RS 20
|
PA G E S 3 2
|
V O LU M E 0 1
|
ISSUE 05
WWW.ENTERPRISEITWORLD.COM
JUNE 2016
ENTERPRISE
SECURITY The inception of digital in the country has come with its own price in the shape of cybersecurity. As connectivity grows, more and more enterprises are facing intrusions and unlawful activities like denial of service and database theft. ... p16
AN OPINION ON
THE EVOLVING CIOS – HANDLING ENTERPRISE SECURITY
...p15
EXCLUSIVE INTERVIEW
DR. KESHAB PANDA
ENABLING ENTERPRISESTO TAP THE DIGITAL ...p26
ISSUE SPECIAL
MICROSOFT AZURE ENABLING ISVS
...p22
R
EDITOR’S LETTER
of the third world countries are victim of cyber-attacks. he irst and foremost reason being these countries are attracting billions of dollars as investment for the development of infrastructure projects.
of attention from the cyber crooks. India’s government projects are certainly vulnerable. Government has started taking every citizen centric activities online and these services are ofered with very minimal cyber defense – neither too strong at the server level nor too strong at the client level. Very recently, the cyber-attack on the IIT server had let every one gaping. It was discovered by IIT-Guwahati oicial and there were unusual hits from unusual IPs. And the result publication for more than one lakh aspirants was delayed. Similarly, there are other citizen services including electricity and water bill pay, house taxes, income tax iling, which have become online these days and people are participating increasingly, there might be a person or group of person on the other side lurking for opportunity to sneak inside and ambush. hey will not only take your personal information but also your bank details to surprise you later. As per KPMG, 72% of businesses had sufered cyber-attacks last year. As per VMWare, nearly 8 in 10 IT and C-suite business leaders experiencing increased cyber-attacks on their irms in 2015. As per Kaspersky India among top 5 countries to have sufered from ransomware attacks. So all these data points leading to a fact that enterprises and government have to enhance their budget towards security. It used to be only the BFSI which invested heavily on the cyber security but today organizations across the verticals seeing attacks. It has not spared the education segment too. herefore, the organizations need to be cognizant about the importance of the data and keep looking at it seriously in order to keep the data safe.
We have been hearing news about North Korea hacking, South Korea’s important sites, Chinese hackers penetrating deep into US websites, so also Pakistani hackers defacing Indian oicial websites, etc. his is for sure that India being the fastest growing countries from the infrastructure perspective, it is natural that the inlow of investment is really humungous and it can surely bring a lot
S A N J AY M O H A PAT R A S A N J AY @ A C C E N T I N F O M E D I A . C O M
ENTERPRISE SECURITY TO GROW IN INDIA Why enterprise security opportunity in India to grow multifold? It is a fact that most
NEXT MONTH SPECIAL
COVER STORY
FEATURE
Office Automation
UC
Enterprises today are going automated services across the requirements. It is impacting all across technologies including printing solutions, communciation, security and surveillence, etc.
Unified Communications or UC is known to be the lifeline of the businesses. Therefore the evolution in the technology is faster than other.
PLUS
CXO Challenges With UC market evolving faster, the CXOs find it a very different decide whether to go on on prem or SaaS.
Send in your inputs to sanjay@accentinfomedia.com
4
ENTERPRISE IT WORLD
JUNE 2016
CONTENTS VOLUME 01
|
ISSUE 05
|
JUNE 2016
|
W W W. E N T E R P R I S E I T W O R L D . C O M
Publisher: Sanjib Mohapatra Editor: Sanjay Mohapatra Designer: Ajay Arya Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan Satya Sagar Sinha Lead Visualizer: DPR Choudhary Visualizer: Ravish MARKETING Marketing Manager: Raja Rao Apa SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016 Phone: 91-11-41055458
COVER STORY
E-mail: info@accentinfomedia.com EDITORIAL OFFICE
16
Delhi: 6/103, (GF) Kaushalya Park,
ENTERPRISE SECURITY
New Delhi-110016,
The inception of digital in the country has come with its own price in the shape of cybersecurity. As connectivity grows, more and more enterprises are facing intrusions and unlawful activities like denial of service and ...
Phone: 91-11-41657670 / 46151993 editor@accentinfomedia.com
Printed, Published and Owned by Sanjib Mohapatra Place of Publication: 6/101-102, Kaushalya Park, Hauz Khas New Delhi-110016
PRODUCTS /30
Phone: 91-11-46151993 / 41055458
HPE
MORE INSIDE
HPE OneView 3.0
Editorial ~~~~~~~~~~~~~~~~~~~~~~~~~ 04 News ~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06 Products ~~~~~~~~~~~~~~~~~~~~~~~~~ 30
Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New Delhi 110020, India. All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info Media Pvt. Ltd.
15
24
26
28
30
CXO
SOLUTION CORNER
INTERVIEW
GUEST COLUMN
PRODUCTS
Finesse
Progression
L&T Technology
bisc
COSEC
“The Evolving CIOs – Handling Enterprise Security”
“Enabling Companies to be RealTime Businesses”
“Enabling Enterprisesto Tap the Digital”
“National Optical Fiber Network (NOFN). How Can We Make It Better?” JUNE 2016
“COSEC ARC DC 100P”
ENTERPRISE IT WORLD
5
INTERVIEW INISDE
Enabling Enterprisesto Tap the Digital Evolution Page 28
ITWORLD
ROUND UP
GOI IT Spending to Touch USD 7Bn in 2016
B Y S A N JAY @ AC C E N T I N FO M E D I A . C O M
Gartner Says the Government of India will have spend $7 Billion on IT services in 2016 an increase of 3.1 percent from last year he government in India will spend $7 billion USD on IT products and services in 2016, an increase of 3.1 percent over 2015, according to Gartner. his forecast includes spending on internal services, sotware, IT services, data center, devices and telecom services. Government comprises state and local governments and national government. As per the release, IT services which includes consulting, sotware support, business process outsourcing, IT outsourcing, implementation, and hardware support is expected to grow 8.8 percent in 2016 to reach $1.6 billion USD – with the business process outsourcing sub-segment growing by 22 percent. Telecom services will be a $1.5 billion USD market, with the mobile 6
ENTERPRISE IT WORLD
JUNE 2016
network services sub-segment recording the fastest growth of 3.5 percent in 2016 to reach $793 million USD. Internal services will grow 5.8 percent in 2016 to reach $1.5 billion USD. Internal services refer to salaries and beneits paid to the information services staf of an organization. he information services staf includes all company employees that plan, develop, implement and maintain information systems. Moutusi Sau principal research analyst at Gartner said, “Government spending on sotware will total $938 million USD in 2016, a 9.9 percent increase from 2015. he sotware market will be led by growth in infrastructure. he ‘Digital India’ initiative continues to be drive investments in the government, led by access of government services on mobile devices (part of the mobile government), and expansion on broadband services.”
D ATA BRIEFING
90 percent of airlines plan to invest in cyber security programs over three years.
11th NOVEMBER 2016 Venue: HOTEL EROS, MANAGED BY HILTON, NEHRU PLACE
MEET THE LEADERS’ UNDER ONE ROOF BOOK YOUR PARTICIPATION NOW! OFFICE: 6/103, Ground Floor, Kaushalya Park, New Delhi-110016, E-mail: info@smechannels.com, Phone: 91-11-41657670 / 46151993
FOLLOW US:
SME Channels - Magazine
SMEChannels.com
SMEChannels India
smechannels.com
ITWORLD // NEWS BRIEF
Wipro Awarded for Contribution to Lean Microsoft India Cyber Security Engagement Center
Microsoft India Unveils New Cyber Security Engagement Center Deepening its commitment to enhancing cybersecurity, Microsot has announced the opening of its Cyber Security Engagement Center (CSEC) in Gurgaon, India. he CSEC aims to drive publicprivate partnerships to ight cybercrime, strengthen the cooperation with Indian businesses, government and academic organizations on cybersecurity, and increase its contribution towards securing Indian computer and internet users from cybercrime threats. It brings together Microsot’s Digital Crime Unit experts comprising attorneys, investigators and security response experts from across the company. he Gurgaon center is one of the seven centers globally and will serve as a dedicated hub for Microsot in India. As per the press release, Microsot’s advisory security services to enterprise
customers will include support to architect a secure infrastructure as well build global best practices on preventive measures for a safer internet ecosystem. he CSEC will leverage Microsot’s DCU Cyber hreat Intelligence Program that monitors and analyze malware infections; provide malware threat assessment and provide actionable information and intelligence for select IP infrastructures shared by its customers on a non-commercial basis. Microsot’s CSEC will combine the company’s technical proiciency as well as cutting-edge tools and technology with cross-industry expertise to efectively reduce digital risks. It will work with the National Cybersecurity Coordinator as well as the CERT-India and share information to help reduce malware and digital risk in the country, enabling a safe digital India.
GLOBEL
EVENTS
29 JUNE02 JULY
04-06 JULY
06-07 JULY
25-27 JULY
ISSY-LESMOULINEAUX, FRANCE
MELBOURNE, AUSTRALIA
VALENCIA, SPAIN
IRÁKLEION, GREECE
EUCNC Brings together worldwide research and innovation community in the strategic domain
8
ENTERPRISE IT WORLD
Wipro Limited has received the Citi Lean Partner award for 2015 from Citi in recognition of its high levels of service and performance. he Lean Partner Award recognizes a supplier that has supported Citi in the execution of its re-engineering objectives and supported its efort to drive client-centric process redesign throughout the company – improving the way Citi operates. he award also recognizes the supplier who has most embodied the spirit of Lean, a continuous improvement program with tangible and measurable beneits as it relates to purpose (rapid and consistent turnaround time for services delivered), quality, eiciency, controls and overall Rishad Premji, Chief Strategy Officer and customer experience, said Member of the Board, the release. Wipro Limited On receiving the award from Citi, RishadPremji, Chief Strategy Oicer and Member of the Board, Wipro Limited said, “We have enjoyed a long-standing and fruitful relationship with Citi and are delighted to be recognized with this award. his award is a testimony to our alignment with Citi’s objectives.”
JUNE 2016
ACISP Industry and Government presentation on all aspects of information security and privacy primitives or protocols
CARMA 2016 Forum for researchers and practitioners to exchange ideas and advances
TEMU Discussions on recent advances in wired and wireless communication systems, audiovisual applications and content creation
NEWS BRIEF // IT WORLD
S/HE SAID IT
DR GULSHAN RAI, COORDINATOR, NATIONAL CYBER SECURITY
“We require an international legal framework because of the crossborder issues. We are storing data on the clouds but do not have any idea about their location. So a legal framework will definitely help us,”
India on Top as Demand for Advanced DevOps High in AP& J Region: Survey CA Technologies study reveals rapid momentum of DevOps adoption in India as 78% IT leaders has already adopted it in some form Indian companies are rapidly adopting DevOps reveals a recent global survey “Assembling the DevOps Jigsaw” by CA Technologies. In Asia Paciic & Japan region, India ranks No. 1 in the market with 24% adoption of Advanced DevOps. Interest is high because DevOps is a key component of satisfying customer and becoming more agile. Businesses have realized DevOps enables them in keeping pace with escalating customer demands, creating new and innovative customer experiences and rapid response to requests from business. As per the release, the global online survey of 1,442 senior IT and business executives highlights that 78% of Indian IT leaders in India have implemented some aspect of DevOps to launch new services or applications faster than before, due to increased customer demands. his is second to China (83%) in Asia Paciic & Japan region. In APJ, as compared to those without DevOps, advanced DevOps adopters were more likely to have seen improvements in customer retention, customer acquisition, more likely to have seen progress on market share, improvements in customer proitability and new income streams. According to the survey, the top three demand drivers in APJ for implementing DevOps were to keep pace with escalating customer demands; to have rapid response to business requests, and to create new and innovative customer experiences.
QUICK BYTE ON
FINANCIAL
“Our currency has been stable as investors have gained confidence in our monetary policy goals. Foreign capital inflows will be more reliable and increase in the longer maturity buckets, including in rupee investments and this will expand the pool of capital available for our banks and corporations.” R AG H U R A M R A JA N , R B I G OV E R N O R
Cognizant Technology Solutions reported a sequential decline in revenue in revenue in the quarter to March marking the Nasdaq-listed firm’s slowest start to a calendar year since 2009.
JUNE 2016
ENTERPRISE IT WORLD
9
ITWORLD // NEWS BRIEF
Tally Updates ERP in Compliance with New Govt. Regulation
IBM and Cisco Unite to Transform Industrial Analytics Cisco and IBM have entered a global collaboration to provide instant IoT insight at the edge of the network. Now, businesses and organizations in remote and autonomous locations will be able to tap the combined power of IBM’s Watson IoT and business analytics technologies and Cisco’s edge analytics capabilities to more deeply understand and act on critical data on the network edge. Today, billions of interconnected devices and sensors are gathering vast amounts of real-time data about the physical world. In recent years cloud computing has ofered companies a powerful way of storing that data and turning it into valuable insight. But for businesses without easy access to high bandwidth connectivity, these capabilities are sometimes out of reach
EXECUTIVE
or take too long. To address the problem, IBM and Cisco have joined forces to ofer a new way to produce immediate, actionable insight at the point of data collection. he new approach is designed to target companies operating on the edge of computer networks such as oil rigs, factories, shipping companies and mines, where time is of the essence but bandwidth is oten lacking. Harriet Green, GM, IBM Watson IoT, Commerce & Education said, “he way we experience and interact with the physical world is being transformed by the power of cloud computing and the Internet of hings. For an oil rig in a remote location or a factory where critical decisions have to be taken immediately, uploading all data to the cloud is not always the best option.”
Embeds Krishi Kalyan Cess in all versions of Tally.ERP 9 to enable businesses in India to seamlessly implement the new cess Tally Solutions has announced that all versions of its lagship product, Tally. ERP 9 have been enabled to support the newly passed Krishi Kalyan Cess through an update. his is done to support Indian businesses in complying seamlessly with the government regulation, efective from 01 June 2016. Implementing the new cess will be fast and smooth for all businesses that use Tally.ERP 9. he Krishi Kalyan cess at 0.5% has been introduced by the Union Government for the purpose of inancing and promoting initiatives to improve agriculture thus revising the new rate of service tax to 15%. In Tally.ERP 9, the Krishi Kalyan cess is auto calculated in transactions, be it regular sale, reverse charge, sale of service with abatement or sale value which is inclusive of tax. he printed invoice will also display the cess value. Additionally, provision has been made to allow adjustment of Krishi Kalyan cess credit against Krishi Kalyan cess liability, and to account for interest and penalty on the cess, said the release.
MOVEMENT NEC India Announces New MD Takayuki Inaba. He will be responsible for leading and expanding NEC India’s business oferings in the country. F-Secure Promote Samu Konttinen to President. Was earlier the Executive VP of Consumer Business of Fortinet
10 ENTERPRISE IT WORLD
JUNE 2016
Adobe Announce Kulmeet Bawa as MD South Asia. Kulmeet will lead Adobe’s customerfacing engagements in India. Cybersecurity Veteran Kelly Bissell Joins Accenture. Will be responsible for spearheading expansion of Accenture’s security business.
Verizon appoints Kalyani Sekar as new MD for India’s IT Operations. Will lead a 6,700member workforce responsible for India IT & Technology operations
NEWS BRIEF // IT WORLD
Ricoh Takes Enterprise Communication and Collaboration to Next Level Ricoh announced today a new solution that embraces the diverse nature of collaborative eforts that drive the new world of work and will be on display at InfoComm16 in the Ricoh booth, N647. he RICOH Uniied Communication System RICOH Unified Communication System P3500M builds on the P3500M successes of its predecessors to enable collaboration and communication between this portable, all-in-one system and any WebRTC-compatible platform. Using the P3500M, organizations can achieve new levels of collaboration. Employees can connect and collaborate with colleagues, customers and partners on the road or around the world, via real-time HD video and audio, and screen sharing, regardless of which WebRTC-supportive system they are using. A great addition to organizations that already have uniied communication systems in place, the P3500M works seamlessly within multivendor environments, adding a level of portability not oten seen in a market commonly associated with high-end, room-based systems. he P3500M, similar to the RICOH Uniied Communication System P3500, is about the size of a laptop and just as versatile. he 3.5-pound device includes an HD camera, microphone and speakers that it inside a sot-sided carrying case. Boasting the same simple startup as the P3500, the P3500M can be unpacked, plugged in, connected and made entirely ready in about 60 seconds. John Brophy, Vice President, Product Marketing, Ricoh USA said, “With this line of uniied communication systems, we have always stressed the importance of ease of use and the ability to take the system wherever you need it. he logical extension of that is to make it easy to take your P3500M wherever you need it – even if that’s into a multivendor environment, where collaborators are using diferent communication systems.”
Airtel and Singtel Enable Seamless Data Connectivity across 325 Cities Globally Singapore Telecommunications (Singtel) and Bharti Airtel (Airtel) have joined hands to deliver high-speed, secure data network coverage to Asia-Paciic, the Middle East, Africa, Europe and the US. hey have combined resources into one network to provide high speed data connectivity to 325 cities across the world through 370 Points of Presence (PoP). his will form one of the largest Internet Protocol Virtual Private Networks (IP VPN) globally, according to the press release. Together, Singtel’s 200 PoPs in 160 cities around the world and Airtel’s 170 plus PoPs in 165 cities across India, Africa and the Middle East, will form a new network that ofers a connectivity backbone to enterprises which spans several continents: Asia, Europe, Africa and North America. Under this global network, multinational corporations can maintain line of sight of
INTERESTING
their operations across diferent regions by using high-bandwidth business applications such as cloud applications, uniied communications, video conferencing and sotware-deined networking solutions. Furthermore, the network’s high performance Multi-Protocol Label Switching feature allows customers to enjoy seamless and very fast data speeds. he development of this combined network is timely for India as Foreign Direct Investments (FDI) into the country has increased from US$16 billion to US$22 billion in the irst half of 2015 compared to the second half of 2014. To increase India’s investment appeal further, the Government of India has eased FDI regulations for 15 major sectors in the economy including defence, banking, construction, single brand retail, broadcasting and civil aviation. T
TWEET
egov.
Last week 1722kms of Optical Fibre was laid.Broadband fiber has now reached 52351 GramPanchayats. #TransformingIndia – IT Minister Ravi Shankar Prasad Shows how quickly the country is being connected under the digital initiative Source: http://twitter.com/sanjaymahapatra
JUNE 2016
ENTERPRISE IT WORLD
11
ITWORLD // NEWS BRIEF
Polycom Named ‘Video Conferencing Vendor of the Year’
Oracle Kicks off Phase Two of its Startup Cloud Accelerator Program Oracle has announced the irst group of startup inalists for the Oracle Startup Cloud Accelerator Program. he Oracle Startup Cloud Accelerator Program was launched in April 2016 at Oracle CloudWorld Mumbai to help catalyze India’s startup ecosystem and to provide support to the country’s Digital India initiatives. In a span of four weeks, the program received a tremendous response from early-stage technology and technologyenabled startups. he panel of judges which included the advisors and mentors of the program, as well as senior executives from Oracle reviewed each application to evaluate the business concept, level of innovation, scalability and potential to solve real-life problems for their customers, as well as to make an impact on the segment of society on which they focused. Ater the rigorous evaluation, panelists
chose the following ive start-ups: ExpertRec: a plug-n-play search and recommendation engine for online market places in an easy to use SaaS integration. Customers need to add a single line of code to enable these advanced features on their website. Niyo Solutions: a Fin-Tech startup focussed on alternate payment mechanisms. Ray iCare: a sleep monitoring device, for Epilepsy, Sudden Infant Death Syndrome and Cardiac Attacks. It can be installed on a wall and uses Artiicial Intelligence to notify attacks to care-givers through a mobile app. Tydy: a mobile-irst, automated employee on-boarding platform. It gives executives a clear view on the performance of the on-boarding process – a process that was never before quantiiable.
Gaia Acquires netCORE’s IoT Division; Boosts R&D Expertise Gaia Smart Cities has acquired the IOT division of netCORE Solutions while netCORE will invest in Gaia and continue to support the company through its rapid growth period. his acquisition will create a leading
12 ENTERPRISE IT WORLD
technology and innovation enterprise, diferentiated by its ability to deliver ground-breaking products rapidly. With the Government of India’s ‘Make-inIndia’ and ‘Digital India’ programs supporting Indian companies to
JUNE 2016
build intellectual property and design cutting edge electronics, sotware and telecommunications, Gaia is one of the few companies actively pursuing R&D in these domains. With this acquisition, Gaia is poised to become
Polycom was named the ‘Video Conferencing Equipment Vendor of the Year’, at the 2016 Frost & Sullivan India ICT Awards banquet held on June 2nd at Hyatt Regency, Mumbai. Polycom has been growing progressively in the Indian video conferencing market over the last few years and has provided superior video collaboration solutions for business use. Understanding customer demands and delivering a superior experience enabled the company to capture customer delight. As per the release, the award recipients were judged on a variety of parameters that included revenue growth, market share growth, product portfolio diversity, ‘Video Conferencing key achievements, Vendor of the Year’ and Go-to-Market strategy. It involved in-depth primary interviews of various industry participants and secondary research conducted by Frost & Sullivan analysts. An elite panel of jury members comprising prominent CIOs/ CTOs from the industry evaluated the compiled data and incorporated the end-user perspective. Frost & Sullivan then presented the Awards to companies that received the highest industry rank in each category.
one of the fastest growing end-to-end IOT companies with solutions for both Industrial automation and Smart Cities. he acquisition will generate multiple pro-consumer and pro-competitive beneits to existing marquee customers like India’s largest Dairy companies like Amul, Paras, Parag Dairies; India’s largest
Cement company ACC Cement; Beverages company like Penrod Ricard and many cold chains, warehouses, retail stores across the country. With solutions running 24 paying customers and pilots across another 10, coupled with Gaia’s product customers in Smart Metering, Smart Cities and analytics.
NEWS BRIEF // IT WORLD
BOOK
SELF
The Innovators: How a Group of Inventors, Hackers, Geniuses
GLOBAL UPDATE
Fujitsu Enables ‘Fast IT’ with New Cloud Service K5
AUTHOR
WALTER ISAACSON
PRICE
RS. 467
Fujitsu has announced the ongoing global rollout of its next-generation IaaS and PaaS cloud service, Fujitsu Cloud Service K5. his is the irst cloud computing platform that enables digital transformation through seamlessly integrating traditional IT environments into new cloud-based technologies. he new Fujitsu cloud service accelerates application development and brings together enterprise-grade reliability, performance and scalability with the cost eiciency of open source-based cloud technology. According to the release, a key part of the Fujitsu Digital Business Platform MetaArc, K5 delivers a comprehensive set of technologies designed to enable organizations to develop and deploy new cloud-native applications dubbed ‘Fast IT’ or Systems of Engagement. At the same time, K5 allows customers to exploit the value of their traditional or ‘Robust IT’ installations, also known as Systems of Record, through seamless and consistent integration into new cloud applications. Fujitsu will enable organizations to capture the value in their legacy systems when modernizing IT environments. Cus-
tomers can take advantage of K5’s powerful capabilities in the areas of application integration and development, as well as the wider capabilities of MetaArc in leveraging automated multi-cloud delivery and management, extended across all popular cloud platforms. Duncan Tait, Director and CEO, Executive VP and Head of Europe, Middle East, India & Africa and the Americas at Fujitsu, commented, “Fujitsu Cloud Service K5 enables customers to embrace digital transformation, by combining the economics of open source with the robustness of enterprise-class systems and a wealth of platform services. Fujitsu is making a signiicant investment in this new digital enablement platform and services which ensures that legacy systems can be fully integrated with cloud native applications.” Available in four delivery models – public cloud, virtual private hosted, dedicated and dedicated on-premise – K5 is the industry’s irst single, agile cloud architecture to use the same approach for all versions. hese are all underpinned with 99.99 percent availability, SLAs and the truly enterprise-grade support.
AVAILABLE AT
AMAZON
About The Book he computer and the internet are among the most important innovations of our era, but few people know who created them. hey were not conjured up in a garret or garage by solo inventors suitable to be singled out on magazine covers or put into a pantheon with Edison, Bell, and Morse. Instead, most of the innovations of the digital age were done collaboratively. here were a lot of fascinating people involved, some ingenious and a few even geniuses. his is the story of these pioneers, hackers, inventors, and entrepreneurs—who they were, how their minds worked, and what made them so creative. It’s also a narrative of how they collaborated and why their ability to work as teams made them even more creative.”
Key Features l Written by Walter Isaacson, this book is the best seller. l The book is a quick read with potentially big return on investment for your company.
Intellect SEEC Debuts New Specialist CRM for Closing Leads Intellect Lead Closer, an insurance-speciic CRM enables advisors to quickly advance leads into customers Intellect SEEC will be launching an insurance-speciic CRM for advisors, the Intellect Lead Closer. he app will be oicially launched at Million Dollar Round Table (MDRT) 2016 on 12th June. MDRT is a global, independent association of more than 43,000 of the world’s leading life insurance and inancial services professionals. his powerful
app enables advisors to eiciently create and manage their portfolio, relationships and daily activities. At its core, Intellect Lead Closer understands that building long-term relationships is the key to proitability for advisors. With its smart lead import feature combined with interactive dashboards, the app allows advisors to manage all their leads in one place. Users of the app can deine the way they work by prioritizing customer activities.
JUNE 2016
ENTERPRISE IT WORLD
13
ITWORLD // NEWS BRIEF
Huawei Completes Massive Deployment for Telenor
MANAGEMENT
MANTRA
“Making money is art and working is art and good business is the best art.” — ANDY WARHOL Fortinet to Expand Security Fabric with AccelOps Acquisition
Completes largest commercial deployment of Huawei Blade Site Solution, setting a new record by swapping over 10000 base stations in six months Telenor has completed the largest commercial deployment of Huawei’s Blade Site wireless base-station solution in India. Between November 2015 and April 2016, more than 10000 new sites were installed across Telenor’s six circles with the solution. his is the fastest ever deployment of the blade site solution in the country. As per the release, Telenor India selected Huawei Blade Site Solution to be future ready and meet the growing demand for improved voice and data services from its customers. Telenor currently has 52.4 million subscribers. he new network can support latest mobile technology including 4G / LTE services to deliver high speed Internet. he Huawei Blade Site solution is based on deep understanding of customer requirements. It supports lexible combinations of Baseband Unit (BBU), Radio Frequency (RF) and power modules, provides Global System for Mobile (GSM), Universal Mobile Telecommunications System (UMTS) and LTE three-mode concurrent operations, delivering operators an efective solution to deploy at complex sites. A multi-band multi-RAT wireless base station has become the standard for network construction, and the Huawei Blade Site solution eiciently utilizes the limited site footprint to enhance network capacity, providing users with a better mobile broadband.
14 ENTERPRISE IT WORLD
JUNE 2016
Fortinet has announced its acquisition of AccelOps. he acquisition further extends Fortinet’s recently announced Security Fabric strategy by enhancing network security visibility, security data analytics and threat intelligence across multivendor solutions. According to the press release, AccelOps solutions will become FortiSIEM and become part of the Fortinet Security Fabric. his will provide customers with greater visibility across both Fortinet and multi-vendor security solutions, thereby enabling more comprehensive end-to-end network segmentation strategies, from IoT to cloud. Security correlation and analytics results will feed directly into the Security Fabric allowing automated threat prevention. Next Generation Security Information and Event Management, or Next Gen SIEM, capabilities from AccelOps coupled with FortiGuard Labs global threat intelligence and third-party threat feeds will be integrated into the Fortinet Security Fabric. Enterprises will beneit from prioritized, coordinated responses
and actionable threat intelligence across the distributed network on a subscription basis. Additionally, AccelOps’s Security Operations Center (SoC) and Network Operations Center (NoC) capabilities will power Managed Security Service Providers (MSSPs) and Fortinet Support Services, including a new subscription service called FortiCare 360° Support. his new service will provide customers with automated security and performance audits of their speciic security infrastructure and advisories to help prevent unplanned service disruptions as well as prevent problems before they impact performance and service delivery. Ken Xie, Founder, Chairman of the board and Chief Executive Oicer, Fortinet said, “With the acquisition of AccelOps, Fortinet extends its Security Fabric to address these challenges by combining security and compliance monitoring with advanced analytics for multi-vendor security solutions, enabling automated and actionable security intelligence from IoT to the cloud.”
FINESSE // CXO
SUNIL PAUL, CO-FOUNDER & COO, FINESSE
THE EVOLVING CIOS – HANDLING ENTERPRISE SECURITY
B Y S A N JAY @ AC C E N T I N FO M E D I A . C O M
Enterprise business today is seen as nothing short of a trunk full of cash carried in a closed van with one- or two-gun man. Every hacker sitting outside lurking for the opportunity to sneak inside.
A
s the new digital business environment transforms the organizations, it also comes with new challenges and risks. Organizations across the world are increasingly facing security threats and to safe guard themselves, many are now taking up security projects with a deep focus on improving the security operations and the responses of enterprise infrastructure and applications to incidents. In spite of this upward trend, the percentage of ICT security services contribute to the overall security services spending is much lower in India when compared to the rest of the world. However, it is
expected that in the coming years, the region will increasingly embrace security services. Within organizations, increasingly, many CIOs and IT executives are viewing information security with appropriate urgency as growing threats to corporate data put organizations’ reputation and revenue on the line. hey are working to elevate security in the enterprise by expanding their roles and responsibilities, teaming up with CISOs or by occupying dual roles-leading both IT and information security eforts. Some savvy CIOs frequently take pains to work closely with employees outside of IT to prioritize learning about their companies and the type of security risks that could harm them thus giving appropri-
ate weight to information security. Security breaches of information can happen by external factors, especially in today’s scenario where information is shared across multiple devices. Organizations can be attacked, networks get compromised, sites can get hacked and, data and conidential information can get stolen. Breaches can even happen to some Enterprise cloud storage as well. Information on Emails can get compromised, especially where there is no encryption for secure email. Security threats have increased signiicantly with the development of large open networks. Hackers have discovered more network vulnerabilities. Today one can download applications that require little or no hacking knowledge to implement, applications intended for troubleshooting and maintaining and optimizing networks can, in the wrong hands, be used maliciously and pose severe threats. Apart from external threats, the most important is internal threat by users. 60 to 80 % of network misuse comes from inside the enterprise where the misuse has taken place. Moreover, in scenarios where enterprises have outsourced services, they feel the security threat of information arising through giving access to outsiders. Other than actual threats, many enterprises, on a day-to-day basis, face issues and pressures related to information security such as targeted malware, data thet, skills shortages and resource constraints. And most of them do not possess the skill sets locally that are required to determine, customize, implement and operate suitable protection, privacy and the right security controls to comply with requirements. he increasing trend in the adoption of mobile, cloud, social and IoTs increases the risk of information leakages. In any environment, data protection is a critical function. Multiple devices in mobility typically need to support multiple security objectives: conidentiality, integrity, and availability. To achieve these objectives, devices should be secured against a variety of threats. Enterprises in our region are no exception but to adapt and increasingly use new security technologies in the coming years. Internally, Chief information oicers (CIOs) and Chief Information Security Oicers (CISOs) need to collaborate and work closely together to encourage security throughout the organization, to make sure that the organization better understand security and prevents breaches. CIOs/CISOs must roll out efective Security and IT Risk Management programmes, so thatenterprises can be relieved from the challenges of information security threats under the new role of the CIOs in cyber-security by deploying the right solutions and the right skill sets.
JUNE 2016
ENTERPRISE IT WORLD
15
COVER STORY // ENTERPRISE SECURITY
The time has come that we should look
at the criticality of our infrastructure and
create full proof plan to keep them in case custody. There are hawk lurking every where in the world to ambush and take away your efforts.
16 ENTERPRISE IT WORLD
JUNE 2016
ENTERPRISE SECURITY // COVER STORY
ENTERPRISE SECURITY The inception of digital evolution in the country has come with its own price in the shape of cybersecurity. As connectivity grows, more and more enterprises are facing intrusions and unlawful activities like denial of service and database theft. Hacking for fun has transformed into organized cyber warfare, which has put enterprises in a vulnerable situation. The need of the hour is to understand cyber threats of the day and find robust solutions.
A
s Enterprises transform, adopting advancements in collaboration, mobility and scalability, vulnerabilities increase making the threat to conidentiality greater with each passing day. Cyberthreats of the day have become more potent than ever before. Open work cultures, BYOD, Cloud etc. have opened a number of ways through which hackers can breakthrough into corporate and government databases. With advanced threats like DoS,ransomware, remote access Trojans and APTs on the rise, enterprise level cybersecurity has evolved from a perimeter guard to a more holistic, ongoing and ever changing process. Cybersecurity giants are continuously and persistently trying to use technological advancements to detect and prevent unwanted system iniltrations. However, they themselves opine that security is not a guarantee, and enterprises need to be geared up against the ever evolving threats in this age of cyber warfare. Changing Threat Landscape Rapid technological advancements have given cybercriminals the ability to constantly evolve in their threat potential with a much more efective and organized approach than ever before. Hobby hacking has given way to organized cybercrime, which now can prove unthinkably fatal for organizations, with threats ranging from denial of service, database thet and even unlawful, unauthorized transactions leading to monetary thets. AsSunil Sharma, VP Sales, Sophos India & SAARCputs it, “In recent years, cybercrime has become more organized. Cybercrime trends point to an alarming increase in advanced social engineering techniques and customized, targeted documentbased malware attacks in 2016, according to SophosLabs research. Equipped with greater skills and expertise, they are now able to continually evade defenses and avoid apprehension by law enforcement. he state of security deployments and readiness in enterprises, especially small and mid-sized businesses is devoid of coordinated threat mitigation strategies.” Atul Anchan, Director- Systems Engineering, India, Symantec believes it is not a question of ‘if ’ and ‘when’ but ‘how oten’, “Today’s cybercriminals are
skilled enough and suiciently resourced to have the persistence and patience to carry out highly successful attacks on consumers, businesses and governments around the world. heir eforts have turned cybercrime into big business with private information being stolen on an epic scale. It is no more a question of “if ” or “when” you will be attacked, but how oten.”Rakesh Kharwal, Director- Enterprise Business at Intel Security adds to the opinion, “he enterprise security landscape has evolved by leaps and bounds. Cybercriminals have already developed a level of sophistication which is well beyond the hobby hacker of the past. Cyber threats today are more targeted, more structured and even customized to attack potential vulnerabilities of networks of organizations. his is also evident from the volume of new threats being witnessed by McAfee labs. Ten years ago, we saw about 25 threats a day, today we see about 500,000 threats a day and the number will only increase.” HID’s Director Jordan Cullis says, “While early hackers leveraged brute force to attack speciic endpoints, today’s threat landscape has changed signiicantly. Cyberattacks are now sponsored by highly skilled and scalable criminal entities, or they are backed by nation-state organizations. In both cases, the primary goal is to steal personally identiiable information (PII), IP and other critical data primarily for monetary gain or strategic objectives.”Sandip Kumar Panda, CEO, Instasafe gives a roundup of the security scene today, “If you start to list the possible forms of cyber security threats that an organization can face in today’s world, you will be overwhelmed
JUNE 2016
ENTERPRISE IT WORLD
17
COVER STORY // ENTERPRISE SECURITY
JORDAN CULLIS, HEAD - IDENTITY ASSURANCE, ASIA PACIFIC, HID GLOBAL
“While early the hacker leveraged brute force to attack specific endpoints, today’s threat landscape has changed significantly.” RAKESH KHARWAL, DIRECTOR, ENTERPRISE BUSINESS AT INTEL SECURITY
“Ten years ago, we saw about 25 threats a day, today we see about 500,000 threats a day and the number will only increase.”
with diferent types like Botnets, Virus, DDoS attacks, Hacking, Phishing, Malware, Pharming, Spam, Spooing, Spyware, Ransomware and many more. In addition to this, the organization has to deal with the looming threat of insider leakages and ever increasing remote, mobile and work-from-home employees along with access to third party contractors or distributors, dealers and franchisees. Just dealing with this matrix is enough to give security nightmares to the CISO and CIO.” How the Enterprises are going about it Understanding of Cyberthreats is crucial. Enterprises today are moving towards a more careful and planned approach, unlike the perimeter defenses on legacy systems in the past. HP Networks’ Shantanu Ghose remarks, “Security as a subject is very vast with many aspects to it including security as a process. Earlier, the access in organizations was limited to a certain set of people. Access to an area meant the right to access to systems. Now we work from anywhere. All the apps are on our mobiles, which are not periodically screened for viruses. he same device is used for accessing company info and if infected, it could be fatal for the applications.” Intel’s Rajeev Kharwal believes collaboration with partners and security companies is important in today’s scenario, “he level of cyber-attacks in the country has increased tremendously with more aimed at lucrative targets like inancial 18 ENTERPRISE IT WORLD
JUNE 2016
services and IT organizations. So while these segments are early adopters of technology, they remain prime targets for cyber criminals and this signals the need for organizations to look at security more holistically and move towards a holistic threat defense lifecycle for security. As the threat landscape becomes increasingly complex, the need for security too is becoming a critical factor for organizations. In such a scenario, channel partners play a key role in bridging the gap and become trusted advisors for customers in their security purchase decision.” HID’s Jordan Cullis added, “Organizations are moving to diferent infrastructures to meet evolving business requirements. For example, organizations are transitioning their irewalled enterprise data centers to cloud-based services, while also moving their endpoints from traditional, ixed desktops to highly mobile devices.” Sandip Panda of Instasafe believes organization’s need to take cybersecurity as a continuous process rather than inding a single solution, “Security of the infrastructure cannot be a destination but has to be an ever evolving journey for any organization. As newer access points and newer threats emerge, organizations have to evolve their strategy to identify the vulnerabilities, deal with the gaps and secure their infrastructure. With newer technologies and threats emerging, there will be newer and nimbler and agile organizations that will have solutions for these threats. Organizations have to approach the ever evolving
threats with open minds and evaluate the new age start-up organizations in addition to their existing large irms to secure themselves.” Sophos’ Sunil Sharma is seeing a trend arrive, “Enterprises across verticals have begun overhauling their monolithic security architecture and are replacing it with more meaningful and coordinated security solutions. Better still, when multiple security systems, synchronize and work in tandem to share threat intelligence and help with accelerated threat discovery and automated incident response.” Symantec’s Atul Anchan points, “With the ever increasing infrastructure and threat complexities, it is pertinent to consider requisite cyber security measures while designing the IT blue-print. Despite investing large sums of money, businesses still feel unsafe and need a solution provider who can help them simplify their approach whilst maximizing investments.” Indian Cybersecurity Market he advent of Information Technology in India, expansion of enterprises, startup surge and the government’s national digitization initiative have created a huge market for cybersecurity in the country. According to Gartner, security spending grew at a rate of 8.3% from 2014 to 2015 and is expected to touch 1.23 billion in 2016. Cybersecurity knowledge and adoption is gradually gaining momentum, but there are still a large number of businesses without the right protection in place.Fortinet’s Reginal Director for India and SAARC, Rajesh Maurya opined that type of security difers from organization to organization, “Diferent organizations take diferent approaches depending upon their need and budget. Educational institutions and Retail Business spend more on secure wireless solutions. Likewise in the BFSI segment deploying solutions like NGFW, ISFW, Web Application Firewall and Advance hreat Protection is essential. MSSPs invest on cloud security solutions while high performing
ENTERPRISE SECURITY // COVER STORY
SUNIL SHARMA, VP SALES, SOPHOS INDIA & SAARC
“Enterprises across verticals have begun overhauling their monolithic security architecture and are replacing it with more meaningful and coordinated security solutions.” SHANTANU GHOSE, DIRECTOR, HP NETWORKS AT HP INDIA
“Security as a subject is very vast with many aspects to it including security as a process.” GI Firewalling solution along with IPS are basic requirements of a Service Providers.” Sophos’ Sharma adds, “With the CIO or CISO culture inding its way into more verticals, capabilities like proactive threat intelligence, highperformance and light weight security, built-in
or on-box security features and uniied solutions will gain greater traction to support leaner and simpler network security deployments across industries. Among other forces that continue to spur new growth include expanding attack surface due to explosion of endpoint and mobile
devices, impact of third-platform technologies like cloud, mobility, roaming users, work-fromhome culture, virtualization and social collaboration. In addition, growing number of data breach incidents is also driving greater awareness for compliance, data security and privacy.” Rakesh Kharwal of Intel Security believes that the focus is shiting towards managed security services, “he overall demand for managed security services in India and globally has increased as organizations seek to maximize/ remediate network security through outsourcing this requirement. In fact, we see that over half
JUNE 2016
ENTERPRISE IT WORLD
19
COVER STORY // ENTERPRISE SECURITY
ATUL ANCHAN, DIRECTOR, SYSTEMS ENGINEERING, INDIA, SYMANTEC
“Organizations don’t want to install any more point products or any new agents that potentially cause disruption to their entire enterprise.”
RAJESH MAURYA, REGIONAL DIRECTOR, INDIA & SAARC, FORTINET
“The only way to mitigate fears around moving to the cloud is to ensure that protection is in place at all points along the path of data.”
the addressable market for security solutions will be managed security services. From a trend perspective, we see enhanced demand for a verticalized approach by IT companies as well as banking focused organizations, for architecting their security story.” The shift to Cloud – How safe is it? Enterprises and SMBs alike have started the shit towards Cloud from legacy systems. Although the Cloud comes as a major advantage in terms of scalability and mobility, it brings a number of vulnerabilities with it. Fortinet’s Rajesh Maurya believes, “Securing the cloud requires a variety of technologies, and no single technology can address all the challenges. Cloud providers and customers must take special care to understand all the safeguards in place around any cloud solution. he only way to mitigate fears around moving to the cloud is to ensure that protection is in place at all points along the path of data: Entering or exiting the corporate network, entering or exiting the cloud, and within the cloud itself.” Jordan Cullis of HID states that security today has no place for a perimeter based approach. He elaborates, “Perimeter defenses are essentially non-existent in today’s cloud and mobile business environment and traditional credential thet continues to rise. Given this, it’s critical to embrace a zero-trust mindset and implement identity-deined security models that span not only insider employees, but also temporary contractors, partners, and 20 ENTERPRISE IT WORLD
JUNE 2016
customers.” Cullis adds, “Identifying and authenticating these users requires more than static passwords, and multi-factor authentication or one-time password (OTP) requirements should be the normal practice in today’s enterprise. And, with greater adoption of cloud apps -- as well as SaaS and data managed by third-party providers -- controlling user access and deining policies based on business needs and risks require robust facilities.” Sunil Sharma understands that however susceptible the Cloud is to vulnerabilities, securing it is a priority, “Companies need to ensure the protection of their data, no matter where it is stored. Using encryption for information when it is moved and stored, and understanding the security measures of a public cloud is important to maintaining data integrity.” Insider threat is another crucial issue for enterprises today. Sharma adds, “he insider threat - a member of staf who either maliciously or negligently allows sensitive corporate data to be leaked or fall into criminal hands – will continue to be a security weakness. Cyber adversaries target insiders to gain entry into business networks and missioncritical information assets. his is why endpoint risk too has gone up.” Intel Security’s Kharwal sheds an eye on Intel’s understanding of the enterprise shit to Cloud today, “To understand the concerns around security for the cloud, Intel Security conducted a global survey on cloud adoption trends and attitudes from IT profession-
als titled ‘Blue Skies Ahead? he State of Cloud Adoption’ in April 2016. he indings indicated that a majority 77% of participants from the survey, noting that their organizations trust cloud computing more than a year ago, just 13 percent completely trust public cloud providers to secure sensitive data. hese indings indicated that improved trust and security will remain critical to encourage the continued adoption of cloud. We believe that security vendors and cloud providers must arm customers with education and tools, cultivate strong relationships built on trust since almost 34% of senior IT management believe C-level executives and senior management understand security risks of the cloud.” Sandip Kumar Panda, CEO, InstaSafe opines that securing the cloud if centre to eicient mobile workforce, “From an organization perspective, it is about giving secure access to the employees to the various applications residing in diferent places. Each public cloud, as well as the private datacenter, will have its own security parameters and access protocols. he challenge is in managing these diferent access protocols and providing the employees a single seamless gateway. For enterprises, this has given rise to another challenge of sizing the security infrastructure to account for multiple accesses leading to more investment in hardware security boxes and hence more capex expenditure.”According to HP’s Shantanu Ghose, legacy systems are being over taken by clouds but dumb devices like printers and scanners become more vulnerable. “Dumb devices were never secure. Today, black hat hackers can take control of a printer and then can hack into the main system with ease.” He believes that the cloud should have the capabilities of an in house datacenter, “Enterprises need to move from legacy datacenters to cloud data centers, but they need a platform that will replicate the environment of owned data systems. hey need a technology that acts and behaves like police in the physical world.”
ENTERPRISE SECURITY // COVER STORY
Enterprise Security – A holistic approach As any experienced IT personnel would say, enterprise security is not a one time job, it is a continuous process. Today, cybercrime scenario demands organizations to put experts to job, ones who can ably manage all aspects of their company’s security. Symantec’s Anchan remarks, “he Indian technology landscape is witnessing a dynamic shit with the inlux of digitalization, mobility and internet of things making more industries potential targets for cybercriminals. With the ever increasing infrastructure and threat complexities, it is pertinent to consider requisite cyber security measures while designing the IT blue-print. Despite investing large sums of money, businesses still feel unsafe and need a solution provider who can help them simplify their approach whilst maximizing investments.” He adds, “With advanced threats, such as ransomware, remote access trojans and advanced persistent threats (APTs) on the rise, security professionals can no longer rely on using individual point products at each control point to stop them. Additionally, organizations don’t want to install any more point products or any new agents that potentially cause disruption to their entire enterprise.” Fortinet’s Rajesh Maurya states, “Today’s digital economy connects more users, devices, applications, and data than ever before to drive business value. Billions of new IP-enabled, nonuser IoT devices are transmitting vast amounts of data traversing wired and wireless access points, through both public and private networks, and across traditional and cloud infrastructures. To successfully compete in this new digital economy, organizations need to implement a tightly coordinated security strategy that can see and govern this data across an entire borderless network without compromising agility or performance. In order to detect, let alone stop threats in today’s borderless networks, a Security Fabric not only needs to be able to dynamically scale to meet volume and performance demands, it needs to scale laterally for seamless, ubiquitous protection.” Rakesh Kharwal says that today’s hacking has evolved into organized crime and should be treated accordingly, “he attacks are no longer simply to disrupt operations, but are organized crimes to steal information. Highly sensitive information resides in many areas within an IT setup, one of them being databases which are susceptible to attacks both from outside and within the organization i.e. insider threat. herefore, it is of utmost importance than any organization should implemented a “Data Protection Strategy” which should encompass protection of data/ information while in transit, storage or in use which would involve security solutions like Data
SANDIP KUMAR PANDA, CEO, INSTASAFE
“Security-as-aService will become a viable option as customers look towards moving their investments from Capex to Opex”
Loss Prevention, Database Security solutions like Database Activity Monitoring and Virtual Patching, encryption to name a few.” Sunil Sharma adds that synchronized security is the need of the hour, “Given growing complexity in IT security and meteoric rise in new threats, organizations should adopt holistic yet simpler security approach, which protects all critical assets such as users, devices, networks, business applications and data with coordinated defense strategy, ensuring reliable protection and efective monitoring that extends beyond corporate perimeter.” Adding more on a holistic approach, he said, “Holistic security solutions, which secures the user, in addition to protecting against advanced malware threats also helps with faster threat detection and allowing security teams to spend less time responding to incidents. Securing the user will help faster identiication of a suspicious or a victim machine or device enabling a corrective action to contain the spread of risk before it snowballs into a bigger trouble. It’s time for synchronized security to be the foundation of the organizational security architecture of business across the world.” As per Instasafe’s Sandip Panda, “Security-as-a-Service will become a viable option. As customers look towards moving their investments from Capex to Opex and becoming comfortable with SaaS oferings, they will expect the same deliverables in the Security segment. Companies like Instasafe will be able to ofer the customers the ability to leverage cloud infrastructure through robust products making Security-as-a-Service an integral part of their IT infrastructure.” HID’s Cullis brings the importance of thorough monitoring on the table, “Organizations should comply with various security frameworks that deine security controls at each tier in the IT infrastructure such as AV and IPS, as well as ensure operational best practices including password and authentication enforcement, user education requirements, vulnerability and penetration
testing, and patch/change management practices.” He adds, “System administrators and database administrators with privileged access should be properly vetted and issued authentication/access credentials of suicient assurance and strength to preserve the integrity of the data.” Finally It is quite clear that in today’s cyber scenario, security is not a standalone one time job. Security is an ongoing process whereby a company needs to secure not just the IT assets but also keep a check on the human activity as well as a continuous monitoring of the system. hreats are getting bigger and more potent with each passing day. Collaborations between the world’s largest cybersecurity corporations has enabled enterprises to be updated and ready for the newest of Cyberthreats, which themselves are evolving with each passing day. Security is not a guarantee, but keeping guard, and prompt detection and damage control is what the enterprises of the day need. It is not a level playing ield, with black hat hackers seemingly getting more advanced every day, forcing cybersecurity companies to play a continuous game of catch with their newest and more dangerous than before viruses and malwares. A managed security service is a new trend that has surfaced recently. Large enterprises have started the shit towards outsourcing their enterprises security requirements in expert hands with the requisite knowledge and resources. With digitization gradually taking pace all over the country, cybersecurity is going to emerge as one of the most prominent pain points. India has cyber laws in place and the government is indeed taking cybercrime very seriously. But from organizational viewpoint, solving the cybercrimes isn’t as important as prevention. Safeguarding its assets, mapping devices and detecting malicious activity are just some aspects of it. A holistic, managed security which is handled by experts is undeniably the answer for enterprises today.
JUNE 2016
ENTERPRISE IT WORLD
21
SOLUTION CENTRE // ISVS
MICROSOFT AZURE ENABLING ISVS With the evolution of the digitization, businesses have started deploying tech solutions and applications, even building service apps for themselves. ISVs have been emerging all over the globe, with IT Giants like Microsot acting as enablers with cloud platforms like Azure, providing capabilities to independent app developers, app studios, startups and enterprises alike.
C
B Y C S E H G A L @ AC C E N T I N FO M E D I A . C O M
ompanies across verticals are today moving towards lexibility, security and advanced computing capabilities. Microsot with its cloud solutions is driving business transformation for leading companies across verticals. Microsot has entered new partnerships, powering new-age independent sotware vendors (ISVs) with its cloud services, which provide marquee solutions for various business needs. hese solutions have been deployed across verticals like retail, eCommerce, banking, FMCG among others as Microsot looks to build a successful ISV story in India with its Azure Marketplace. Acting as an Enabler for ISVs Microsot Azure works as a support system for ISVs supplying them with capabilities like scalability, and mobility. According to Harish Vaidyanathan, Director for Microsot’s ISV business in India, “ISVs are the ones who ofer solutions to the end customers. We like to think of ourselves as an electric company. Nobody uses electricity directly; they use appliances in their household which in our case are applications.” Prasad Rajappan, Founder and MD, ZingHR, one of the most promising Indian ISVs on Azure says, “he choice of Microsot was not just because of server but the local support. Microsot ofers cloud stack knowledge on how to scale Zing to a global HR platform. Azure and its capabilities helped Zing HR to move from traditional server architecture to the cloud.” For ShepHertz, an omnichannel app development platform, Founder and CEO Siddhartha Chandurkar quantiies the choice of Azure as the cloud capability provider, “Azure has a lot of beneits; the technical team has been very helpful, 22 ENTERPRISE IT WORLD
JUNE 2016
the latest tools and technology, plus Microsot’s experience with enterprises makes it an immediate choice.” ISV Adoption in India he market for ISV solutions in India is just beginning to gain momentum. Microsot’s Vaidyanathan states, “Initially, most customers would not prefer an ISV solution due to the cost, but because of the cloud and the subscription model, cost comes down dramatically. Now you can get an ERP solution, very quickly, and cheaply on a monthly basis, that has changed customer mindset signiicantly.” ShepHertz, which has a number of customers including a major Indian airline, media houses and others in BFSI and Healthcare, believe that the change in mindsets is due to the proliferation of IoT in the country. Siddhartha believes, “In the past 1 year customer expectations from any company have increased. With the proliferation of android in India, things will really go pro. Today, transition of a person from web to mobile, and vice versa is very important.” ZingHR’s Prasad, having put human resources on cloud for a number of institutions like Kotak and HDFC Bank believes adoption and understand of cloud has been the driver, “Cloud preference is an interesting trend. Two years back this was an issue, people were skeptical with cloud security. hey already had infrastructures so they opined that why should they pay for this. Now they say putting the data on cloud.” Microsoft’s Engagement Strategy Harish believes Microsot has seen a big change moving towards the ISV motion, “he conversation has two pieces. Firstly, what are the beneits of building their products on top of Azure. And
HARISH VAIDYANATHAN, DIRECTOR, ISV BUSINESS, MICROSOFT INDIA
“We have a technical team working with ISVs to improve product efficiency. Azure marketplace enables ISVs to sell their products.”
secondly, once they are on Azure, how do we help them get existing Microsot customers.” Describing Microsot’s way of engaging customers, Harish elaborated, “We have ISV programs where we help ISVs to move to the Azure platform and other Microsot technologies. Once that is complete, we work with the ISVs to igure out how we can help them grow their business.” Apart from this, Microsot helps them technically with regards to product development and deployment. “We have a technical team working with ISVs to improve product eiciency. Azure marketplace enables ISVs to sell their products. It is not necessary but optional. We have 3000 ISVs on Azure.” Helping them Reach Customers Microsot’s ISV business revolves around helping customers take advantage of cloud through ISV solutions. Harish states, “We talk to our customers about all these ISV solutions. his changes the dialogues dramatically from an end customer standpoint,” he adds, “We use our existing sales and marketing dictionary to expose ISV solutions to the customers. We have a fairly large sales channel, access to which we give to our ISVs.” Siddhartha says, “Microsot has always been great at enterprise level. Shephertz and Azure is a very potent solution which we sell to our customers and in a short time we have been able to close some very big ones.” Rajappan points out, “It would be wrong to
ISVS // SOLUTION CENTRE
say all it gives is cloud hosting. hat is a valuable part but the real value comes from customers and partners like in any other ecosystem.”
SIDDHARTHA CHANDURKAR, FOUNDER AND CEO, SHEPHERTZ
“Azure has a lot of benefits; the latest tools and technology, plus Microsoft’s experience with enterprises makes it an immediate choice.”
PRASAD RAJAPPAN, FOUNDER AND MD, ZINGHR
“The choice of MS was not just because of server but the local support. Microsoft offered cloud stack knowledge on how to scale Zing to a global HR platform.”
Taking Indian Solutions to Global Markets As a global company, Microsot has big customers and strongholds in world markets. Some of this weight has been leveraged by ISVs who have found customers in foreign markets as well. Prasad Rajappan says ZingHR has a planned global expansion strategy, “Majority of our customers are in India but now we have a few in Australia, Singapore, and MEA. his year, we are eyeing Australia, MEA and South East Asia.” Siddhartha eyes ShepHertz as a global company for digital marketing, “China, South Korea, Japan combined eclipse the US market. hey are big markets and are of our interest. We already have enterprise clients in US and Singapore.” Finally... here are 2000 products and 6000 ISVs in the country. Microsot’s biggest challenge arises due to the sheer numbers. Harish remarks, “he challenge is how the ISVs can be addressed because the infrastructure is so large.”
JUNE 2016
ENTERPRISE IT WORLD 23
SOLUTION CORNER // PROGRESSION
ENABLING COMPANIES TO BE REAL-TIME BUSINESSES Enterprise business is becoming very challenging day by day and in order to counter the challenges, there need to have alternative and smart waysfrom their IT departments. herefore,increasingly the enterprises are adopting hosted services or cloud services strategy to optimise their employees’ performance.
“With Progression team’s expert solutioning and support, and the access to on-demand
LALIT MXADAN,
infrastructure during the migration, we were able to go live in record time of just 42 days!,” GM-IT, LUMAX INDUSTRIES
B Y S A N JAY @ AC C E N T I N FO M E D I A . C O M
L
ook around you. You will see many people fully engaged with their mobiles. Personal and professional work–it’s all getting done on the mobile phone. he app culture is very much here, and there is no tolerance for latency or delays. A real-time generation is in action. But ‘real time’ is not just a term for the generation glued to the small screen. It is also for enterprises. We are now well into the digital economy, the new way of doing business for all enterprises, whether traditional or digital. Can enterprises wait for weeks to get business critical reports of the previous month? Can you wait for invoices to be generated a few hours later? Should IT infrastructure performance and uptime issues come in the way? In fact, enterprises eyeing great growth know that, ten minutes isn’t good enough. Near real-time isn’t good enough. Only real-time will do. It is the way forward, for all businesses, says JB Hooda, Co-founder and Director, Progression Infonet. As an IT infrastructure and Managed Cloud services provider, Progression has been seeing some trends that indicate the emergence of the real-time enterprise. Here are a few.
24 ENTERPRISE IT WORLD
JUNE 2016
he SAP HANA shit: With giant stridesmade in the in-memory computing space championed by SAP, we now have enterprises moving to the SAP HANA platform and reporting signiicant breakthroughs. At Progression, we expect the majority of SAP HANA implementations to be upgrades from older versions of SAP. However, we also expect a small share of mid-size businesses that have not gone the ERP route yet, to dive right into SAP HANA. And we expect this segment to grow in the coming year. One of Progression’s clients in the domain of auto components manufacturing, Lumax Industries and its sister companies, have moved to SAP on HANA on a hosted private cloud at our data center. And the entire organization is seeing some great gains in terms of real time business. Six-monthly reports that would take over 24 hours to be collated by their older ERP system are now ready within 20 minutes! hat means decision making is now real time. Backups would take 12-15 hours in their older setup; with SAP HANA it’s down to 1.5 hours! Online transactions are also now noticeably faster, so productivity gains are huge. If you think that it takes a very long time to get your business enabled on HANA, think again. Lumax had planned for HANA project to take 3 months, as the work involved migration of OSs, databases and a version change of EHP for SAP ECC. “With Progression team’s expert solutioning and support, and the access to on-demand infrastructure during the migration, we were able to go live in record time of just 42 days!,” says Lalit Madan, GM-IT, Lumax Industries. Mid-size enterprises going real-time than large behemoths: Mid-size enterprises hungry for growth won’t wait for technologies to mature or new business models to consolidate and streamline. hey are nimble and quicker to adopt new technologies which enable them to be real-time. hey are fearlessly exploring cloud models with stringent managed services, and they are setting up greenield HANA implementations. hey are leveraging their size to move faster and garner new diferentiators and technological leadership to enable great growth. Real-time View of IT Infra: Enterprises now need real-time view of their IT infrastructure. IT heads get alerts on SMS and mail, or through online dashboards accessed on desktops. But, in the real time era, is this good enough? Progression now enables IT heads to have IT infrastructure view right in their mobile through an app that gives visual data trends, and real-time data on a host of performance indicators. According to Mr Rohit Luthra, Co-founder & Director, Progression Infonet, “An app is all the client IT teamneeds to keep track of the health of their
PROGRESSION // SOLUTION CORNER
JB HOODA, CO-FOUNDER AND DIRECTOR, PROGRESSION INFONET.
ROHIT LUTHRA, CO-FOUNDERS & DIRECTORS, PROGRESSION INFONET
“As an IT infrastructure and Managed Cloud services provider, Progression has been seeing some
Design & Architect
trends that indicate the emergence of the real-time enterprise. Here are a few.”
From networks to data centers, servers to storage, On-premise to cloud
Tech Audit & Assessment Review of infrastructure and identify areas to optimize, replace, or build new
Implementation & Deployment
End to End IT Infrastructure Services
End-to-end services, or specialized services for any layer of the infrastructure
24x7 Monitoring & Managment State-of-the-art NOC with tools thattracke verry aspect of the infra, and send timely alerts to enable pre- emptive action IT infrastructure. It means less intrusion, more decision making power and more control on the infra for them.” his is the kind of innovation enterprises need today to stay on top of their business and take decisions quickly with real-time data and insights.
Ever since its inception in 1995, Progression has been at the forefront of technology delivering outstanding IT infrastructure services to create signiicant business value for its customers. Today, Progression delivers a comprehensive range of cloud oferings, remote management services,
managed hosting and DR services to its valued customers across the world. Progression handles the entire lifecycle of IT deployment. Progression has helped clients like Honda Motorcycle & Scooter India Private Ltd, Maruti Suzuki, Interglobe Enterprises Limited deploy optimized on-premise infrastructure to run their business critical applications with uptime that their businesses demand. Many mid-size enterprises such as Religare Wellness Limited, Lumax Auto Technologies Ltd and SKH Metals Ltdhave been enabled by Progression to make their move to the managed private cloud model, thereby enabling them to easily embrace change and rapid growth in business. Now in its 21st year of operation, Progression’s diferentiation is simple, which is evidenced by its motto, whatever IT takes. Hooda says, “Whatever IT takes is the attitude that can solve challenges faced by clients, night or day, workday or not. his is the attitude that helps Progression’s team ind easy workable solutions where others can’t spot one.his is the attitude that ensures infrastructure is always available for business. And that’s what ensures businesses are real time!”
JUNE 2016
ENTERPRISE IT WORLD 25
BY SANJAY@ACCENTINFOMEDIA.COM
INTERVIEW // L&T TECHNOLOGY
D R .
K E S H A B
P A N D A ,
MD AND CEO, L&T TECH SERVICES
L&T Technology Services is moving to capitalize on this fast growing industry by having a multi-pronged vertical strategy, and is betting high on Digital Engineering.�
26 ENTERPRISE IT WORLD
JUNE 2016
L&T TECHNOLOGY // INTERVIEW
including logistics and transportation, industrial production, medicine and healthcare, telecommunications etc.
ENABLING ENTERPRISESTO TAP THE DIGITAL With everything going digital, L&T has made the move towards Digital Engineering Services through a combination of collaboration and innovation. he growing inluence of technologies like cloud, IoT and analytics on the Engineering sector cannot be ignored, as the demand moves towards smart engineering and mobility with connected devices the need of the hour.
What is the marketsize of Engineering Services in India? India as an engineering services destination has witnessed enormous growth in recent times and is becoming the global hub for outsourced engineering services. As per NASSCOM, the Engineering Research & Development spend has seen a double-digit growth in recent times and is expected to touch total spends worth USD 850-900 Billion with exports worth USD 30-38 Billion by 2020. Further, the addressable market for ER&D Globalization & Services is expected to increase at a CAGR of 4.3% till 2020. L&T Technology Services is a premium player in the Engineering R&D segment. his is a huge opportunity which L&T Technology Services is tapping through its new age digital engineering oferings. ER&D market is opening up hugely at this point of time and there lies huge potential to tap the $265 Bn market by 2020 Which sectors have been the major contributors for spur in growth of IT enabled Engineering Services in India? From an Engineering R&D point of view, we focus on fast growing segments like Industrial Automation, Plant engineering, Automotive, Aerospace, Construction & Heavy Machinery, Medical devices, Telecommunications and Energy & Utilities. L&T Technology Services is moving to capitalize on this fast growing industry by having a multi-pronged vertical strategy, and is betting high on Digital Engineering which includes Smart Manufacturing & Connected
devices (industry 4.0 / IoT) with strategic focus on fast growing verticals. What are some of the new global technologies in the segment? As technologies converge and ind applications across industries, some mega-trends in the services space have emerged. hese include: Smart Services, Smart Products and Smart Manufacturing which encompass Condition-based Monitoring, Remote Guided Services and Smart Wearables, Smart Home Products, Connected Vehicles, Industrial IoT, Augmented Reality and Smart Supply Chain & Logistics. At L&T Technology Services we have been working on a number of new age digital engineering projects for American, European and Asian customers. We deliver diferentiated solutions for building Smart Products, Smart Manufacturing and enabling Smart Services. As part of this, the Company has developed IP led solutions like UBIQWeise&i-BEMS that have been launched in the global market. We have extensive capabilities in smart manufacturing and serve multiple fortune 500 customers in plant engineering projects. We have invested in smart manufacturing infrastructure having recently inaugurated a smart manufacturing lab in Varoda. he lab displays a wide range of technologies in the areas of smart control & automation, IoT-enabled mobility solutions as well as technologies supporting operation & maintenance of plants. Our range of expertise in IoT is spread evenly across all key industries
What are some of the flagship services/ solutions offered by L&T Technology Services in the segment? L&T Technology Services’ proprietary IoT solutions includeiBEMS, a smart building framework that helps lower energy bills and cost of maintenance while extending asset life. he e-Health solution enables high quality home care for the elderly and disabled patients while saving 25% of healthcare costs. he company’s UBIQWeise framework has the ability to connect thousands of home devices from a remote server. We have also designed and worked on Electric vehicles, Robotics, energy conservation (through our proprietary i-BEMS technology), lighting solutions, digital manufacturing, smart plant operations and, Augmented Reality. Whether our infrastructure is ready to roll out or subscribe service offerings? L&T Technology Services has an advanced IoT infrastructure built both in house and in partnership with global tech giants such as Cisco, Sierra Wireless etc. We also have our own cloud infrastructure (UBIQWEISE and i-BEMS) which helps in big data analytics for various engineering segments through our deep domain expertise ready to roll out at a global scale. The Government has been steadily advocating digitization of its agencies. How big a role will the service sector play in this initiative? Digitization helps increase market for Engineering R&D with new products being developed. New products require data accumulation into diferent segments leading to big data analytics, where L&T has a large presence. Digital manufacturing services will help increase eiciencies across the entire production cycle and also cut costs, leading to higher productivity and industrial growth. Where do you see the sector in the next 5 years? With growth of IoT in both product and plant segments, the market ofers huge opportunities for Smart Products, Smart Manufacturing and Smart Services. his market is set to reach USD 1.7 trillion by 2020 according to research irm IDC. With the investments L&T Technology Services is making in this space, we aim to tap up a large portion of the services market.
JUNE 2016
ENTERPRISE IT WORLD 27
GUEST COLUMN // BISC
NATIONAL OPTICAL FIBER NETWORK (NOFN). HOW CAN WE MAKE IT BETTER? Fiber optics, like any fast-growing technology, needs well-trained professionals however, very few of those are trained in technical schools currently, both in high schools and colleges, where general courses prepare them for most other theoretical aspects of iber optics that are rarely used in on-ield applications. NINAD DESAI DISTRICT SECRETARY BICSI INDIA
BRIEF PROFILE “NINAD DESAI IS Probably the only individual presently in INDIA certified to design, audit and consult on all the 3 (Active, Passive and the Security) aspects of the Information Technology Systems infrastructure with a on field experience in all the relevant ITS domains. He has since rendered his services to a number of organizations as a consulting ITS specialist, an information’s systems auditor, and a Data Center Design Consultant. Ninad presently provides his Integration & auditing expertise for IT Governance & implementation, IS and ITS infrastructure audits, ISO 27001 IS certifications, Data Center Design & performance auditing.
National Optical Fiber Network (NOFN) a government-owned company is establishing a nationwide broadband network with the objective of achieving 175 million broadband connections by the year 2017 and 600 million by the year 2020 at a minimum of 2 Mbps download speed and making available higher speeds of at least 100 Mbps on demand. Rolls and rolls of iber-optic cable are being installed all over the country.NOFN would come in diferent forms depending on where users live and work. he common types of NOFN are Fiber, Fiber to the Node (FTTn), Fiber to the home (FTh) & Fixed Wireless. With the growth in Indian Telecom industry the demand for various professionals such as Optical iber Technician, Telecom infrastructure designers / auditors etc. is bound to increase. Mobile operators in the wireless segment have alone generated an estimated 2.3 million jobs till now and it is estimated that the sector as a whole is likely to create about 40 lakh direct and indirect jobs
over the next 5 years.
WE HAVE BEEN DOING THIS FOR YEARS,WHY IS IT THAT WE NEED SKILLED PROFESSIONALS NOW? he Indian Telecom Industry probably needs the largest number of skilled personnel as contractors and installers who would build these iber optic networks. Installers must be 28 ENTERPRISE IT WORLD
JUNE 2016
skilled in the process of pulling cables, splicing, terminating and then testing them. It requires more manual dexterity than other jobs, plus a basic understanding, of how the systems work. In addition, installers would need to work with specialized equipment like fusion splicers, OLTS’s and OTDR’s that require extensive knowledge of their operation and more importantly the understanding of how to interpret test results. Installers who would install these telephone, surveillance CCTV and CATV iber optic networks would need to do much of their work outdoors (what we call outside plant – OSP installations) braving year-round weather. hey would need to sometimes operate big machines that dig trenches and lay and/or pull cables. Outside plant (OSP) installations generally, would require more hardware. (and more knowledge of the tools and test equipment) pullers, splicers, OTDR’s and even splicing vans are the tools of the trade for OSP installers. Another aspect to this industry segment is the premise cabling technicians, who installs cables inside buildings for computer networks, security systems and other building management systems. Computers and security networks, use lots of iber which is installed inside buildings. Premise installers may need only a termination kit for attaching connectors and a simple test kit for their installations. Working above ceilings or in crowded telecom closets or communications rooms is the norm in this segment. An important perspectivethat need not be missed in the scheme of things isFiber to the home (FTh) wherein technicians install iber from local areas, directly to the home. Some use standard OSP installation practices and some install pre-terminated cables that just require plugging into the network equipment. Besides the cables, some install specialized FThiber optic communications equipment, test and troubleshoot networks, wherein the requisite procedures vary from the common norm, depending on the operation scope.
BISC // GUEST COLUMN
SKILLING REQUIREMENTS Fiber optics, like any fast-growing technology, needs well-trained professionals however, very few of those are trained in technical schools currently, both in high schools and colleges, where general courses prepare them for most
Invent Solve Work Play
other theoretical aspects of iber optics that are rarely used in on-ield applications. Some are trained by schools specializing in adult education, oten aimed at speciic applications, such as installing outside plant telecommunications cables underground, where instructors are usually
creating new knowledge, skills, products, service, leadership
Craftsman
creating use of skills, to resolve problems purposeful use of knowledge
motivational use of knowledge
acquiring basic knowledge
Know
Hierarchy of Skills
Expert Specialist Apprentice Student
experienced in the ield themselves. Going further, all these programs need qualiied teachers and an accredited course curriculum, which is another challenge the industry faces today. Sometimes, we fail to understand the importance of delivery of subject matter by subject experts in a manner that is acceptable to the learning acumen of the participants. A qualiied teacher will know the material he/she is teaching, preferably from personal experience, and must have skills in teaching students that material. Here having a standardized, accredited and generic coursecontent that involves primarily hands-on lab, to develop skills on the relevant processes will help create a skilled workforce that understands the standards requirements and is self-disciplined to do things, the way they are meant to be. It’s further important that a teacher has those skills and know how to teach them in the simplest way possible. Quality skilling seems to be a challenging, but looking at the way the government intends to make it happen,it seems possible, provided, we have the patience and persistence and we do not compromise on the quality of education in any of training aspects. So let’s work towards making the NOFN a communication infrastructure that would be cherished by the generations to come.
JUNE 2016
ENTERPRISE IT WORLD 29
THE STUFF // PRODUCTS & SERVICES
JUNIPER
HPE
Juniper EX Series HPE OneView 3.0 Juniper Networks EX2300, an entry-level switch, and EX3400, a mid-range switch, ofer new options for companies to leverage Juniper Networks Unite for a cloudenabled enterprise, including Junos Fusion Enterprise and Juniper Networks Virtual Chassis technology to streamline network provisioning through a single point of management. he new solutions are expected to also further Juniper’s Sotware-Deined Secure Networks (SDSN) framework by serving as additional enforcement points
throughout the network. As part of Juniper Unite the new EX2300 and EX3400 switches provide small and mid-market organizations with an easyto-manage network solution, liberating overextended IT resources to concentrate on high-impact projects. he new access switches also give large enterprises greater lexibility needed to signiicantly scale operations and implement resourceintensive IT projects. hese switches enhance the EX Series switching portfolio, ofering
customers more choice while maintaining the same Junos-based EX feature set, including the endpoint functionality for Junos Fusion Enterprise. Additionally, by building enforcement capabilities into these new switches, companies can stop potential security threats closer to where they originate and help the network defend it. he Juniper Networks Professional Services team and its authorized Professional Services Partners can provide network assessments, customer on-boarding,
design, deployment, and education services to help enterprise customers evolve their network architectures to meet cloud-based application and services requirements. he EX2300 and EX3400 are covered by Juniper’s Enhanced Limited Lifetime Warranty (eLLW). Additionally, Juniper’s highly trained Professional Services Partners ofer their own unique brand of service oferings to help customers better integrate Juniper technologies into their environments, the release said.
CAPABILITIES… • Cost-effective 1 Gigabit Ethernet (GbE) fixed configuration access switch: Features 10 GbE uplinks to support increased demand for bandwidth from cloud, rich media and video. • Junos Fusion Enterprise technology-ready: EX2300 and EX2300-C can be deployed as endpoints in a Junos Fusion Enterprise fabric allowing for unprecedented operational simpliication. • Virtual Chassis with zero touch provisioning (ZTP): For smaller scale deployments, up to four EX2300 and EX2300-C can be combined in a Virtual Chassis coniguration to simplify operations and ZTP shortens the time to production. • Simplified on box management: The J-Web on box management provides direct, easy management, coniguration and troubleshooting through a web browser-based interface. Multiple EX2300 and EX2300-C switches can be seamlessly managed with Network Director, which delivers full lifecycle management for simpliied network control and automation across a distributed enterprise. • Flexible deployment: The compact, silent fanless EX2300-C offers a lexible deployment option for open or quiet environments.
HPE OneView 3.0 provides sotware-deined intelligence across HPE’s family of infrastructure solutions, including HPE ProLiant, HPE BladeSystem, HPE 3PAR StoreServ, HPE Hyper Converged solutions, and HPE Synergy, the industry’s irst composable infrastructure. he latest enhancements to HPE OneView include a new global dashboard, which simpliies IT operations for large scale and globally distributed environments deployments including remote sites. his dashboard gives users an “at-aglance” view of their infrastructure no matter where it is located, as well as supports physical, virtual, hyper-converged and composable infrastructures. It also ofers simpliied end-to-end management of heterogeneous network switches. CAPABILITIES… • New provisioning for HPE ProLiant DL platforms • Customers can now deploy server infrastructure optimized to speciic workloads. • New monitoring support for the HPE Apollo series, expanding management coverage across a wider array of infrastructure. • Migration from virtual connect environments to HPE OneView 4X faster and with zero downtime or service disruption. • Growing partner HPE OneView ecosystem with SaltStack, SUSE, Eaton and nLyte, making partner, dev op, cloud and facility management tools
COSEC
B Y S A N JAY @ AC C E N T I N FO M E D I A . C O M
COSEC ARC DC 100P COSEC ARC is an intelligent compact IP panel with PoE for a single door. Matrix COSEC ARC is specially designed to meet the needs of existing RFID Markets. Its seamless integration with third party Wiegand readers allows organizations to easily shit from existing RFID technology to biometrics. COSEC ARC works in two modes – Standalone Mode with COSEC
30 ENTERPRISE IT WORLD
JUNE 2016
PANEL or in a Centralized Mode with COSEC CENTRA Application Server along with 10,000 User Capacity and 100,000 Event Storage. It supports two Readers on Wiegand or RS-485, door lock and other auxiliary devices making it an ideal solution for any access control installation. Hero Moto Corp has successfully installed 156 COSEC ARC at their plant in Noida, India.
CAPABILITIES… • Compact, Single Door Access Control IP Panel with PoE • Two Operational Modes: Standalone Mode with COSEC PANEL LITE and Network Mode with COSEC Sever • Two Readers on Wiegand or RS-485 • Standby Operation with Network Connectivity • Support Data and Power on PoE for Readers and Door Lock
india’s first IT magazine for sme business
PRESENTS
CONNECTING CUSTOMERS MODERNIZING INFRASTRUCTURE TO ENABLE BUSINESS
OPPORTUNITY AS BIG AS
10
1000 CUSTOMERS
CITY
200
CR TICKET SIZE
JULY-SEPTEMBER 2016 GURGAON - 14 JUL l NOIDA - 15 JUL l CHANDIGARH - 3 AUG l LUDHIANA - 10 AUG l ALIGARH - 17 AUG l KANPUR - 24 AUG l BHOPAL - 7 SEP l INDORE - 14 SEP l RANCHI - 21 SEP l JAIPUR - 28 SEP
GURGAON 14 JULY 2016 LEELA AMBIENCE
SEND YOUR PRE-REGISTERATION TO WIN APPLE IPAD, APPLE PHONE
NOIDA 15 JULY 2016 RADISSON BLUE
to sanjib@accentinfomedia.com
CONTENT PARTNER
ENTERPRISE APPLICATION PARTNER
NETWORKING PARTNER
APPLICATION INTEGRATION PARTNER
INFRA PARTNER
SECURITY PARTNER
OFFICE AUTOMATION PARTNER
6/103, (Ground Floor) Kaushalya Park, Hauz Khas New Delhi-110016 Tel: +91-11-41657670 / 46151993, Email: info@smechannels.com