September 2016

Page 1

#entitworld

#enterpriseitworld

#enterpriseitworld RS 20

|

PA G E S 3 2

|

V O LU M E 0 1

|

ISSUE 08

WWW.ENTERPRISEITWORLD.COM

SEPTEMBER 2016

CAN MACHINES REALLY THINK

LIKE MEN? With IT Giants fortifying R&D and evaluating its innumerable applications, the market is just beginning to mature and the opportunities are endless. ... p16

EXCLUSIVE STORY

SIDDHARTHA BHATTACHARYA

HARNESSING THE POWER OF DATA FOR ENTERPRISES....p 28

AN OPINION ON

ISSUE SPECIAL

THE NEXT LEVEL...p 15

ARE YOU SAFE? THINK AGAIN BIG OR SMALL: NO ONE IS SAFE ...p 22

ENTERPRISE THE HACKING MOBILITY – MENACE: HOW ENTERPRISE ARE TAKING IT TO




EDITOR’S LETTER

COGNITIVE TECHNOLOGY TO RULE Cognitive Technology or otherwise known as artificial intelligence is going to be at the

core of most of the organizational systems - all over in sectors like retail, automotive, health care, BFSI, even agriculture. Car makers like Tesla Motors, BMW, Audi and General Motors ‘ambitious projects of bringing out unmanned cars are prime exampels of how artificial intelligence can complete human progress. Similarly, the machine learning can put to use in the retail industry – specially the vending machines to understand the pattern of consumption of the users. For example, the vending machine which dispenses software drinks can exactly dispense a particular drink at a particular time assessing the pattern of the user. Today, there is an increased use of unmanned flying machines or drones not only to locate the extinct animals or people surviving in disasters. These machines come with some kind of cognitive technology or machine learning to provide

NEXT MONTH SPECIAL

accurate information about the location and live stocks to the base station. This can be used in many other applications for the use of the human being. Imagine the loss of life happens during combing operations by various army establishments or search operations for dreaded terrorists happening in deep jungles, if there can be robots with inbuilt human like intelligence to locate these people what would be the outcome. It would really be stupendous. Companies like Google, Amazon, Microsoft, NEC, Apple, etc. have already started creating prototype of the robots though not for the military use. In the e-commerce domain, companies like e-bay, Amazon and many others have started implementing cognitive technologies to track buying requirement and patterns of the buyers and therefore could show product options matching the requirement of the buyer. Given the wide spread applications, the market for artificial intelligence is believed to be touching US $ 23.4 Billion by 2025 and it can grow manifold in future times. Major technology vendors have already started taking necessary steps to make it mainstream. For example, Google has acquired Deep Mind technologies in 2014 for US$ 600 million. Facebook has also acquired 2 companies, wit.ai and Face.com. Microsoft acquired Swiftkey, an AI program, which has the capability to predict what a user will type, reportedly for US$ 330.2 million. Nvidia invested US$ 2 billion to develop its Tesla P100 GPU, an ultrafast chip tailor made for deep learning. Even Goldman Sachs and JP Morgan are investing heavily in Artificial Intelligence.

S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M

COVER STORY

FEATURE

Infrastructure Market

Industrial Robotics

India’s infrastructure market is going through a very interesting phase where the government is taking aggressive stance to set up more and more physical infrastructure in order to accomodate the aggressive growth. At the same time, ICT infrastructure is also at the focal point to manage, monitor and enable the entire move.

Industrial robotics has been there in global scenario for a long time. But India as a country has not used it to that extent due to lack of manufacilities. Now that the PM is aggressive on manufacturing, it is time to evaluate such technology.

PLUS

CXO Challenges

The growth in the infrastructre market will happen at a brisk rate but the true challenge lies in finding right solution and executing it. The CXOs’ role is well cust out now.

Send in your inputs to sanjay@accentinfomedia.com

4

ENTERPRISE IT WORLD

SEPTEMBER 2016


CONTENTS VOLUME 01

ISSUE 08

|

|

SEPTEMBER 2016

|

W W W. E N T E R P R I S E I T W O R L D . C O M

Publisher: Sanjib Mohapatra Editor: Sanjay Mohapatra Sub Editor: Chitresh Sehgal Designer: Ajay Arya Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan Satya Sagar Sinha Lead Visualizer: DPR Choudhary Visualizer: Ravish MARKETING Marketing Manager: Raja Rao Apa SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016

COVER STORY

Phone: 91-11-41055458 E-mail: info@accentinfomedia.com

16

CAN MACHINES REALLY THINK LIKE MEN?

EDITORIAL OFFICE

An amalgamation of the human mind and expert computing capabilities, Cognitive Computing is being hailed as the path to future advancements. ...

editor@accentinfomedia.com

PRODUCTS /30 FORTINET’s

Fortinet’s First Universal Wireless APs

MORE INSIDE Editorial ~~~~~~~~~~~~~~~~~~~~~~~~~ 04 News ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06 Products ~~~~~~~~~~~~~~~~~~~~~~~~~ 30

15

27

28

MOBILITY

CIO CORNER

DATA MANAGEMENT

FINESSE

“Enterprise Mobility – How Enterprise are taking it to the next level.”

EMC

“Half of CIOs in India plan to move to an all-flash datacenter by 2020”

Delhi: 6/103, (GF) Kaushalya Park, New Delhi-110016, Phone: 91-11-41657670 / 46151993

Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/101-102, Kaushalya Park, Hauz Khas New Delhi-110016

Phone: 91-11-46151993 / 41055458

Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.

KODAK

“Harnessing the Power of Data for Enterprises”

SEPTEMBER 2016

ENTERPRISE IT WORLD

5


INTERVIEW INISDE

ITWORLD

Siddhartha Bhattacharya, Vice President, Global Marketing, Information Management, Kodak Alaris Page 28

ROUND UP

Dells Seals Historic EMC Acquisition

B Y S A N JAY @ A C C E N T I N FO M E D I A . C O M

Dell Technologies completes the acquisition of EMC Corporation, creating a unique family of businesses that provides the essential infrastructure for organizations to build their digital future, transform IT and protect their most important asset, information. This combination creates a $74 billion market leader with an expansive technology portfolio that solves complex problems for customers in the industry’s fast-growing areas of hybrid cloud, software-defined data center, converged infrastructure, platform-as-a-service, data analytics, mobility and cybersecurity. Dell Technologies serves 98 percent of the Fortune 500 and comprises several market leading businesses. The two largest, and most well-known, are the Dell client solutions business and the Dell EMC infrastructure solutions business – both of which are supported by Dell EMC Services. In addition, Dell Technologies contains Boomi, 6

ENTERPRISE IT WORLD

SEPTEMBER 2016

Pivotal, RSA, SecureWorks, Virtustream and VMware. This unique structure combines the focus and innovation of a startup with the global scale and service of a large enterprise. Dell Technologies’ scale will enable it to deliver more innovation and investment in R&D, sales and marketing, services and support and deliver more efficient and costeffective solutions for customers. Michael Dell, Chairman & CEO of Dell Technologies, said, “We are at the dawn of the next industrial revolution. Our world is becoming more intelligent and more connected by the minute, and ultimately will become intertwined with a vast Internet of Things, paving the way for our customers to do incredible things. This is why we created Dell Technologies. We have the products, services, talent and global scale to be a catalyst for change and guide customers, large and small, on their digital journey.”

D ATA BRIEFING

17.2

per cent growth would happen in global public cloud in 2016 over 2015.


The Biggest Channel Event is Here! Date: 18 November 2016

Venue: Crowne Plaza, Okhla, New Delhi

&

Nominate Your Company latest by 25th October 2016 to Quality for the Awards. www.smechannels.com/channel-event/

“SME CHANNELS SUMMIT AND AWARDS 2016” is a knowledge forum for the channel partners and the vendors to understand the market trend and chart their course of action. The event brings together industry leaders to speak about future missions and their vision of the Indian channel fraternity to be able to yield more profit and grow healthy. It discusses the ethical practices and growth strategy going forward. The awards are about felicitation of top 50 solution providers in the partner ecosystem and the best performing IT brands for the year in different categories. So spanning across six hours, from 1.30 PM till 8.30 PM in the evening, the event will see two categories of awards - the Super50 and the Achievers’ Awards. While the Super50 are for the top 50 performers in the partner space, the Achievers’ Awards recognize the top performing vendors. Besides, there will be panel discussion in the afternoon on “Growth Strategy of Indian Resellers.” There will be presentations from thought leaders and industry experts to provide necessary knowledge to the channel partners and the vendors to chalk out the right strategy of growth. For Award Submissions and General Inquiries: info@accentinfomedia.com or 91-11-41657670 /46151993/41055458 For Sponsorship Packages and Partnerships: Sanjib at sanjib@accentinfomedia.com For PR and Media or Other Inquiries: Editor at info@smechannels.com


ITWORLD // NEWS BRIEF

IBM Underscores Co-Innovation at India Labs Engage ‘16

Google Invites Applications for Launchpad Accelerator 3.0 Google has announced the call for applications for the next session of the Launchpad Accelerator. The Launchpad Accelerator is a specially designed class to help late-stage app startups in emerging markets find solutions to their business challenges and successfully scale. This will be the third class of its kind by Google and will be held at its newly opened, 14,000 sq. ft Google Developers Space at 301 Howard Street, San Francisco. The equity-free program will begin on January 30, 2017 in San Francisco and will include 2 weeks of all-expense-paid training. During each class, over 20 Google teams provide comprehensive mentoring to late-stage app startups which seek to scale and become leaders in their local markets. The three -month program starts with an all-expenses-paid

two week boot camp at Google HQ. Through Launchpad Accelerator, startups can utilize Google’s mentorship and privileged product access to scale business and better capitalize on local markets, while also tapping into new global opportunities. Candidates will also continue to receive access to Google’s expertise and resources for six months. Roy Glasberg Global Lead, Launchpad Accelerator, Google said, “Developers are in an ever-changing landscape and seek technical training. We’ve also seen a huge surge in the number of developers starting their own companies. Lastly, this is an unique opportunity to bridge the gap between Silicon Valley and emerging markets. To date Launchpad Accelerator has nearly 50 alumni in India, Indonesia, Brazil and Mexico.”

GLOBEL

8

ENTERPRISE IT WORLD

IBM emphasized the significance of ‘Co-innovation’ in building a Digital India, at IBM India Labs Engage 2016, the two day annual innovation summit hosted by IBM in Bangalore. Out of the 40 plus Indian startups who have leveraged IBM’s cloud platform and/or cognitive solutions, five select start-ups demonstrated their innovative, industry specific offerings at the event. In addition to adopting IBM technology, these start-ups have benefitted by getting access to various IBM initiatives including IBM GEP/ SmartCamp India – programs that allow them to build, launch and scale their business. The event provided an opportunity for start-ups, ecosystem leaders, enterprises and investors to discover ideas that would breach technology frontiers and build disruptive applications for the Cloud and Cognitive Era. By participating in an immersive Design Thinking and Garage experience, participants also had a unique opportunity to unearth emerging client needs and rapidly create market- focused solutions.

EVENTS

27 SEP– 04 OCT

12-14 OCT

09–14 OCT

24–26 OCT

SANS Security Leadership Summit 2016 will bring together top security leaders and experts for two days

Management and Innovation Technology International Conference Forum for applications impacts of Engineering Management and Innovation

DALLAS, USA

BANG-SAEN, THAILAND

TAEJON KOREA

SAN DIEGO, USA

SEPTEMBER 2016

International Conference on Intelligent Robots and Systems (IROS) Will integrate workshops on robot demonstrations and social activities

2nd Annual Converged IT Summit Will cover a broad range of topics - issues behind computational solutions for modern research methodologies


NEWS BRIEF // IT WORLD

NEC Announces New Innovation in Precision Data Mining NEC Corporation has announced the development of a Customer Profile Estimation Technology that automatically estimates detailed customer profiles on individual customers, including their interests and preferences to a high level of precision, without the involvement of marketing experts. Based on NEC’s unique relationship mining technologies, the newly-developed technology estimates detailed and hard-to-obtain profiles on individual customers completely automatically and to a high degree of precision from basic profile information that is relatively easy to obtain, such as age and gender, combined with purchase histories. NEC has verified the effectiveness of the technology using public data. As a result, NEC has confirmed that an analysis that would take conventional experts three months to complete can be carried out in three days, and to a degree of precision that surpasses those experts. Akio Yamada, General Manager, Data Science Research Laboratories, NEC Corporation said, “With this technology, we can respond to lifestyles that change from moment to moment, quickly discover true individualized needs that may have been overlooked, and devise appropriate measures. In addition to estimating detailed customer profiles, the technology can also be applied to estimating product attributes.” Moving forward, NEC will continue to pursue research and development of the technology, aiming to provide it in the retail and distribution sectors, including department stores, supermarkets, convenience stores, e-commerce sites and point card systems. Main features of the new technology include automatic estimation of detailed profiles based on basic profile data and purchase histories. A process of hypothesis generation and verification is repeated to achieve an estimation precision that surpasses an expert.

QUICK BYTE ON

FINANCIAL

S/HE SAID IT

KAUSHIK BHASKAR,

VICE PRESIDENT, IBM INDIA SOFTWARE LABS

“There is also a fundamental shift required from ‘siloed’ innovation to ‘co-innovation’ to rapidly drive transformation. IBM is increasingly focused on nurturing the ecosystem to drive this change.”

“We think it’s the time for ‘Design in India’ to get more focus. Through that, Make in India will become an R&D powerhouse. that will create a virtuous cycle in the ecosystem that will create the scale, bring innovation in the hardware space and create manufacturing jobs, and all of that.” K U M U D S R I N I VA S A N , M D , I N T E L I N D I A

Virtusa Announces Q1FY17 Consolidated Financials: Revenue for Q1 FY17 grew $205.5 million, up by 19.6% sequentially and 52.4% YoY. GAAP loss from operations of $1.8 mn for Q1 FY17, $5.5 mn for Q4 FY16 and $12.4 million for Q1 FY16. On a GAAP basis, net loss for Q1 FY17 was $6.3 mn. SEPTEMBER 2016

ENTERPRISE IT WORLD

9


ITWORLD // NEWS BRIEF

Vital Intelligence Launches Cyber Defense Academy in India

Tata Group Partners Top Educational Institutes to Drive R&D Tata Sons and Tata companies including Tata Consultancy Services (TCS), Tata Chemicals, Tata Communications, Tata Steel, and Jaguar Land Rover (JLR) have entered into collaborations to fund research and development opportunities in partnership with the world’s leading academic institutions, including Harvard University, Yale University, the Indian Institute of Technology Madras and the Royal Society, UK. As per the release, the financial support, exceeding $25 million, will be spread over time, in line with the tenure of the individual alliances with the institutions. The Tata partnership with academic institutions is part of a global university collaboration programme of Tata companies for strategic

EXECUTIVE

outreach to academia across the world. It is aimed at supporting university faculty and students through funded research programmes, sabbaticals, fellowships, and engagements with university leadership, as well as studying long-term research outcomes related to key market needs. Dr. Gopichand Katragadda, Group CTO, Tata Sons said, “It is the Tata group’s vision to touch the lives of 25% of the world’s population. To accomplish this vision, we are engaging with the best research institutions around the world to enable sustainable market development in the regions we work and live. This collaborative platform will allow Tata companies to work closely with these leading universities.”

The Vital Intelligence Group has announced the launch date of the Vital Intelligence Academy of Cyber Defence and advanced High Tech Security in India. As per the release, the Vital Intelligence Academy will be a full service facility that will incorporate a multitude of highly advanced training capabilities to include several state-of-the-art training classrooms, conference and event halls, and high tech business meeting rooms and the world’s most advanced security and cyber security training simulators. The Vital Intelligence Academy will provide a full range of courses that will fill the needs of emergency management, law-enforcement, disaster management and safety organizations, military and governmental agencies, private security groups, executive protection personal, corporate executives, E-learning facilities (able to live stream safely and securely to most locations in the world) and host international visiting students.

MOVEMENT

Alcatel-Lucent Makes Top Global Appointments New leaders Mathieu Destot and Nicholas Brunel will head up Alcatel-Lucent Enterprise sales & marketing and communications business division Virtusa elevates Sundararajan Narayanan to Executive Officer Promoted to Executive Vice President, Chief People Officer & Global Head of Human Resources and 10 ENTERPRISE IT WORLD

SEPTEMBER 2016

an executive officer of the Company MEA and India. Intel Security Announce Anand Ramamoorthy as MD, India & SAARC Responsibilities include strengthening the customer base across verticals, fostering the channel ecosystem and positioning India for rapid nonlinear growth

Canon Appoints Eddie Udagawa as VP India In this new role, Udagawa will be spearheading the CII division

Dassault Systèmes Ropes in Samson Khaou as India MD. He will develop the company’ business strategy in line with the country’s opportunities


NEWS BRIEF // IT WORLD

HDS, Fujitsu, NetApp & Dell EMC Shipping Brocade Gen 6 Brocade announced continued momentum for its Gen 6 Fibre Channel storage networking solutions with availability from its key OEM partners, including Dell EMC, Fujitsu and NetApp. This announcement is in addition to Hitachi Data Systems shipping Brocade Gen 6 directors, blade and switch since July, reinforcing Fibre Channel as the protocol of choice for missionJack Rondoni, vice critical enterprise president of storage networking at Brocade storage. Fibre Channel is generally accepted as the lowest latency and most reliable network infrastructure for storage. Gen 6 Fibre Channel technology enables organizations to address their performance, reliability, and scalability requirements for the all-flash data center, new data center architectures and next-generation storage technologies. Jack Rondoni, vice president of storage networking at Brocade said, “We are pleased that the recent Gartner report reiterates the importance of Fibre Channel as the data center protocol of choice for storage networking for the foreseeable future. Through our OEM partners, including Dell EMC, Fujitsu, HDS and NetApp, we are already delivering Gen 6 Fibre Channel solutions that maximize the performance of flash storage and deliver unprecedented reliability and scalability. We plan to have additional announcements in the coming months as more partners launch our Gen 6 platforms.” Brocade has been first to market with its Gen 6 Fibre Channel solutions comprised of the Brocade X6 directors, Brocade SX6 extension blade and Brocade G620 switch. Combined with Brocade Fabric Vision technology, Gen 6 Fibre Channel products enable customers to drive always-on business operations, eliminate performance bottlenecks and adapt to the requirements of digital organizations.

Mellanox Debuts 100G Open Ethernet Switch ‘SPECTRUM’

Mellanox Technologies for the first time presented in the Indian market 10/25/40/50 and 100GbE solutions. Mellanox introduced the Open Ethernet switch ‘SPECTRUM’ with a switching capacity of 6.4 Tbits that can transfer 4.77 billion packets per second. The company also revealed to the Indian audience, its ConnectX-4 Lx Ethernet adapter and the LinkX family of Ethernet cables and transceivers. ‘SPECTRUM’ switch based on the

INTERESTING

100GbE Ethernet switch ASIC of Mellanox Technologies, is recognized as the world’s leading Ethernet switch. It provides a flexible choice of ports at 10, 25, 40, 50 and 100Gb/s and ensures zero packet loss. This will help users to fully utilize their network resources and maximize the efficiency of the applications in their data center. Compatible with a range of network operating systems, this switch provides customers with the freedom to choose the preferred network operating system.

TWEET

Tech.

“Artificial Intelligence [will assist Microsoft] to reason over large amounts of data and convert that into intelligence,” Satya Nadella, CEO, Microsoft Gives the impression how Artificial Intelligence is going to be a vital organ of the entire technology fabric. Source: http://twitter.com/enterpriseitworld

SEPTEMBER 2016

ENTERPRISE IT WORLD

11


ITWORLD // NEWS BRIEF

Huawei Sets Up Largest Global Service Center Facility in India

Teradata Deploys Aster Analytics on Hadoop and AWS Teradata Corporation announced important new deployment options for its advanced multi-genre analytics engine: Teradata Aster Analytics on Hadoop and Teradata Aster Analytics on Amazon Web Services (AWS). Although previous versions of Aster Analytics required dedicated systems, now companies have the flexibility to accelerate valuable analytic insight from their data wherever it resides, building on their existing investments in Hadoop. This flexibility supports Teradata’s strategy for Hybrid Cloud architecture, the next generation of agility, flexibility, and integration between systems – and a more open approach to advanced analytics. Massive volumes of data from the Internet of Things (IoT), including sensors and digital mobile devices, have resulted in custom-tailored architectural approaches that include Hadoop and cloud. Teradata

now adds compelling value to custom approaches. Sunil Jose, Managing Director, Teradata India said, “As migration to the cloud becomes the option-of-choice for Indian enterprises managing voluminous data, leveraging data analytics solutions to gather meaningful insights is now becoming a management ask by CXOs. Aster analytics is an excellent platform for Indian enterprises as it offers flexible solutions that address key business challenges while abridging business infrastructure challenges. New options and services allow users to provision for an analytic environment and start analyzing data they already have in data lakes or the cloud. With the Amazon Web Services option coming in place, now Indian enterprise users across the spectrum have the ability to pay as they go”

VMware and Veritas Collaborate to Bring Resiliency to Enterprises Veritas Technologies announced the release of Veritas Resiliency Platform 2.0, featuring a built-in VMware certified data mover that achieves a significantly lower Recovery Point Objective (RPO) compared

12 ENTERPRISE IT WORLD

to VMware’s native data mover VMware vSphere Replication. Resiliency Platform empowers organizations to maintain critical business uptime across complex, multi-platform and multi-vendor

SEPTEMBER 2016

private, public and hybrid cloud environments by delivering predictability for all resiliency operations, including workload migration, failover, failback, data protection, and non‐disruptive recovery testing. The built‐in

Huawei’s largest Global Service Center (GSC) in Bengaluru was inaugurated by Manoj Sinha, Minister of State (I/C) for Communications and Minister of State for Railways of the Government of India.Located within Huawei’s Research and Development (R&D) campus in Bengaluru, the GSC is currently home to over 1,000 engineers, network operations specialists and support staff. The India GSC currently handles more than 50 projects, supporting over 30 countries in Asia, the Middle East and Africa, serving over 350 million subscribers. The new GSC will support operators digital transformation and help meet market demand for synergies between services and technology, as well as Inauguration of Huawei global improve operations service centre capabilities. Sh. Manoj Sinha, the Honorable Minister of State (I/C) for Communications and Minister of State for Railways of the Government of India said, “I would like to congratulate Huawei on their commitment to pursue their ‘Make in India’ vision. The ICT landscape in India is growing every day and such initiatives by technology majors like Huawei will accelerate the growth of the ICT industry in India. Huawei’s Global Service Center at Bangalore, will be one of their four GSCs globally.”

data mover in Resiliency Platform 2.0 simplifies the management of critical services’ uptime by integrating seamlessly into VMware environments, so organizations can gain greater benefits from their existing VMware investments. In addition, organizations can achieve increased benefits from other IT investments with

Resiliency Platform’s support for industry-leading high availability solutions, 3rd party hardware-based data movers and other virtualization platforms such as Microsoft Hyper-V. The new built‐in data mover in 2.0 further strengthens Veritas’ commitment to empower organizations to architect their IT postures with freedom of choice.


NEWS BRIEF // IT WORLD

BOOK

SELF

Working Out of the Box: 40 Stories of Leading CEOs

GLOBAL UPDATE

Ellisson: Amazon Databases are 20 Years’ behind In his keynote presentation at Oracle OpenWorld 2016 in San Francisco’s Moscone Center, Oracle Executive Chairman and Chief Technology Officer, Larry Ellison shared detailed analysis that showed that Oracle Database-as-aService (DBaaS) is up to 105X faster for Analytics workloads, 35X faster for OLTP, and 1000+X faster for mixed workloads than Amazon DBaaS. Ellison also showed that the Oracle Cloud is optimized for running Oracle Database while Amazon Web Services (AWS) is not. An Oracle Database running on the Oracle Cloud is up to 24X faster than an Oracle Database running on AWS. “Oracle’s new technologies will drive the Cloud databases and infrastructure of the future,” said Ellison. “Amazon are decades behind in every database area that matters, and their systems are more closed than mainframe computers.” He further added, “Amazon databases are 20 years behind the latest release of the Oracle Database in the Cloud.” Ellison also announced the availability of Oracle Database 12c Release 2 in the Oracle Cloud with the launch of the new

Oracle Exadata Express Cloud Service. This service provides the full enterprise edition of the Oracle Database running on the database-optimized Exadata infrastructure. Starting at just $175 per month, Ellison showed this Cloud service is lower cost than similar offerings from Amazon. With the launch of Oracle Database 12c Release 2 in the Cloud first, Oracle has demonstrated that the Oracle Cloud is the most optimized, complete and integrated Cloud for Oracle Database. The latest release provides organizations of all sizes with access to the world’s fastest, most scalable and reliable database technology in a cost-effective and open Cloud environment. In addition, the world’s #1 database includes a series of innovations that add state-of-the-art technology while preserving customer investments and supporting their transition to the Cloud. Ellison shared detailed analysis during his keynote that showed how the new Oracle DBaaS delivers unparalleled performance for analytics, online transaction processing (OLTP) and mixed database workloads.

AUTHOR

APARNA PIRAMAL RAJE

PRICE

RS. 250

AVAILABLE AT

AMAZON

About The Book The book gives a peek into 40 progressive leaders by exploring the connections between their work spaces and their work styles. It unravels their defining qualities and explains how it reflects in their work spaces.

Key Features The book gives us an insight into what makes these ceos tick and how they manage their most valuable assets.

NutanixAcquiresPernix Data and Calm.io Nutanix has executed a definitive agreement to acquire PernixData, a pioneer in scale-out data acceleration and analytics. The transaction is subject to customary closing conditions. In addition, Nutanix has closed the acquisition of Calm. io, an innovator in DevOps automation. By adding world-class technology, products and engineering talent, Nutanix can accelerate the delivery of an Enterprise Cloud Platform that rivals the agility, automation and consumer-grade simplicity of the public cloud but with the control, security and attractive long-term economics of

on-premises infrastructure. Dheeraj Pandey, Founder, CEO and Chairman, Nutanix said, “Today is a very special day in Nutanix’s history. PernixData and Calm.io both have exceptional technology, solid engineering teams, and visionary leaders with the ‘Founder’s Mentality’; they have dreamt big and persevered against great odds to build phenomenal products. We are honored to welcome them into the Nutanix family, and build the next generation of innovative products and truly helping our customers realize the vision of the Enterprise Cloud.” SEPTEMBER 2016

ENTERPRISE IT WORLD

13


ITWORLD // NEWS BRIEF

India Security Market to Grow 10.6 % in 2016: Gartner Enterprise security spending (hardware, software and services) in India is on pace to reach $1.12 billion in 2016, up 10.6 percent from $1.01 billion in 2015, according to Gartner. Gartner analysts are providing the latest trends for the security market at the inaugural Gartner Security & Risk Management Summit, which is taking place here through Friday at the JW Marriott, Mumbai Sahar. Security spending will continue to grow in 2017 when revenue is projected to reach $1.24 billion. Security services (that includes consulting, implementation, support and managed security services) revenue accounted for 61 percent of this total revenue in 2015, and this proportion will increase to 66 percent by 2020. “The strong growth in the security services market will be primarily because customers need external services to transform their security posture in the digital business era. Security services are typically categorized as either implementation, consulting or security outsourcing services, and many providers are beginning to offer all three categories to address customer requirements,” Siddharth Deshpande , principal research analyst at Gartner. “In 2016, we are seeing large enterprises increase their security budgets to enhance their security program, and several midmarket and enterprise organizations creating new space for security spending as part of their technology budget,” said Deshpande. Key security initiatives for a majority of organizations in 2016 include: security operations, incident response network and data center security, identity governance and administration, mobile and cloud security governance, advanced threat defense, application security, security policy and program development and governance, risk and compliance (GRC). Mature organizations that have begun the journey towards detection and response approaches are now looking to focus on advanced capabilities around security operations and incident response. 14 ENTERPRISE IT WORLD

SEPTEMBER 2016

MANAGEMENT

MANTRA

“We always try to look three to five years out in the decisions we make. Our opportunity in the commercial market and the evolution of our leaders take us to the next level.” — JOHN CHAMBERS, EXECUTIVE CHAIRMAN, CISCO.

Skybox Security is Now Interoperability with VMware NSX

Continuing its efforts to be relevant to the virtual and cloud networks, Skybox Security has opened up its solution to VMware NSX network virtualization platform, supporting network mapping, access analysis and vulnerability detection in NSX environments. It means the solutions is now interoperable with the VMware Network platform. This progression of Skybox will bring greater visibility to hybrid IT environments. Skybox previously announced integration with Amazon Web Services. And, the company will rollout support for additional virtualization and cloud platforms in the next year. With new functionality in Skybox Network Assurance, enterprises gain end-to-end visibility, from their physical networks to virtualized and cloud networks. Comprehensive network mapping and modeling gives network security administrators insight to how policy is actually deployed on virtual machines and enables end-to-end access analysis, combining both north-south and east-west policies. Using Skybox security

analytics and the network model, vulnerability management teams are also now able to discover vulnerabilities in virtual and cloud environments that were previously uncharted or inaccessible. “Virtual machines are often spun up by system administrators who don’t view network architecture the same as security engineers”, said Skybox VP of Products Ravid Circus. “Yet, security teams need to be able to ensure security policy and tagging is implemented correctly to allow only authorized access to these machines. To do that, you need the same level of visibility into your virtual and cloud environments that you’ve come to expect with physical networks — Skybox provides that.” Increased visibility into software-defined networks also further strengthens the capabilities of the Skybox Security Suite by providing the contextual information needed for accurate, risk-based prioritization of security and compliance exposures and attack vectors across the entire attack surface.


FINESSE // MOBILITY

“With the best state of the art solutions we help our customers to move through the process of

winning deals with greater efficiency and consistency.”

LATIF SHEIK, ACCOUNT MANAGER - FINESSE

ENTERPRISE MOBILITY – HOW ENTERPRISE ARE TAKING IT TO THE NEXT LEVEL. Gone are the days when employees need to reach their offices in order to close deals. Courtesy enterprise mobility solutions, now from anywhere and at any time, the employees can complete their work – making the turnaround time quite short.

BY SANJAY@ACCENTINFOMEDIA.COM

T

here is no doubt that we are living in the age of Mobile. In fact, a recently conducted research by Forrester says that more than half of adults worldwidealready own a Smartphone and is projected to grow up to 80% by 2020. Mobility,this way,continues to gain traction in the enterprise, as both IT and business users need to contend with how they will serve their employees, partners and end-user

customers. With this increased smart phone usage, it is obvious that there is a coextended hike in customer expectations.With new expectations comes afundamental change in the wayleadership views, structures andruns IT organizations. Enterprises are now facingconsiderable challenges dealing with today’s technologies; with additional responsibility of cost reduction, improving productivity & delivering better results.

Creating rich, engaging apps that consistently deliver agreat user experience, solves business challenges, improves agility and meet the need of IT security concerns needs a solid strategy,design in place and execution throughout the lifecycle. A clearer understanding of the customer ultimately leads to a better customer relationship. When your customers trust your business and have an exceptional customer experience, it is much easier to achieve that third objective of growing the value of existing customers through upsells and cross-selling. Businesses continue to invest in IT solutions that help them run their business better and track everything about their customers. This helps business owners get a complete view of the health of their business to make quick decisions. Finesse, helps organizations to digitally transform their business by providing solutions to: improve sales productivity and speeding up the sales process, to simplifying the lead management process by defining a clear workflow path for leads, connecting teams with the help of apps, enabling them to work from anywhere at any time.We strive to empower organizations to deliver anOmni-channel customer service approach to catch upwith customer behaviors. Businesses of all sizes can benefit from using these solutions to see the status of their pipeline. This enables small teams to perform the work of a much larger group. Wehelp companies gain a 360-degree view of customers to grow and be successful. With the best state of the art solutions we help our customersto move through the process of winning deals with greater efficiency and consistency. Many of those on-the-go solutions include collaboration tools where your employees can work across the organization on sales opportunities, service cases, and campaigns. Running your business from your smartphone will soon be as commonplace as ordering food using an app. SEPTEMBER 2016

ENTERPRISE IT WORLD

15


COVER STORY // COGNITIVE TECHNOLOGY

“From Autonomous Car to Virtual Personal Assistants, cognitive is rapidly changing how systems and products are being developed.”

16 ENTERPRISE IT WORLD

SEPTEMBER 2016


COGNITIVE TECHNOLOGY // COVER STORY

CAN MACHINES

REALLY THINK

LIKE MEN?

An amalgamation of the human mind and expert computing capabilities, Cognitive Computing is being hailed as the path to future advancements. With IT Giants fortifying R&D and evaluating its innumerable applications, the market is just beginning to mature and the opportunities are endless. BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM

C

omputing has changed the face of the planet in a short period of time. In a matter of a few decades, man has been able to make remarkable technological advancements from industrial automation and more efficient processes to new channels of business and more personalized experiences. Now, with further innovation cognitive computing has emerged as the next step in this technological advancement. The concept of cognitive computing is a range among the planet’s leading tech giants who have all been infusing gigantic quantum of money is R&D of their own cognitive capabilities. Technology has forever help strong the promise unto delivering more personalized experiences to its users. The concept of Cognitive computing is, as industry vibrantly puts it, homecoming of this promise. Understanding Cognitive Cognition or reasoning has been an asset for the human brain that has been long aspired to be inculcated in machines and computing systems. The concept of

cognitive computing basically means a computing environment that mimics the human brain through a collaboration of different technologies like data mining, AI, natural language processing. Saurav Kumar, CEO and Cofounder, Cube26, a cognitive startup puts the concept in easy words, “Cognitive Computing develops core technologies that enable computing systems to learn, reason and apply knowledge gained through experience, and respond intelligently to things that have not been previously encountered.” Cognitive computing enables machines to make more human-like decisions to different tasks rather than following set protocols having extensive applications yet limited flexibility. With a more learning based approach, cognitive technologies are enabling more autonomous, better interactive systems which need little or no human assistance at all. As EronKar, Practice Head – Analytics at HappiestMinds Technologies explains, “Instead of algorithms which had to be programed to take certain rule based decisions in yesteryears, today we can build in some amount of intelligence in them for these algorithms SEPTEMBER 2016

ENTERPRISE IT WORLD

17


COVER STORY // COGNITIVE TECHNOLOGY

DRIVING FORCES TOP COGNITIVE BEHIND COGNITIVE APPLICATIONS COMPUTING IOT EXTENSIVE STORAGE CAPABILITY

BIG DATA

ADVANCED ANALYTICS

VISUAL RECOGNITION

VIDEO ANALYTICS

AI

ROBOTICS

VR

ADVANCE TEXT MINING

SPEECH RECOGNITION NATURAL LANGUAGE PROCESSING (NLP)

COMPUTATIONAL LINGUISTICS

MACHINE VISION

INDUSTRY EXAMPLES 18 ENTERPRISE IT WORLD

SEPTEMBER 2016

n

Autonomous Cars (Tesla Cars and Uber Self Drive Taxis)

n

Personal Assistants (Microsoft Cortana, Apple Siri)

n

Computing Platforms (IBM Watson, SAP HANA)

n

Retail Services (Amazon.com)


COGNITIVE TECHNOLOGY // COVER STORY

MADHAV KULKARNI, VICE PRESIDENT AND HEAD OF APPLICATION MANAGEMENT (INDIA GDC), ATOS

“Many startup companies have qualified themselves as using Cognitive Computing, and it’s

the new playground for Venture Capital funds.”

ERON KAR, PRACTICE HEAD, ANALYTICS AT HAPPIESTMINDS TECHNOLOGIES

“For end customer facing industries, automated and intelligent personalization

is a big business goal to achieve.”

to take intelligent decisions based on data based intelligence.” Cognitive computing owes its advent to a number of technologies catalyzing it like proliferation of Storage Technologies, Big Data, Advanced Analytics, AI, Robotics, Virtual Reality, Natural Language Processing, Computational Linguistics and Machine Vision. Perhaps the most anticipated technological trends of recent times, cognitive computing promises to a better tomorrow where with a limitless pool of data, computing environments would be able to make decision making more precise and foolproof. How it’s changing business Although at a very nascent stage, the businesses are already witnessing the effects of cognitive computing with examples across verticals. From autonomous self-driven cars to personalized customer experiences, cognitive is rapidly changing how systems and products are being developed today. Cognitive computing enables smarter machines which can perform decision based tasks where traditional computing environments simply fail. Andy Stevenson, Head of Middle East and India, Fujitsu opines, “Today irrespective of applications, all kinds of advanced technology have some elements of cognitive computing in it.

Cognitive computing has played a key role in the development of the smart technologies. In simple terms, cognitive computing eases out the situation when the traditional system faces a difficulty.” The rage around cognitive computing and the fact that its full scope is yet to be deciphered are making industries take notice of the technology. Yet the industry has already seen a number of applications for cognitive computing. IBM has its Watson initiative, SAP has its HANA platform, Amazon uses cognitive to offer better customer experience, Microsoft has Cortana and Apple’s got Siri. AsMadhav Kulkarni, Vice president and Head of Application Management (India GDC),Atos remarks, “Cognitive computing is being used in numerous artificial intelligence applications, including expert systems, natural language programming, neural networks, robotics and virtual reality. Many startup companies have qualified themselves as using Cognitive Computing, and it’s the new playground for Venture Capital funds that invest billions of dollars in that area. Deep Learning has emerged as a breakthrough technology. Machine learning, speech recognition and emotions in human- machine interactions are the most promising technologies related to artificial intelligence, especially for virtual assistants of tomorrow.”

Sectors and Applications In itself, cognitive computing is advancement to traditional computing. It brings together a lot of technologies and has already seen applications in driverless cars (Tesla), mobile personal assistant computers (Siri and Cortana), healthcare personalization and improving individual shopping experiences from customer to customer (e-commerce giants like Amazon). The most proliferate use of cognitive today is in end customer oriented sectors and industries like retail, healthcare and BFSI. This is due to the increased level of personalization cognitive assures. EronKar of Happiest Minds believes, “Most of these industries are end customer facing industries and for end customer facing industries, automated and intelligent personalization for their customers is a big business goal to achieve.” On the major application of cognitive, he adds that the number of applications is expected to grow as the industry gradually endorses the concept, “IoT, Visual Recognition, Video Analytics, Advance Text Mining, Speech Recognition are some of the current applications but there are many more to come and the impact on business will be huge both from a revenue and a cost perspective.” Fujitsu’s Andy Stevenson shares the mood and anticipates cognitive to surprise everyone with its applications over time, “The market for cognitive computing is growing at a steady pace. It is leaving a positive impact on various sectors such as analytics, defense, and research to name a few. It is generating lot of interest in the automotive segment as well, especially for self-drive cars.” The major verticals where Cognitive ComputSEPTEMBER 2016

ENTERPRISE IT WORLD

19


COVER STORY // COGNITIVE TECHNOLOGY

ANDY STEVENSON, HEAD OF MIDDLE EAST AND INDIA, FUJITSU

“Over the next five years, there will be a stronger demand for cognitive computing with

data being churned out every single second.” SAURAV KUMAR, CEO AND COFOUNDER, CUBE26

“Cognitive computing has the potential to augment our reasoning capabilities, and empower us to make better informed real-time decisions.”

ing is already playing a key role are Healthcare, Financial Services, Retail and Travel. Atos’ Madhav Kulkarni elaborates, “In Healthcare, Cognitive can transform the industry from being reactive to providing proactive approach to wellness. In Financial Services, it addresses a variety of needs from personal advising to detecting potential fraud. CC apps can act as personal shopper providing answers to product related queries and making recommendation based on previous purchases, interests and needs. Additionally, cognitive apps can eliminate the process of searching several sites when trying to plan a trip.” Apprehensions Attached A relatively unexplored territory, Cognitive computing is a concept, the implementation of which requires extensive R&D on finding its usage and applications for business. There are mixed responses towards the endorsement of cognitive in industries. As EronKar of Happiest Minds puts it, “Some of the business leaders are skeptical and some expect the world out of it. Both are wrong approaches to take. One has to be prudent in their approach towards Cognitive computing and identify through extensive research the right application of Cognitive computing in their context.” Cube26 CEO Saurav Kumar believes just as 20 ENTERPRISE IT WORLD

SEPTEMBER 2016

with any other technology, cognitive computing will also have to deal with the aspect of security. He says, “Security is among the most important and pressing challenges of all times in cognitive computing. With the growing access to mobile computation and the growth of computing strength on the mobile itself, security plays a major issue with regards to cognitive computing.” Fujitsu’s Andy Stevenson also shares this view, “It may require a high verification effort to align the autonomous practiced behavior patterns with the planned intended behavior patterns of the systems. Of course, unexpected security gaps could arise which could lead to a run-off of confidential information.” On the other hand, Andy also believes that Cognitive will contribute to improvement of security systems worldwide, “Cognitive technologies could deliver new opportunities to combat security concerns while they reveal abnormal behavior of huge system complexes which serve inferences about eventual infections with malware.” Atos opines that as Cognitive technologies gradually gain momentum, an aspect other than security will come around as a major concern, he explains, “ One of the first challenges could be the very idea that we may be controlled by algorithms that are likely to predict what we are about to do.

Privacy was the central challenge in the previous era. In the next wave of Cognitive Computing, the challenge will be safeguarding free will. Organizations and Customers do realize it’s easy to abuse access to data.” Collaboration the Way Forward Virtually unchartered for most organizations, Industry experts believe collaboration is the way forward for leveraging cognitive computing. As Atos suggests, “Organizations should develop an approach for their own digitization by establishing partnerships with leading providers, key customers and also by training their people. They should also create a Cognitive computing working group to evaluate the business opportunities and revenue generation models. That approach could minimize the initial investment, provide rapid ROI, and strengthen relations between customers and their suppliers.” Fujitsu’s Andy adds that customers need to have a disciplined plan before looking to adopt cognitive, “Cognitive Computing is a new rapidly growing IT discipline which is still far away from maturity. Partly this causes an issue for basic research. This is why customers should follow business development plans based on Cognitive Computing. They should also look for consulting and partnerships with leading IT companies with distinct interests and abilities in R&D.” Happiest Minds’ EronKar believes organizations need to be cautious and have a visionary approach, “Cognitive computing still has a long way to go before it replaces humans in decision making especially for businesses. So it has to work hand in hand with current business processes and improve them one step at a time rather than a onetime radical change. Businesses need to understand that unlike any other IT implementation which will yield some process benefits at the end


COGNITIVE TECHNOLOGY // COVER STORY

of the implementation, any wrong move can derail the process and create an atmosphere of distrust” Future of Cognitive Computing Abuzz with this fresh new idea and its scope of opportunities, the industry is welcoming Cognitive Computing hands on. As Cube26’s Saurav Kumar says, “Cognitive computing technology has the potential to augment our reasoning capabilities and empower us to make better informed real-time decisions. Smart machines and cognitive systems will form the foundation for enhancing speed of access to information and personalizing customer experiences. This is where cognitive computing can play a critical role in accelerating big data to drive personalized advice and insights for consumers and business leaders.” Fujitsu’s Andy Stevenson is in cahoots with the idea, “Over the next five years, there will be a stronger demand for cognitive computing with data being churned out every single second. The adoption of cognitive computing in the coming days will be determined by various factors such as evolving technology, society, skills, and policies. Big data and cognitive computing will go hand in hand leading to several technological innovations and advancements.” Atos believes that cognitive

computing is going to have the same effect as automation did some 50 years ago, “Cognitive Computing is going to challenge white collar, professional knowledge work in the 21st century in the same way that factory automation and the assembly line challenged blue collar labour in the 20th century. The evolution history of industrial robots show that the productivity increases and scale of output has primarily changed the nature of work and created new demand of skills but has not created mass unemployment.” With Big Data at the crux of cognitive, Saurav of Cube26 ponders that this will lead to a whole new most sought after career theme, “Data science is steadily gaining importance and we have witnessed various companies across sectors hire data scientists. Still at a nascent stage, it definitely has the potential to soon be one of the most sought after career options in India.” Summing up With limitless possibilities if you think of it, cognitive computing is set to redefine how businesses work and organizations operate. It is going to replace a number of traditional processes and open up new possibilities. Most of all, it is going to harness the power of the extensive amounts of

data, which is the new gold, and in turn provide well evaluated personalized actions based on experience. Deloitte forecasts that the Cognitive Computing market segment will reach $80 billion by 2018 which in itself is a humongous projection, owing to the fact that the technology would still be improving. The impact of cognitive computing may well run into hundreds of billions of dollars. In the coming times, smart machines and processes will define the organizational infrastructures. Data is being churned out each second and analytics have opened our eyes to new possibility. The latest trick out of ICT’s hat that is cognitive computing holds the promise of delivering computers and systems that can think and evaluate like humans do and then make an evaluated response based on past experiences recorded in its memory. Increasing developments in the field of cognitive computing are being aimed to relieve humans from a number of undesired tasks like supervision of industrial processes and decision making at various processes. The market for cognitive computing is huge, with a number of applications and implementations coming up every day, and as machines become smarter and smarted, the scope is virtually endless.

MOST TRUSTED

Software System Integration Partner..!

BEYOND SYSTEM INTEGRATION Big Data | Cloud | Mobility | Social Media BFSI | Education | Energy | Healthcare | Hospitality BI & Analytics | CPM | ECM | GRC info@finessedirect.com | www.facebook.com/finessedirect | www.finessedirect.com SEPTEMBER 2016

ENTERPRISE IT WORLD

21


FEATURE // HACKING

THE HACKING MENACE

ARE YOU SAFE?

THINK AGAIN The recent Scorpene Submarine leaks brought to light a problem that India has now been dealing surreptitiously for a long time. Hacking has grown prominently over the last few years reinforcing the need to better organizational defense systems. BY CHITRESH SEHGAL CSEHGAL@ACCENTINFOMEDIA.COM

A

s experts have forever pointed out, Security is not a guarantee, it is an ongoing process. The proliferation of information technologies in the organizational infrastructure has led to a surge in digital data that is not just surreptitious but highly critical for organizations. Government organizations, and enterprises, big or small are all vulnerable to being hacked at one time or the other. Most organizations of the day have outdated security perimeters which enables black hat hacking groups to be able to penetrate through their defense systems and get hand on their private data, which they then leverage in unethical ways that are indeed damaging to the organization.

who breach perimeter defenses and find vulnerabilities and loopholes in systems. Their impact on organizations varies from strengthening of the security structure to information leak depending upon their moral compass. Although hacking originally did not relate to illegal practices, a number of unethical intrusions by ‘Black Hat’ hackers have left the term in a perpetually controversial hue. Google the term and almost every day, one is able to find fresh news of hacks and leaked data involving organizations both government and private. From banks and hospitals to government agencies and private enterprises, hacking is a dread word for anyone with vital data that needs to be safeguarded from wrong hands.

The ‘H’ Word Hackers in literal terms are computing experts

The Global Restlessness The internet transformation across the globe

22 ENTERPRISE IT WORLD

SEPTEMBER 2016

has resulted in all kinds of organizations using all kinds of networks. Databases and operations have shifted online in servers and cloud, in the process exposing sensitive data to unauthorized personnel intruding in the network. As AltafHalde, Managing Director - South Asia, Kaspersky Lab ponders, “Today no one on the worldwide web is 100% safe or 100% protected against malware, malicious programs, hacking etc.Targeted attacks are increasing and will continue to increase. We also foresee the threat landscape increasing on Critical Infrastructure installations across the world.” Attacks on government organizations, secret agencies, noted politicians and celebrities and even online businesses carrying vast databases of consumer information have forced the world to recognize coordinated cyberattacks as a genuine threat. BalaMa-


HACKING // FEATURE

of their targets. Most of the organizations today are vulnerable to Advanced Persistent Threats (APTs), Adware and Spyware, Zero-day Attacks, Distributed Denial of Service (DDoS) and Ransomware.”

BALA MAHADEVAN, CEO, ORANGE BUSINESS SERVICES

“Although most users have the best of intentions, use of shadow IT is a

serious problem for the public sector.”

hadevan, CEO, Orange Business Services states, “Cyber security is of utmost importance in today’s world especially with the rise of hacking activities around the globe. When cyber spies’ hacking activity does come to light, finding the perpetrator is next to impossible, even when the originating IP addresses for attacks are found in a particular country, the country still enjoys plausible deniability.” Incessant targeting and successful leaks have now ensured that no organization across the globe sees cybersecurity as a secondary aspect of businesses’ IT operations. Hacker Modus Operandi The method of attack typically varies with each hack and depends on what is being hacked and how. Hackers may use a simple WiFi duplication to log on to databases, or try breaching perimeter defense by evaluating the security and finding vulnerabilities. Sunil Gupta of Paladion Networks opines, “The modus operandi is to exploit vulnerabilities in web and mobile applications or network and end points, and use those security gaps to deploy a strategic attack campaign that target critical business assets. Cyber criminals are patient and will wait weeks and even months to complete a successful attack.” Each major hack and how it takes place is very different from others. Marc Khalberg, CEO and

ALTAF HALDE, MANAGING DIRECTOR - SOUTH ASIA, KASPERSKY LAB

“Every CIO includes in their company’s IT policy a very strong IT Security

education program.”

Director; Vital Intelligence Group puts it, “The methods, strategies, tactics and indeed entire modus operandi changes from hack to hack. Some may use privilege elevation exploits built into their own malware, some may use distinct tools that make it easier to track and locate or even detect in advance, some do not use exploits to infect target, they rely on social engineering and their attacks are carried out in stages.” Methods are many, and so are types of attacks. But it all boils down to how vulnerable is the organization to being breached. “Cybercriminals look for weaknesses in software code that would allow them to send threats into the network. Many of these vulnerabilities are widely documented, and even have fixes, but companies still struggle to keep up with patching. Unfortunately vulnerabilities in software are never going to be eradicated so organizations of all sizes need to stay vigilant in the security of their networks and data,” remarks Sunil Sharma, Vice President - Sales, India & SAARC at Sophos. Another big point to make is that these cyber-terrorists are improving and getting more proficient with each passing day, and in turn, so are the threats. Sanjay Katkar, CTO & MD, Quick Heal Technologies opines, “The threats are now more sophisticated and nastier and the hackers are using more creative means of entrapment

Organizational Vulnerability Leveraging ICT in organizational processes has a huge scope of applications and benefits. However, in this case, the benefits do not outdo the risks. Organizations today juggle around different workforce and workplace based technologies and concepts, which in turn heightens the susceptibility to outsider intrusion. As Rajesh Maurya, Regional Director, India & SAARC for Fortinet remarks, “Networks are currently undergoing a dramatic change. Organizations are simultaneously wrestling with issues such as BYOD, IoT, virtualization, SDN, cloud, the proliferation of applications, Big Data, and the expectations of the next generation of employees to blend their work and their personal lives on a single device of their choosing, with instant access to any data, at any time, from any location. Unfortunately, many organizations continue to rely on security strategies developed decades ago that can no longer support the ever-increasing speed of business. All this has exponentially increased the attack surface resulting in more hacking incidents being reported.” As such the Scorpene Cyber Attacks were no different than any other big time breach of sensitive databases. “This incident isn’t the first of its kind, but follows numerous incidents involving the theft of sensitive data, such as personally identifiable information (PII), intellectual property or strategic and national security related materials. Any organization or government entity operates with this information under their care, so it is expected that attackers will target them,” statesSatnamNarang, Senior Security Response, Symantec. Orange CEO BalaMahadevan believes that the increasing organizational susceptibility is due to the large number of cloud based servers in use today, which gives rise to the problem of shadow IT, “No organization, private or public can be absolutely safe from a hacking attack. Shadow IT has become a major problem in the public sector as users flock to cloud services to carry out their day-to-day work in government administration. Research from Skyhigh Networks found that 742 cloud services were being used in the average public sector organization, which is around 10 times more than the IT department expects. Although most users have the best of intentions, the use of shadow IT is a serious problem for the public sector.”

SEPTEMBER 2016

ENTERPRISE IT WORLD 23


FEATURE // HACKING

MARC KHALBERG,

SUNIL SHARMA,

CEO AND DIRECTOR; VITAL INTELLIGENCE GROUP

VICE PRESIDENT - SALES, INDIA & SAARC AT SOPHOS

“The methods, strategies,tactics and indeed entire modus operandi

“A coordinated system of security products across endpoints, servers,

networks, web and email are required.”

changes from hack to hack.”

Traditional Defense and Now Conventionally, computer systems safeguarded themselves through anti-virus software and IT perimeter defenses. However with the evolving threat landscape, this is just not enough, “In reality most anti-virus software solutions are the most outer layer of an almost false sense of security, they will assist and help against the basics but to provide a comprehensive overview in a short space during a short interview is not professional.” Vital Intelligence Group’s Khalberg continues, “Our studies have led us to believe there is a

massive gap in the awareness stage to the defense and security stage. Aspects like credibility, reputation, stability and many other factors may play a deciding role in even disclosing if an organization has been hacked.” As per a latest SANS report, 66% of the organizations lack threat incident response management. This is indeed very alarming, as cyber attackers today are evolving with each passing day. “The frequency of high profile data breach suggests that even well-resourced IT organizations struggle to adequately protect their networks,”

opines Sophos’ Sunil Sharma. He continues on the organizational need of the hour, “The type of security required to stay secure depends on the nature of the data or process a business needs to protect. Healthcare, finance and governments are often required to demonstrate that they are adequately protecting their business, which may require more stringent security measures than the average business. The average business is likely to be transacting online and is facing the same threat landscape as a major corporation. A coordinated system of security products across endpoints, servers, networks, web and email are required.” The organizational cyber security of today is a mix of a number of dedicated products as Quickheal’s Sanjay Katkar reiterates, “Today, hackers are proliferating at an exponential rate and the attacks are multi-faceted, sneakier, and technologically more advanced. In order to secure the hardware and networks from these cyber threats, an organization should include measures like Firewall, IDS and IPS, Virtual Private Network, Gateway protection and Web filtering in their IT infrastructure.” Advice from the Industry The Industry believes that employee awareness is as critical to an organization’s cyber security as is its IT infrastructure. Kaspersky’s AltafHalde understands, “Companies spend 80% of their security budgets on trying to prevent security breaches and only 20% on predicting, detecting and responding to attacks. Attackers that manage to break into the network can then siphon data away while remaining undetected. So companies need to invest their security resources in a more diverse way.” He adds, “Organizations invest a lot of money in buying the best of network

Exploit Delivery Weaponization

Command and control Internal Reconnaissance

Reconnaissance

Maintaining

7 PHASES OF A CYBERATTACK 24 ENTERPRISE IT WORLD

SEPTEMBER 2016


HACKING // FEATURE

SANJAY KATKAR,

RAJESH MAURYA,

CTO & MD, QUICK HEAL TECHNOLOGIES

REGIONAL DIRECTOR, INDIA & SAARC, FORTINET

“Hackers are proliferating at an exponential rate and attacks are multi-

faceted, sneakier, and more advanced.”

“Securing networked environments

requires Collaborative intelligence Segmentation and Universal policy.”

and endpoint security solutions etc. But in many cases, compromises happen due to lack of education of users. Every CIO should include in their company’s IT policy a very strong IT Security education program not only for the IT team but also for senior managers, entry level employees and everyone in between.” Symantec’s SatnamNarang exhibits the same sentiment, “While prioritizing securing this sensitive data is critical, and reviewing existing security measures is vital, it is especially important for organizations to have a proper incident response plan in place as well as regularly offer education and awareness training programs for their employees and executives.” Traditional revolutionary cyber tools like firewall are now no longer trustworthy. Rajesh Maurya from Fortinet states, “A growing number of network threats today are designed to avoid detection by bypassing traditional firewalls with ease. Organizations need to run regular threat assessments on their networks to quickly detect the threats other solutions are not intercepting to help significantly increase protection, while decreasing business risks.” He further

SEPTEMBER 2016

ENTERPRISE IT WORLD 25


FEATURE // HACKING

SATNAM NARANG,

SUNIL GUPTA,

SENIOR SECURITY RESPONSE, SYMANTEC

PALADION NETWORKS

“While prioritizing securing this sensitive data is critical, and reviewing

“Cyber criminals are patient and will wait weeks and even months

existing security measures is vital.”

to complete a successful attack.”

TOP 5 RECENT

CYBERATTACKS 1.

Scorpene Submarine Leaks, India – France– Leak of 22,000 pages of sensitive documents first reported in Australian Media

2.

2016 BangladeshBank Heist, Bangladesh– Approx $951 Stolen from Bangladesh Bank's Reserve via fake SWIFT request

3.

2015 OnlineBank Heist– 30 Countries including USA, UK, France, Germany – Over $1 Billion from vulnerable hotspots across the globe

4.

Home Depot, USA– Card Information of 56 Mn customers was stolen. Total cost of breach was evaluated at $62 Million

5.

Anthem Customer Records Breach, USA– Personal Information of 78.8 Million people breached from US' largest health insurer

26 ENTERPRISE IT WORLD

SEPTEMBER 2016

suggests, “The response to increasingly complicated networked environments needs to be simplicity. Securing these evolving environments requires three things: Collaborative intelligence, Segmentation and Universal policy.” A holistic approach towards organizational security is the need of the hour, according to BalaMahadevan of Orange, “One needs to stay updated always regarding various new hacking threats, enforceuser names and passwords that cannot be guessed, tighten network security and install security applications as well as web application firewall.” Sophos’ Sunil Sharma believes reviewing and reforming of security capabilities is critical, “Hackers will continue to find out the weaker link and hence it is very important for all organizations to conduct regular security reviews so their protection is adequate for their business at all times.” He further states that any organization with a well-structured approach to cyber security is bound to have a lesser number of breaches, “There is no doubt however that with security solutions designed to work better together, combined with best practice and employee education programs can dramatically improve the security of any organization and reduce the risk of becoming a victim.” Closing out One thing certain is that Hacking or Cybercrime are here to stay. The Information age has interconnected the world with countless systems collaborating and functioning from far away. Insecure systems and vulnerabilities in new software and technologies will always be highlighted and taken advantage of by hackers. HoweverWith sufficiently sophisticated legislation, and more international cybercrime treaties such as being adopted, the world is hopefully heading in the right direction, with the long term aim being a safer, more law-abiding cyberspace. However, a lack of organizational awareness, underdeveloped security infrastructures and the reluctance in IT cyber security spending has been giving hackers the license to breach these organizations, leak their confidential data or hold them to ransom. It is inevitable that the fraternity of hackers and cybercriminals will always be one step ahead of enterprises and organizations. The need for better defense mechanisms is undeniable, and it is time that cybersecurity takes a priority position in organizational agendas and boardroom meetings.


EMC // CIO CORNER

“In fact, customers of our AFA Solution, XtremIO, are dramatically reducing development time and

driving down costs, achieving the agility they need to remain competitive.”

SRIHARI PALANGALA, DIRECTOR AND HEAD OF MARKETING AT EMC

HALF OF CIOS IN INDIA PLAN TO MOVE TO AN ALL-FLASH DATACENTER BY 2020

B Y S A N JAY @ A C C E N T I N FO M E D I A . C O M

70 percent ofenterprises expectto have an all-flash storage infrastructure to support business critical applications by 2020 according to a Frost and Sullivan survey

T

he findings of EMC-sponsored research from Frost and Frost & Sullivanreveals that all-flash storage is rapidly becoming the storage technology of choice for CIOs in India. One in two CIOs surveyed in the ‘Flash Adoption Study’ plan to move to an all-flash datacenter by 2020. This highlights the readiness of enterprises today to accept flash into their IT infrastructure in order to boost agility and mobility against the backdrop of an increasingly complex business

landscape. The study shows aggressive evaluation of flash over the last two years and reveals a commitment to making apositive shifttoward flash. In fact,70 percent of enterprises in India expect to have an all-flash storage infrastructure to support most business critical applications by 2020. The primary goal of all-flash deployment by technology heads and CIOs in India surveyed is operational efficiency; 39 percent of the respondents highlighted it as the number one factor

that determines their technology investment and usage. Speed and agility are critical for the enterprise today as they have strong implications for revenue growth andprofitability. A millisecond delay in application response can lead to delay in sales, loss in brand equity, and evenchurn to competitors. The requirements of new business models and customer experience are highly fluid; hence,CIOs have to be armed with solutions that are easy to manage, and promise 24/7 responsiveness. 70 percentof organizations surveyed stated that flash deliversperformance and agility, with themajority of these enterprises currently using flash technologyto support their mission critical databases including Oracle- or SAP-based business applications (43 percent);Virtualized servers (35percent),and business intelligence and analytics (24 percent).As technologies such as IoT become more pervasive compounding the explosion ofdata, flash storage is expected to be more-widely adopted for business intelligence and analytics Srihari Palangala, Director and Head of Marketing at EMC, said:“In today’s business environment,executives face an unprecedented level of complexity. On top of this, the pressure to produce faster and innovate quicker is increasing. Access to real-time analytics with quicker decision support and real-time development is key, making AFA one of the fastest growing segments. In fact, customers of our AFA Solution, XtremIO, are dramatically reducing development time and driving down costs, achieving the agility they need to remain competitive.” to read the complete article Pls. log on to www.enterpriseitworld.com

SEPTEMBER 2016

ENTERPRISE IT WORLD 27


DATA MANAGEMENT // KODAK ALARIS

“Over 90% of business data is unstructured and the offerings from Kodak Alaris are aimed at harnessing the power of this data through digital transformation efforts.”

HARNESSING THE POWER OF DATA FOR ENTERPRISES

B Y C H I T R E S H S E H G A L C S E H G A L @ A C C E N T I N FO M E D I A . C O M

In India, 90% of the data today is unstructured. Kodak Alaris, with its past credentials in managing Data Chaos across the globe, is poised to become a market leader in Information Management space.

K

odak Alaris Information Management is a company that is fairly new in terms being an independent company. Separate from the legacy Eastman Kodak, it is driving the Information Management transformation across the globe. With the immense potential in terms of the amount of unstructured data across the country, India is by far the biggest market for Kodak Alaris’ information management solutions. This presents a humongous opportunity for companies like Kodak Alaris to spread their wings in India. The Indian Market As per Siddhartha, India is one of the key markets for Kodak Alaris in the Asia Pacific region. He opines, “India is a significant force in the world trade 28 ENTERPRISE IT WORLD

SEPTEMBER 2016

market. We see a huge potential for the growth of Information Management here in the country that will scale up over time. In addition, the Indian government is very reform minded and recent initiatives such as Digital India, especially around land reforms, present a huge opportunity for Information Management to come to the fore and simplify the way works gets done.” Additionally, the driving force behind India’s potential business opportunity for KAIM is the increasing IT spending.Presently, IT spend in Indiais about 2% of the total GDP and 70 % of this


KODAK ALARIS // DATA MANAGEMENT

SIDDHARTHA BHATTACHARYA

VICE PRESIDENT, GLOBAL MARKETING, INFORMATION MANAGEMENT, KODAK ALARIS

IT spend is hardware focussed. As the IT spending percentage of total GDP increases in India, Kodak Alaris expectsthe spending on overall hardware associated with Information Management to increase. Growth and adoption of shared services is another key trend. 90% of Fortune 500 companies have some sort of presence here in India. Siddhartha believes the scanner technology from KAIM can save companies up to 50% of their total cost of ownership, over several years. One of the key focus industries for Kodak Alaris is the BFSI sector.However another potentially key focus would be the government sector.The digital transformation of government bodies and public sector organizations will require Information Management solutions to achieve the goal of digital governance. This presents a big opportunity for Kodak Alaris. As Siddhartha opines, “For the last couple of years, we are supporting the Digital India campaign of the Government of India in a number of different ways.” Other key sectors for information management are manufacturing and healthcare space where huge investments are being made by companies in India. Kodak Alaris has worked with healthcare companies to ensure proper records, be it medical lab or diagnostic reports that need to be maintained,so as to be made available at a click of a button. Game Plan Kodak Alaris hasdeveloped a unique ‘glocal’ approach to marketing, which encompasses global initiatives and also action at the regional level.Siddhartha says, “We have developed global strategies to work hand-in-hand with regions locally, specifically India, in terms of execution and implementation. Hence the focus on ‘Global + Local = Glocal’.” Talking about the go-to-market strategy, Kodak Alaris is concentrating on two aspects - customer centricity and channel expansion. Kodak Alaris’ main competitors in India today are companies focused solely on selling scanners or multi-function printers. KAIM, on the other

hand, is purely an Information Management company. Solving this problem of data chaos is at the core of its business. “We have enableda unique value proposition for our customers around the areas of Productivity, Reliability, Efficiency, Simplicity and Scalability,” adds Siddhartha. Concept of Data Chaos According to Ernst & Young,Digital information in India is expected to grow to about 2.3 million petabytes in the next decade. As per Kodak Alaris, 90% of this data is unstructured data. Less than 10% of organizations today in India are currently equipped to manage the structured data. But at the same time, about 60% of organizations acknowledge that the unstructured information is growing out of control and is driving the big data explosion. This presents an opportunity for companies like Kodak Alaris helping customers harness the value of unstructured (and structured) data. “That’s where our USP comes into play. There are three things that set us apart - the Science, the Technology and the Eco-system. Let me expand on each one of them.” Siddhartha continues, “Kodak Alaris has a focus on delivering the best imaging science experience. We have the image scientists, we have R&D, and we have numerous patents in this area and we have decades of experience in the business. We have been awarded the BLI Scanner Line of Year 2016 award, which is a great testament to the fact, that our hardware and software is recognized industry wide as one of the best.” Kodal Alaris is focused on providing a total solution which is inclusive of hardware, software and services. The Company has launched campaigns which are based on how users can make the journey from data (bits and bytes) to information to intelligence. “Essentially, there are two kinds of data out there – structured data and unstructured data. Over 90% of business data is unstructured and the total set of offerings from Kodak Alaris is really aimed at harnessing the power of this data through digital transformation efforts,” states Siddhartha.

Enabling Enterprises KAIM has been supporting the Digital India campaign. The Modi government has defined 31 mission node areas, where the national government is looking for better products and solutions, so as to serve citizens with easy filing of income tax returns, and getting your passports in a short time frame. Kodak Alarisis involved in both these project. Additionally, Kodak Alaris has set up teams that work very closely with the state governments where all these nodes have been set up. Recently, KAIM has launched their Info Input Portfolio of web based document capture solutions. This provides an efficient way to integrate captured digitized documents into existing ECM line of business application. Other key offering launched arenew wireless scanners - Kodak Scan Mate i1150WN and Kodak i1190WN Scanners, geared towards taking the capture process to the end user. Also, Kodak Alaris has entered into a partnership with Google for their IoT platforms Brillo and Weave, which allows for simplification of Document Capture for mobile and web connected users.As per Siddhartha, this has paved the way for faster adoption of new technology, low implementation costs, thereby making document capture, customer on-boarding of new information into business process more efficient. He adds, “We are investing heavily in our software solutions portfolio to make it even more powerful in the near future, so we can take advantage of the 90% of the business data that is unstructured.” Analytics is a big part of data management. Kodak Alaris is working aggressively to build up a software solutions portfolio, aimedat creating a platform with an open API structure. The vision is to have a cloud based platform strategy through which KAIM may partnerwith any company. Siddhartha adds, “Our overall aim is to offer analytics and the insights that are the key components of unstructured data.” Finally The key for Kodak Alaris is about building a new value proposition around harnessing the value of data. The company is in the midst of huge shifts with regards to accelerating growth in India. The company is truly committed and have invested in new sales and marketing avenues as well as new channels and service centres. Siddhartha Bhattacharya concludes, “We are here for a long run which is indicated by good work we are doing in some of the key segments that are growing here in India, and our goal is to continue to make inroads in those segments.” SEPTEMBER 2016

ENTERPRISE IT WORLD 29


THE STUFF  //  PRODUCTS & SERVICES

FORTINET’S

BROCADE

Fortinet’s First Universal Wireless APs

Fortinet’s new FortiAP-U series of universal wireless access points (AP), designed to reduce complexity with the most flexible, enterprise-grade wireless solution on the market. Fortinet’s innovative universal APs combine truly unified access network control and visibility

with the superior protection of Fortinet’s Security Fabric. Fully integrated within the Fortinet Security Fabric, the FortiAP-U series devices deliver unified protections for the network edge with security functions and application controls. Seamless Security Fabric integration also

enables access network segmentation capabilities to deliver the only security strategy capable of protecting enterprises against threats targeting IoT and endpoint devices before they can access critical internal data. FortiAP-U series universal APs simplifies deployment and administration

of access networks, offering a single appliance that is compatible with all Fortinet access management platforms – including FortiWLC enterprise wireless LAN controllers, integrated with FortiGate enterprise firewall LAN controllers and FortiCloud’s controllerless cloud wireless management.

CAPABILITIES… •  Innovative plug-in-play implementation, enabling each device to automatically determine the type of  management backend. •  Pulls down configuration information to deliver rapid deployment without the need for IT to manually update  every appliance. •  Designed to suit the wireless needs of the largest enterprises with cutting-edge 2 802.11ac Wave 2 features  such as quad spatial streams, extended 5 GHz channel support. •  Maximize bandwidth and device capacity, supporting even the most-dense wireless needs with multi-gigabit  throughput. •  Provides advanced security and unified visibility for all of the devices connected to the network.

Brocade Gen 6 Fibre Channel Storage Network Solutions Brocade first Gen 6 Fibre Channel directors for mission-critical storage connectivity and business resiliency solutions are designed for the all-flash data center. This extends the company’s leadership in offering the industry’s most innovative and widely deployed Fibre Channel storage network solutions, building on the first Gen 6 Fibre Channel switch that Brocade delivered in March 2016. The new Brocade X6 director family and the Brocade SX6 extension blade for Fibre Channel, Fibre Connection (FICON) and IP storage replication, combined with Brocade Fabric Vision technology, enables customers to drive alwayson business operations, eliminate performance bottlenecks and adapt to the requirements of digital organizations. CAPABILITIES… •  Unleash the full value of today’s flash  technology and enable tomorrow’s  next-generation flash storage based on  Non-Volatile Memory Express (NVMe). •  Customers will be able to seamlessly  integrate NVMe over fabrics with  Brocade Gen 6 Fibre Channel. •  Gen 6 Fibre Channel provides  the digital enterprise with non-stop  availability and incredible performance  required for hyperscale data centers

RUCKUS

B Y S A N JAY @ A C C E N T I N FO M E D I A . C O M

RUCKUS ZONEFLEX H510 AP Ruckus Wireless’ ZoneFlex H510, a wall-plate access point (AP), features an integral wired switch and 802.11ac Wave 2 technology. The new AP is ideal for hotels, multi-dwelling units and student housing where Wi-Fi is often a cost of doing business due to the everincreasing number of wireless connected devices in these environments. The ZoneFlex H510 is a converged Wave 2 802.11ac AP and Ethernet switch in a

30 ENTERPRISE IT WORLD

SEPTEMBER 2016

compact and discrete wall-plate form-factor. It enables multiple wired and wireless connectivity options with a single Ethernet cable drop. Featuring multi-user MIMO support, H510 delivers reliable, best-in-class Wi-Fi performance using BeamFlex+ adaptive antenna technology to adapt to mobile client device location and orientation. CAPABILITIES… •  1,166 Mbps aggregate radio throughput

•  5 Ethernet ports •  1 rear-facing 10/100/1000 & PoE in •  4 front-facing 10/100/1000, single PoE out •  Support for snap-on radio modules to support  value-added services & connectivity beyond Wi-Fi




Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.