business objectives. Visibility is achieved through a blend of people, process and technology. Many times the solution that is obtained has numerous dependencies in order to be effective. The visibility solution may require a specialized skill set or significant integration work before there is noticeable value derived from the purchase. Ixia offers the most expansive visibility product portfolio available that ensures the right data gets to the right tool at the right time, creates fail-safe inline security tool deployments and validates active SLA and customer experience monitoring. JUNE 2017
ENTERPRISE IT WORLD 33
THE STUFF // PRODUCTS & SERVICES
TP-LINK
ZYXEL
TP-Link AC1200 Wi-Fi Range Extender RE305 Zyxel WRE6505 v2 AC750 Range Extender
The RE305 look slick and modern, sporting a silver body. The overall build quality and finish is improved from early products. It is quite fast and takes just a few seconds to set up. The device boasts two bands, having a 2.1GHz
network capable of speeds of up to 300mbps, and a 5GHz channel with speeds of up to 867mbps. RE305 also has an Ethernet port on the underside which allows you to connect wired gadgets too. An indicator light on top tells you if the
extender is too far from the router. Usage-wise, RE305 is reliable and feels quality – true to what is expected from TP-Link. The device is small and thin enough to fit almost anywhere and in any socket. All in all the RE305 is a
With its apt dimensions Zyxel WRE6505 fits almost anywhere. It easily extends fast 802.11ac Wi-Fi networks to dead spots, eliminating spots with poor wireless signals in offices or homes. Zyxel WRE6505 boasts three selectable extending modes for faster, wider wireless coverage. The Normal Mode extends range on both 2.4 GHz and 5 GHz bands for best of both speed and range for day to day needs. Range Mode extends only the 2.4 GHz band and gives the maximum wireless coverage from upper router. Speed Mode extends only the 5 GHz band for better wireless performance. WRE6505 boasts signal strength light for the best installation spots and features ease of access with Sync Wi-Fi settings with Zyxel ONE Connect mobile app.
compact yet efficient Wi-Fi range extender that installs seamlessly, is user-friendly and is true to its function, giving a fast and expanded wireless experience.
PRICE: On Request, WARRANTY: On Request, CONTACT: sales@zyxel. com.tw
PRICE: On Request, WARRANTY: On Request, CONTACT: http://www.tp-link.in/products/details/cat-10_RE305.html
NETGEAR
B Y S A N J AY @ A C C E N T I N FO M E D I A . C O M
NETGEAR NEW ARLO Q PLUS CAMERA NETGEAR is addressing the security needs of small businesses with the launch of its Arlo Q Plus - 1080p HD Security Camera with PoE (VMC3040S). Arlo Q Plus has indemand features such as: brilliantly detailed 1080p high-definition video, two-way audio, rolling seven days of free cloud storage for video recordings — and now also offers wired Ethernet connectivity that supports Power over Ethernet (PoE). In addition, Arlo Q
34 ENTERPRISE IT WORLD
JUNE 2017
Plus has a Micro Secure Digital (Micro SD) memory card slot for easy local recording backup to continue recording in the event of a network interruption. Arlo Q Plus brings the simplicity of a DIY smart home product to small and medium business owners, providing an ideal solution for tracking aroundthe-clock activity within shops and offices, at building entrances, in storage rooms, on loading docks, and by cash registers.
KEY CAPABILITIES… • Detailed 1080p HD video with built-in night vision capabilities • Multiple connectivity options with dual-band N600 WiFi, Ethernet or PoE • Free rolling 7 days of cloud recording
RNI NO: DEL ENG/ 2017/ 69906
36