REVIEW
THE
april 2016
An in-house publication by Aptec – an Ingram Micro Company
Business insights for IT solution providers
Cyber resilience
How channel partners can create a robust cybersecurity strategy
INSIDE
09
Symantec Endpoint Suite solutions
11
Cisco Cisco ASA with FirePOWER Services
26
IBM Security Intelligence and analytics
Vendors and Contact Information
Contact Information APTEC – GCC Dubai Internet City, Dubai, UAE PO Box 33550 Tel: +971 4 3697111 Contact: Svetlana Sorokina E-mail: MarketingGrp@aptecme.com APTEC – Egypt 11 JAber Bin Hayan Street Parallel to Abbas El Aqad Street Nasr City Cairo, Egypt Tel: +202 2 240 1 7046 Contact: Mohamed Selim E-mail: Mohamed.Selim@aptec.com.eg
INGRAM MICRO - Morocco Lot.33, La Colline 2, Immeuble les Alizés, Bureau 302, Sidi Maarouf, Casablanca, Morocco Office : +212-522 786 171 +212-522 786 223 Fax : +212 522 786246 INGRAM MICRO - Pakistan Office # 511&512, 5th Floor National IT Park, Caesars Tower, Shahrah-e-Faisal,Karachi, Pakistan Tel: +9221 32786675/ 32783209
APTEC – Lebanon St. Georges Sq, Lebanon Tel: +961 4 718891 Contact: Elie Abou Emaan E-mail: elie@apteclebanon.com APTEC – Oman Knowledge Oasis Muscat Building 4 PO Box 100, Rusayl, Oman Tel: +968 96429250 Contact: Mashook Rehman E-mail: mrehman@aptecme.com APTEC – Turkey Bayildim Cad Acelya Sok. No:2/3 Macka Besiktas Istanbul, Turkey Tel: (90 212) 259 0064 Contact: Hulya Erkmen E-mail: hulya.erkmen@aptec.com.tr APTEC – Saudi Arabia PO Box 94609 Riyadh 11614 Tel: + 966 11 460 1950 Fax: + 966 11 460 1933 Contact: Mohammed Sheikh E-mail: msheikh@aptecsa.com
Published by
2
April 2016
w w w. a p t e c o n l i n e . c o m
Introduction
07 Discover HPE Flexible Capacity services
Dear Partners, The online threat landscape has transformed drastically over the last few years. Most reports indicate that the Middle East market will amount to $10B by 2019. This is doubling the $5B spent in 2014 at an estimated Compound Annual Growth (CAGR) of 13 percent. As a leading regional distributor, we have identified prospects in the current market scenario and represent strategic cybersecurity vendors in our portfolio such as Cisco, Intel Security, IBM, Symantec and Kaspersky. Additionally, our recently launched regional cybersecurity division aims to offer consultative advice through our partners on the best strategies for an organization. Partners have the opportunity to capitalize on a host of services that we offer. This includes our dedicated professional services division, which provides certified security engineers to our partners. We are investing heavily in specialists and resources who have a high level of expertise in the latest cybersecurity technology. We are making these resources available to our partners. We are saving partners’ time and costs from investing in such skills as our certified security consultants can be provided as white labeled consultants. As a part of our value-added offering, we enable and train partners on how to engage with customers. We strongly believe that channel partners can grow profitably in the cybersecurity space by investing more on enablement and learning. This has to be the key focus. They have to present a solution and advisory service that can be trusted and this is where Aptec plays an important role too. We are excited to work together with our partners to seize the opportunities in the cybersecurity space and offer innovative solutions to the market. Sincerely, Ali Baghdadi SVP & Chief Executive Ingram Micro META
09 Learn more about Symantec’s Endpoint Suite
22 Benefits of adding flash to NetApp’s FlexPod
26 IBM’s security solutions addresses intelligence, integration and expertise
Aptec news
Aptec Accolades VENDOR AWARDS
Distributor of the year 2015 – Gulf and KSA
MEDIA AWARDS Best Marketing Campaign for flyHigher – ITP Channel Awards 2015
• Best New T2s recruitment – 2015 • Visionary Leadership Award in Security
Highest Growth Distributor of the year 2015
Aptec Awards Night
Best Growth of the year – ME and West Asia region Best Distributor of the Year
Aptec along with Cisco conducted the Annual Channel Awards Night on 8th Feb 2016 at Palazzo Versace Hotel Dubai. Best-in-class partners in line with Cisco’s focus areas and architectures were rewarded across eight award categories.
Aptec together with Veritas organized an awards night on 25th November 2015 at Zabeel Serayi Hotel to recognize its loyal partners. Top performing partners were rewarded for their contribution and loyalty.
Outstanding Distribution Partner of the Year – 2015
4
April 2016
Best Distributor of the Year – 2015
w w w. a p t e c o n l i n e . c o m
Aptec news
Aptec Ingram launches Mobile App-IM Stock for Cisco Partners in Middle East Aptec has launched flagship Mobile APPIM Stock for Cisco Partners in the UAE and Gulf region. The main objective of the App is to provide partners a ready-to-access, user-friendly platform to enhance partner engagement. While on the go, through IM Stock partners can now: • Access Cisco Inventory Status of Aptec
Ingram Micro signs distribution agreement with Microsoft for NEPA Ingram Micro has expanded its distribution agreement with Microsoft to cover NEPA region (North Africa, East Mediterranean countries and Pakistan), which includes countries such as Morocco, Algeria, Tunisia and Pakistan. With this contract, the company is authorized to distribute the entire line of Volume Licensing products from Microsoft as an official Volume Licensing Distributor in the NEPA region. Ingram Micro has regional distribution rights with Microsoft in other countries of the META region (Middle East, Turkey and Africa), transacting through Aptec in Gulf countries (UAE, Kuwait, Oman, Bahrain, Saudi Arabia), in Egypt, Lebanon, Jordan and others.
Ingram Micro joins Microsoft CSP program in MENA Ingram Micro has announced that it has joined Microsoft’s Cloud Solution Provider (CSP) program in the Gulf region, French speaking North Africa countries and East Mediterranean countries. The CSP program is designed to strengthen customer relationships and
• Place enquiries/get quotes/request call back • Get an update on the latest promotions/offers • Register for training and events The App is available for free to download on Google Play Store and Apple Store.
Ali Baghdadi, Senior Vice President and Chief Executive, Ingram Micro, META, said, “We are delighted with Microsoft’s decision to appoint us as a regional distributor for NEPA. Our commitment to develop IT solutions in NEPA countries is solid and backed by significant investments.” “Strong partners are key to expanding our reach and to our success. Ingram Micro will help us deliver on our cloud-first, mobile-first strategy across NEPA,” said Leila Serhan, Regional General Manager, Microsoft. Ingram Micro has been on-boarded by Microsoft and is conducting business in the assigned territory. Resellers in North Africa and Pakistan will soon have an opportunity to join Ingram Micro enablement and development programs, which have been successfully implemented in other countries of the region. Ingram Micro will also be launching its channel partner programs, conducting partner events and solutions forums in each country.
Ingram Micro is now authorized Cisco Learning Partner in GCC Ingram Micro is now the authorized Cisco Learning Partner in GCC countries such as UAE, Kuwait, Qatar, Oman, Bahrain, Afghanistan and Yemen. “Our global relationship with Cisco is paramount to our success as a Cisco Learning Partner, and adding the Gulf to the training partnership only further underlines the mutual importance of this affiliation,” said Zornitza S. Hadjitodorova, head of Ingram Micro Training MEA. “Ingram Micro Training in MEA has seen tremendous growth since the official inception of the regional business unit two years ago, and Cisco is an essential vendor to add to our training portfolio. As a distributor of Cisco equipment, we are well positioned to be a strong training partner as well. We plan to first and foremost support our distribution sales team to further strengthen the channel.” To qualify for Cisco Authorized Learning Partner status, Ingram Micro had to meet minimum curriculum, course delivery, lab and staffing requirements, including the use of Certified Cisco Systems Instructors (CCSI). The Cisco Learning Partner program focuses on core technology training and preparing IT professionals for career certification by delivering industry leading Cisco Authorized curriculum.
expand cloud growth by enabling channel partners to provision, bundle, invoice, manage and support Microsoft cloud offerings including Microsoft Azure, Microsoft Office 365, and Enterprise Mobility Suite. Currently authorized to sell Rahul Bhavsar Microsoft cloud services via the Director Cloud - Sales Microsoft CSP program in over 40 Ingram Micro META Region countries, Ingram Micro’s participation in 10 countries of the MENA region further demonstrates its commitment launch of the Microsoft CSP program through to serving channel partners worldwide who Ingram Micro’s Cloud Marketplace in the seek to profit from Microsoft cloud solutions. company’s North America, Europe, Latin This latest appointment follows the successful America and Asia Pacific regions.
w w w. a p t e c o n l i n e . c o m
April 2016
5
DATA GIVES YOU THE ADVANTAGE.
BACKUP SHOULDN’T STOP YOU FROM MAKING THE RIGHT MOVES.
It’s time for backup that fits with your game plan.
IT’S TIME FOR VERITAS. Backup Exec™ lets you choose the right licensing model for your environment at a price point you can afford. Flexible licensing options include per TB with our capacity offerings that are scalable to accommodate data growth. Discover backup that believes in fair play at backupexec.com/trybe
© 2016 Veritas Technologies LLC. All rights reserved.
HPE-Technology Services
HPE Flexible Capacity Services (Pay-per-use) “Innovative way of consuming IT”
F
lexible Capacity With the change in market dynamics and paradigm shift, instead of building IT, customers are looking for consuming IT and pay-per-usage like electricity and water. Customers are looking for an option for public cloud but have concerns around security. Although they would like to have complete control, they are looking for a similar experience as public cloud, while hosting infrastructure onsite. This will bring Infrastructure-as-a-service, paid on a per-month basis with infrastructure capacity (server, storage, network and software) placed within customers’ site into the base level services to provide customer with a modular IT environment.
The FC ‘solution stack model’ is sub-divided into various components that are all part of the IaaS Services (Infrastructure-as-a-Service). The core of the FC Services comprises 1. Hardware and software 2. Services
Challenges Based on feedback from our customers, we had noticed challenges that can be summarized as follows: • Need to reduce large upfront IT investment • Capital budget constraints • Need flexibility to meet growth and surges in demand • Want the ability to control and monitor infrastructure utilization • Require ease of provisioning, managing, and scaling infrastructure • Aligning costs with infrastructure usage • Increase IT sustainability In addition to that, procurement has also expressed its own set of challenges, particularly: • Need to reduce operational costs • Meeting capital budget constraints • Meeting business requests for IT equipment in a timely manner • Reducing the complexity of acquiring upgrades for existing IT projects • Addressing urgent adhoc requests from business • Aligning costs with infrastructure usage • Improve productivity of procurement department HPE Flexible Capacity (FC) is a perfect fit to address the above issues. It has the advantage of addressing not only your current requirement but also your future needs. In most IT projects, enterprises usually predict the usage requirement and build in a growth factor and eventually procure the full infrastructure. The problem with this process is that the infrastructure is underutilized in the early years, which results in wasted investments in hardware, licenses, support, space, power and cooling. If growth is underestimated, a further procurement is required, which may impact service delivery and customer satisfaction. The FC model aligns your infrastructure with your utilization thus reducing the unnecessary investments.
Benefits of the HPE FC Model Customer will have unique benefits with HPE FC model with the storage and software infrastructure. • FC will avoid customers making large upfront capital investments. Hence improves cash flow and reserve fund for high-yield projects • Start small and grow. Purchase enough to cater for immediate demand. Buffer will address spikes in demand. • No need to provision 3 or 5 year growth on day one or start of project • Meeting business requests for IT equipment is simplified as it is a matter of activating additional infrastructure as part of the FC contract. • Urgent adhoc requests from business are addressed immediately • It will reduce the complexity of acquiring upgrades for existing IT projects since all terms and pricing already agreed as part of master FC contract • Lower risk on project (HPE shares risk with customers by investing in infrastructure) • Costs of infrastructure are aligned with usage and you get much better predictability on expenditures • FC will reduce operational costs • Simplified procurement results in improved productivity • Simplified acquisition of upgrade For more details – http://www.hp.com/go/flexiblecapacity
w w w. a p t e c o n l i n e . c o m
April 2016
7
BREAK THE STATUS QUO:
THINK BIG. START NOW. Brocade Network Subscription empowers you to leverage the latest networking technology without sacrificing your budget—or your flexibility. It's time to subscribe to a future with unlimited scalability and total freedom from term commitments and depreciation cycles. Start your journey to the New IP today.
www.brocade.com #NewIP
© 2015 Brocade Communications Systems, Inc. All Rights Reserved.
Symantec
Endpoint Protection and Encryption Complimented by Mobile and Mail Security
S
ymantec™ is the only vendor to combine market leading security for desktops, laptops, servers, and email into a single purchase. Symantec™ Endpoint Suite removes complexity by combining products to provide layers of protection for your endpoints, mobile devices, and email infrastructure. It protects against malware and data loss with endpoint protection and encryption. It secures email servers and gateways from malware and spam while encrypting email to prevent data loss and ensure compliance. Single purchase, single renewal, providing layered security Symantec™ Endpoint Suite and Endpoint Suite with Email make it easy to purchase with predictable subscription pricing
1
and true “per user” license metering helps reduce both up front and on-going costs. Complete security for laptops, desktops, tablets and mobile phones - Protect against APTs, malware, and targeted attacks - Protect against theft or data loss with full-disk and removable media encryption - Protect mobile phones and tablets against threats and enable BYOD with mobile device management
Symantec protection technologies neutralize today’s advanced threats The proven proactive protection like Symantec™ Insight and SONAR technologies that analyze the reputation and characteristics of suspicious files to determine if they pose a danger to your systems and proprietary technology. Symantec™ Disarm helps protect against targeted attacks and zero day malware by removing exploitable content from Microsoft Office and PDF attachments.
Protect business information and IT resources with email server and gateway protection Secure your valuable business information at the mail server and messaging gateway with advanced content filtering and data loss prevention technologies.
Protection powered by the world’s largest civilian threat intelligence network Symantec Endpoint Suite provides strong, layered security powered by one of the world’s largest civilian threat intelligence networks.
2
3
w w w. a p t e c o n l i n e . c o m
4
5
April 2016
9
10 Reasons to Choose SUSE SUSE, a pioneer in open source software, provides reliable, interoperable Linux and cloud infrastructure solutions that help enterprises increase agility, manage complexity and reduce cost. More than 20 years of engineering excellence and exceptional service allow us to adapt and deliver the smarter innovation customers need to succeed—today and tomorrow.
1.
6.
You can save up to 70 percent over UNIX. We have customers that have saved more than 70 percent on their total cost of ownership (TCO) by moving their mission-critical workloads from UNIX to SUSE® Linux Enterprise. And with SUSE Linux Enterprise now firmly established as providing the same level of reliability, availability and serviceability (RAS) as UNIX, there’s no reason not to make the move now. Learn more at: www.suse.com/smart
You will have maximum choice and flexibility over virtualization. The powerful Xen and KVM hypervisors are included with SUSE Linux Enterprise Server. Alternatively, you can count on consistent performance and streamlined support when you use SUSE Linux Enterprise Server with Hyper-V or vSphere. Microsoft and VMware recommend SUSE Linux Enterprise Server to their customers who run Linux servers.
2.
You can make your own choices in your data center in confidence. SUSE has formed alliance partnerships with all the major industry leaders to enable you to use our solutions with confidence knowing they have been developed and tested to be compatible, and that you will receive maximum and, in some cases, fully integrated support from all sides. Learn more at: www.suse.com/alliance
You can save up to 50 percent on all your enterprise Linux subscriptions. The SUSE Linux Enterprise Server with Expanded Support subscription enables you to update, patch and support other major Linux operating systems under a single contract, including RHEL. So if you’re looking to reduce your TCO and Learn more at: www.suse.com/expandedsupport
3.
You will know you’ve chosen SAP’s recommended Linux. If you have SAP, then SUSE is the smart choice. More than 10,000 customers run their SAP workloads on SUSE Linux Enterprise. SUSE is the recommended and supported OS of choice for SAP HANA and SAP’s Linux development platform. SUSE Linux Enterprise for SAP Applications is the only Enterprise Linux optimized for all SAP solutions. Learn more at: www.suse.com/products/sles-for-sap
4.
You can be confident you’ll get the best support. We operate nine support centers worldwide with hundreds of Linux engineers who are trained in supporting mixed IT environments. Available 24x7x365, they specialize in resolving problems, determining root causes and minimizing team of skilled field engineers who resolve urgent problems onsite.
5.
You can relax about interoperability. SUSE Linux Enterprise Server is designed for interoperability with Windows and other operating platforms, making it the ideal choice for heterogeneous environments. Our unique relationship with Microsoft enables you to consolidate, simplify and better manage your mixed IT environments. Learn more at: www.suse.com/cloudinterop
7.
8.
You can automate the management of your mixed-Linux environment. SUSE Manager enables you to reduce the inherent complexity of managing multiple Linux distributions, including RHEL, across diverse hardware architectures and virtual and cloud environments. It gives you seamless systems management with a single centralized solution. Learn more at: www.suse.com/patchmgmt
9.
You will get to the cloud quicker! SUSE Cloud makes it quicker and easier for you to deploy and manage a secure, reliable, and scalable cloud infrastructure. It is fully-supported and powered by OpenStack, the open-source cloud project with the broadest industry support and the most vibrant community. Learn more at: www.suse.com/cloudchalktalk
10.
You will find us easy to work with. Many customers have told us time and again that we are extremely easy to work with. We pride ourselves on being very responsive and adaptable to your needs.
For more information, please contact For more information, contact Dennis Zacharia Dennis Zacharia Product Manager SUSE Enterprise Product Manager Suse Enterprise Linux Linux Ingram Micro - Dubai Aptec-An Ingram Micro Company Dennis.Zacharia@ingrammicro.com Mobile: +971-55-5693899 +971 555693899 Email: dennis.zacharia@ingrammicro.com
Cisco
Cisco ASA with FirePOWER Services INTEGRATED THREAT DEFENSE BEFORE, DURING, AND AFTER AN ATTACK
O
verview Today’s security landscape requires a more sophisticated, threat-focused approach that protects across the entire attack continuum—before, during, and after an attack. Cisco® ASA with FirePOWER • Services is the industry’s first adaptive, threatfocused, nextgeneration firewall (NGFW), designed to meet today’s level of threats and malware. • Cisco ASA with FirePOWER Services combines the proven security benefits of the Cisco Adaptive Security Appliance (ASA) firewall platform with the industryleading FirePOWER next-generation intrusion prevention system (NGIPS) to provide comprehensive protection from known and advanced threats. • Cisco ASA with FirePOWER Services offers customers more visibility to prevent threats and malware attacks and accelerate remediation after an attack has occurred. • Customers will benefit greatly from the superior, multilayered protection in this totalsecurity solution while saving money and reducing complexity. URING, AND AFTER AN ATTACK • This is a $3 billion opportunity in North America, and we’ve created incentives, and financing to help you and • bundles, Industry-leading visibility offers with superior network capitalize on it. endpoint awareness
h FirePOWER Services
protects uring, WER -focused, meet
es ptive h the ntrusion ehensive Cisco ers more ks and curred.
or, olution
ca, and cing offers
• Superior multilayer protection detects multivector threats other solutions may miss Cisco advantages • FullASA automation to reduce capital expenditures Cisco with FirePOWER Services deliversand the provide a simplified approach superior security benefits your customers need in • Combines the industry’s most effective NGIPS with a single device: the most trusted network firewall • • The most accurate in the VPN Highly secure remotethreat accessdetection beyond traditional industry, according to NSS Labs capabilities that are transparent to the end user • • Industry-leading visibilitysecurity with superior Integrates with third-party solutionsnetwork via the eStreamer APIawareness and endpoint • Superior multilayer protection detects multivector threats other solutions may miss • Full automation to reduce capital expenditures and provide a simplified approach
• Combines the industry’s most effective NGIPS with the most trusted network firewall • Highly secure remote access beyond traditional VPN capabilities that are transparent to the end user • Integrates with third-party security solutions via the eStreamer API
Who to target Cisco ASA firewalls have typically been sold to the network buyer, for whom network integration is a key consideration. Sourcefire® products Partner At-A-Glance are typically sold to the chief security officer or security architect/operations buyer looking for a best-in-class solution. Cisco ASA with FirePOWER Services offers you a best-in-class solution for both buyers, and its advanced VPN features will appeal to both groups. Table 1: Who to Target
Target Buyer
Priorities
Security Operations or Security Buyer
•
Preventing threats and malware attacks
•
Managing and minimizing risk while enabling business
•
Providing secure access for remote users
•
Reducing IT support overload and help desk calls
•
Improving security, compliance, and uptime
•
Reducing time and resources spent on operations
•
Reducing operating expenses
•
Delivering seamless mobile access
IT or Networking Buyer
What to sell • Cisco ASA with FirePOWER Services -- Include IPS, URL Filtering, and Advanced Malware Protection (AMP) licenses -- Include Advanced VPN Services (AnyConnect) • Cisco FireSIGHT Management Center • Cisco Services: Security Migration, Remote Managed, Services Technical Support, and Collaborative Network Device Security Assessment Where to find opportunities • Customers that are security conscious and responsible for security or network operations in commercial, enterprise, and Global Enterprise Theater accounts • Security operations or buyers focused on preventing threats and malware attacks as well as managing and minimizing risk while enabling business • Installed base: -- Existing Cisco ASA 5500 customers or ASA 5500-X and ASA 5585-X customers running ASA Next-Generation Firewall Services or ASA IPS -- Existing customers with an older Cisco PIX® firewall -- Legacy Cisco IPS 4200, 4300, and 4500 Series Sensor customers • Customers with competitive firewalls or NGFWs that cannot provide superior visibility, multivector threat protection, advanced threat detection, and/or secure remote access • Customers looking to refresh their IPS • Sourcefire FirePOWER customers For more information, please contact Sam Johny Product Manager - Cisco Aptec - an Ingram Micro Company Mobile: +971-55-1034906 Email: sam.johny@ingrammicro.com
Key Incentives and Promotions • Technology Migration Program: Trade in a Cisco ASA ww w. apteconline.com 5500 Series firewall and receive: - Up to 10 percent off the list price of any new Cisco ASA 5500-X Series NGFW with an eligible trade in
April 2016
11
Linksys
IS AN OLD ROUTER THE WEAK LINK IN YOUR WIRELESS NETWORK?
I
n a world of ‘smart’ TVs, movie streaming services, and a proliferation of mobile screens in a single household, an ageing router can be the weak link in a state-of-the art digital home. If that new Netflix account isn’t quite working as expected, it might be time to give your Wi-Fi hardware an upgrade. “The technology we used to connect a laptop to the internet just two or three years ago, simply isn’t good enough for the way we use the internet today,” said Amanulla Khan, Managing Director, Linksys, Middle East, Turkey & Africa. “We can buy the latest devices, but if the router is weak, then the experience is poor. It’s not that there is a fault in the system, it’s just the technology is out of date.” Linksys are the pioneers in networking infrastructure. With Wi-Fi, as with everything else, it’s worth investing in quality, and upgrading to keep pace with improvements in the latest technology. The rule of multiples With established WiFi technology, a router only sends and receives data along a single pathway, only ever connecting to one device at a time. When we have multiple devices connected, the router will share the signal by switching between them extremely quickly. As long as we don’t ask too much of our bandwidth, this switching happens so fast that we don’t notice. However, when we load device after device onto the network, internet quality goes down, especially when using one or more of those devices for something intensive, such as streaming HD video. This applies even when the router has multiple antennas – referred to as SU MIMO, or Single User, Multiple Input, Multiple Output – there is a stronger connection to individual devices, but the data itself is still being split into little packets. The very latest innovation in router technology is MU MIMO, or Multiple User, Multiple Input, Multiple Output technology, and its created specifically to solve the problems caused by
Amanulla Khan, Managing Director, Linksys, META
‘switching’. With MU MIMO, the router is able to provide a dedicated stream of data to each device, with no more gaps in transmission. Linksys has expanded its MU-MIMO portfolio, for connected homes to include two additional routers, a range extender and a USB adapter. The range extenders are built with spot finder technology that indicate the optimal placement for the range extender eliminating dead zones and a seamless roaming feature that connect smart devices automatically to the range extender providing uninterrupted connectivity. The new Linksys MAX-STREAM line-up, announced at CES 2016 in Las Vegas, has recently gone on sale in the Middle East, leveraging the next generation of Wi-Fi - 802.11ac Wave 2 MU-MIMO. The new range of products include EA7500 - MAX-STREAM AC1900 Dual Band and EA9500 - MAX-STREAM AC5400 TriBand routers which aim to elevate the consumer experiences for connected families. The technology also meets the increasing complex needs of the small to medium businesses. The company has exclusively launched the WRT series of routers for ‘prosumers’ such as the WRT1900ACS DUAL-BAND routers that allow further network customization to include the
w w w. a p t e c o n l i n e . c o m
addition of 4G capabilities. These routers are also renowned among powergamers and enthusiasts as an ultimate product solution boosting the gaming experience. Linksys invests heavily in engineering wireless platforms creating a unique user experience complementing the cloud-based service offered with the Linksys Smart Wi-Fi Routers and the latest WRT routers. It gives users highly secure access to their home network from a browser or a smart device. Users can instantly tap into their home network to check the connection status of their devices, give a guest access to the Internet, and protect their child from accessing harmful websites. Users can also prioritize which devices on the network get the most bandwidth to eliminate lag times and buffering. Along with the tech itself, Linksys has invested in experiential tech benches, in-store Planograms, kiosks and online videos, which educate customers on the right products based on their usage criteria. Complete solutions to meet complex needs Linksys SMB portfolio, launched for the commercial space in October 2013, offers small and medium business owners a suite of products with enterprise grade and features at a SMB price point. This is complemented with lifetime warranty, immediate product replacement service and 24/7 online support to ensure SMBs get the same level of benefits as larger enterprises with reduced downtime. These business offerings simplify the management and deployment of networks, without the need of an in-house IT manager. Linksys also invests heavily in channel partner programs that include technical boot camps, workshops and frequent training and educating sessions to retailers, resellers and service providers. Smart home solutions can now be easily deployed with minimum disruption by connecting the appliance to the network through a smart switch. The vendor is taking great efforts to educate appliance manufactures on smart home automation and encourage consumers to upgrade to this technology. It all serves one purpose – making sure that our investment in ever-smarter devices is money well spent.
April 2016
13
Editorial
Examining cybersecurity prospects Ali Baghdadi, SVP and Chief Executive, Ingram Micro META, discusses the evolving regional cyber threat landscape and how partners can enhance their skills to be profitable in this area.
T
he online threat landscape is no longer what it used to be five years ago, it has transformed to a great level, considering the evolving attack surfaces and methods. The region has become a centre stage for cyber-attacks in the recent years. Malware attacks on oil and gas companies, Saudi Aramco and RasGas in 2012 further reinforce how vulnerable the regional market has become to these kind of attacks. Most research shows that the Middle East market will be worth $10B by 2019. This is doubling the $5B spent in 2014 at an estimated Compound Annual Growth (CAGR) of 13 percent.
14
April 2016
Additionally, the region’s political instabilities and lack of governmental security frameworks, have also attracted persistent and sophisticated cyber-attacks from organized criminals, terrorists and some foreign governments. DDoS attacks, phishing, security breaches in SCADA systems have become a trend in the Middle East over the last few years. Many vendors such as IBM, Intel Security, Cisco, Symantec, Trend Micro, and Fortinet, have accelerated their advancement in technology that counters such attacks. Aptec, a wholly owned subsidiary of Ingram Micro, represents most of these strategic
w w w. a p t e c o n l i n e . c o m
cybersecurity vendors and offers a host of resources for partners to optimize the prospects present in the space. The distributor also has a dedicated professional services division, which provides certified security engineers to its partners. Ali Baghdadi, SVP and Chief Executive, Ingram Micro META, adds that vendors realize the opportunities the Middle East region has to offer for their solutions. “High growth markets include Saudi Arabia, UAE, Kuwait, Qatar, Oman and Egypt, and this can be seen in the increase in the budgets allocated to security.” The challenge is that most organizations treat
cybersecurity as an IT problem. It therefore becomes the responsibility of the distributor and vendors to guide channel partners in convincing customers that cybersecurity is certainly a much larger issue. Baghdadi adds, “Cyber criminals now have sophisticated experts and in some cases are funded by criminal organizations or rogue governments. Attacks are used to obtain personal information, credit card and bank information, passwords, intellectual property and much more. “With the increased penetration of smartphones, attacks are becoming more sophisticated as they can lure a user to click on a link in common social media apps such as Facebook, Twitter or personalized or hijacked email addresses.” The impact of cyber-attacks clearly extends beyond the perimeters of IT and percolates into everyday life. Understanding this well, Ingram Micro is at the forefront of offering robust cybersecurity training and certification programmes for partners in the region. “Ingram Micro and its subsidiaries in the Middle East and Africa have training centers in several countries including the UAE, Saudi Arabia, Egypt, Turkey and South Africa.” In 2016, we will see the distributor announcing centers in more countries. Courses are currently offered for specific vendors including Cisco, IBM and Microsoft. In addition, the company has established a Regional Cyber Security Division that will offer consultative advice through its partners on the best strategies for an organization. “We are investing heavily in specialists and resources who have a high level of expertise in the latest cybersecurity technology. We are making these resources available to our partners. Our partners do not have to invest in such skills as our certified security consultants can be provided as white labeled consultants. Enabling and training on how to engage customers is part of what we offer,” explains Baghdadi. Currently, there is significant shortage in skills and experience not only in the Middle East, but also on a global scale. There are many certifications for cybersecurity such as GSEC, CISSP, SSCP, CISM and CEH. He says, “Being certified for specific vendor technology is also important. The Ingram Training centers can guide on the most appropriate ones.”
There is no foolproof prevention strategy when it comes to cybersecurity threats. The only way partners can maximize from a solutions-selling model is by understanding the needs, structure and problems of the end-user organization, which is key to proposing a solution. There are solutions that would assist in this, explains Baghdadi. “As an example, and developed in conjunction with Cisco, Ingram Micro’s new FirePOWER Network Threat Assessments enable IT service providers in the US and Canada to quickly identify network and endpoint security gaps using the latest security technology available.” The most popular areas of network security investment is around next-generation firewalls, cyber threat intelligence and analytics.
Ali Baghdadi, SVP & Chief Executive, Ingram Micro META
“We are investing heavily in specialists and resources who have a high level of expertise in the latest cybersecurity technology. We are making these resources available to our partners. Enabling and training on how to engage customers is part of what we offer.” Next Generation Firewalls provides the most important weapon against advanced malware. However, used in isolation, it will fail to provide the visibility and control for an organization. “A comprehensive security policy is required including solutions for endpoint and cloud environments. These firewalls are designed to detect and analyze unknown traffic in the network even if encrypted and has the ability to locate command and control traffic sent by cyber criminals,” he says. Cyber Threat Intelligence and Analytics is another important set of strategies that shorten the time of detecting an attack and lead to prevention. Only 30 percent of mid to large organizations in the Middle have a cyber intelligence strategy compared to over 70 percent in the USA.
w w w. a p t e c o n l i n e . c o m
“Major adopters tend to be Government and financial institutions,” he adds. Aptec offers a range of solutions such as Deepsight from Symantec, Global Threat Intelligence from Intel Security, X-Force Security threat Intelligence from IBM and solutions from many other vendors. In addition, Aptec offers some of the most advanced Next Generation Firewalls from Cisco, Juniper and Next Generation Intrusion Prevention Systems from IBM / Intel. Cyber Security Analytics is also available for a number of top vendors. For channel partners to succeed in the cybersecurity space, the most important investment should be on enablement and learning. “They have to present a solution and advisory service that can be trusted. This is where Aptec plays an important role,” explains Baghdadi.
April 2016
15
D-Link
D-Link 4G LTE Business Solutions 4G LTE is the fourth major generation of mobile network technology. Its bandwidth, latency and capacity offer the promise that network connectivity will no longer be a barrier to the benefits of high performance applications.
M
ost significantly, 4G LTE offers higher bandwidth by increasing the speed of data transfer with better speed of data uploads and downloads thus enabling use of richer, more numerous data streams which helps to transfer larger files more quickly. It allows for lower latency by providing faster response times from the network. Unlike 3G, LTE has an improved spectrum efficiency which increases the overall network capacity. The
18
April 2016
architecture and efficiency of LTE also make it a more cost-effective network to run. Its Quality of Service (QoS) management capabilities mean that certain applications could be given particular network performance characteristics, providing a more consistently high-quality user experience with faster real-time communication and improved performance. 4G LTE is seen by businesses as a major trigger for innovation and agility. Many agree that 4G has helped their organizations ‘innovate
w w w. a p t e c o n l i n e . c o m
and jump the competition’ and the majority of businesses say they get ‘more work done on the move’. Improved speed of access to applications and files, and the ability to work in new locations are the main benefits of businesses. It speeds up daily processes considerably, thus increasing productivity and profit. These are traditional benefits of mobility which have been further enhanced by 4G LTE. 4G LTE finds importance in various business markets and solutions around the world.
The inherent project complexity and need for temporary work locations in the Construction industry mean that fast mobile applications can greatly improve productivity, agility and costeffectiveness – through direct expense reduction and faster project completion. 4G LTE will be a key technology in providing consumers with in-car media and connectivity on public transport. Automotive and Transport LTE adopters report strong sales increases and cost reductions, especially through improved operations. 4G LTE could be a game-changer in certain market niches such as connected cars, though in some cases it will require standards to emerge. In Retail, 4G LTE is being used to improve marketing and customer service, provide in-store connectivity, and to increase speed to market and flexibility. It is also being used in new store formats, especially distributed or ‘pop-up’ stores and retail kiosks. 4G LTE improves productivity and collaboration in the Professional Services industry, by supporting the inherent flexibility, mobility, security and rich information transfer required. This will drive improved responsiveness, both in sales and in the delivery of projects and content. Although the point in time at which LTE becomes the dominant connectivity technology in the Internet of Things is debatable, it is clear that’s where the world is headed and the time is approaching quickly. The explosive growth of the IoT now projected to reach multiple billions of devices in the next few years and the unprecedented high adoption rate of LTE have given rise to a tidal wave of new business opportunities not only for mobile operators, but also for device makers now highly incentivized to connect their devices to the Internet via LTE. D-Link with its passion to innovate for the past 30 years and being the world’s pioneering networking leader already launched highperformance 4G LTE devices for these business solutions and integrated with IoT. D-Link has introduced their new DWR-925 4G LTE VPN Router with SIM Card Slot which is an easy to deploy high-performance Virtual Private Network (VPN) router with mobile connectivity to allow easy access to mobile broadband networks. You can create a powerful private network for your home or small office with easy
The DWR-925 4G LTE VPN Router comes in a robust metal housing and lets you connect to your 3G/4G mobile connection with fast downlink speeds of up to 100 Mbps and uplink speeds up to 50 Mbps, giving you the speed you need for fast, responsive Internet access. setup tools, advanced configuration options, and built-in security features. The DWR-925 4G LTE VPN Router comes in a robust metal housing and lets you connect to your 3G/4G mobile connection with fast downlink speeds of up to 100 Mbps and uplink speeds up to 50 Mbps, giving you the speed you need for fast, responsive Internet access. With regards to redundancy, the auto-failover feature automatically switches between mobile broadband and fixed-line broadband to ensure you stay connected to the Internet in case one connection fails. The serial port of the DWR-925 can connect to 56K modem as a failover option or be configured as a console port if necessary, providing extra flexibility and versatility. The DWR-925 can encrypt all wireless transmissions using WPA™ or WPA2™ to protect your wireless network against unauthorized access. It also protects your network from online intruders and potential attacks over the Internet with dual-active firewall protection using Network Address Translation (NAT) and Stateful Packet Inspection (SPI). This powerful set of security features will ensure that you can set up a wireless network with an Internet connection without worries. Wireless connectivity is covered by 802.11 b/g/n. It has 2 x external LTE antennas and 2 x external Wi-Fi antennas. Many companies prefer to keep their data
w w w. a p t e c o n l i n e . c o m
and software running on servers that are in their own offices, not in the cloud. That means your staff need a way to easily and securely connect to the office when they’re out and about. This device allows users to create a private network from the home or office with a simple setup and advanced configuration options that guarantee security and easy access to mobile broadband networks. It lets you create a secure high speed Virtual Private Network (VPN) for access over the Internet or a wired network connection. It supports IPsec, PPTP, L2TP, and GRE protocols in Server Mode, and also handles pass-through traffic. Advanced VPN configuration options can be set using the comprehensive setup wizard and includes multiple encryption options, key management, negotiation modes, and VPN authentication support using an internal user database. With the DWR-925 you’ll have all the tools you need to create the ideal VPN solution for your network. D-Link also offers a Dual SIM router, the DWR929W with dual SIM option and Gigabit LAN ports and similar features as the DWR-925, which will be available soon. D-Link has already announced the immediate availability of its range of machine-connect devices which includes the DWM-311, a 4G wireless module, which can be embedded within vending machines, kiosks and other interactive displays to provide real-time data-back to operators over the Cloud. Applications can range widely depending on the needs of the customer, with wireless modules leveraging a service provider’s network to deliver crucial data to nearby locations or anywhere in the world. The D-Link 4G Wireless Module DWM-311 offered as part of this integrated solution has an Ethernet port to connect to the internal computer of a connected interacted device with two antennas to connect to a cellular network for reporting back information. The D-Link 4G module integrates seamlessly with a service provider solution to offer a range of benefits and services, from increased logistical efficiency to improved customer service. The ability to react to customers’ wants and needs based on real-time 4G wireless communication will allow them to remain both prompt and agile in their responses.
April 2016
19
Share your
create your own Wi-fi hotspot
mobile
ROUTERS
DUAL BAND
broadband connection
DWR-953 Wireless AC750 4G LTE Router DWR-932 4G LTE Battery Mobile Router DWR-925 4G LTE VPN Router Set-up in easy steps
DWR-953 Wireless AC750 4G LTE Router 50 Mbps
GIGABIT WAN PORT
SHARE A 4G LTE CONNECTION
ready for high-speed FTTx broadband
with up to 16 Wi-Fi devices
INTERNET FAILOVER PROTECTION for an uninterrupted connection
150 Mbps 4G LTE Up to 150 Mbps (downlink) 50 Mbps (uplink)
DWR-932 4G LTE Battery Mobile Router 50 Mbps 150 Mbps SHARE A 4G LTE CONNECTION with up to 10 Wi-Fi devices
4G LTE
STAY CONNECTED FOR LONGER
Up to 150 Mbps (downlink) 50 Mbps (uplink)
2640 mAh Battery up to 10 hours usage
MICRO USB PORT for easy charging
DWR-925 4G LTE VPN Router
300 Mbps WIRELESS N
METAL HOUSING
VPN
SERIAL PORT
with speeds up to 300 Mbps
for operational temperature up to 50째C
to create a secure high-speed Virtual Private Network
for failover option
3
750
VIRTUAL ENVIRONMENTS ARE BUILT FOR YOUR DATA.
BUT IS YOUR BACKUP BUILT FOR VIRTUAL ENVIRONMENTS?
It’s time to backup anything and restore anywhere.
IT’S TIME FOR VERITAS. Backup Exec™ is a single solution for your entire architecture. It provides optimised virtual machine protection through intelligent backup for VMware® and Hyper-V® virtual machines. Recovery takes minutes, not days. Discover backup that outperforms expectations at backupexec.com/trybe
© 2016 Veritas Technologies LLC. All rights reserved.
NetApp
Why You Should Be Adding Flash to Your FlexPod By Philip Butler, Data Center Architect, NetApp
“Simplicity is about subtracting the obvious, and adding the meaningful.”
T
he first time I heard this statement from design and tech guru John Maeda, I was fairly confident I was never going to arrive at anything substantive or applicable to my life, mostly because I couldn’t figure out what he meant. It wasn’t until some time later, during a verbal lashing from a professional mentor of mine for not understanding the relevance of technology in terms of business that I realized what Maeda meant. In terms of IT relevance to business, I believe this implies one simple thing— Technology must drive the rapid delivery of new business-impactful services, the enablement of new business models, products and services. If it doesn’t do that, get rid of it. If it complicates the environment unnecessarily, get rid of it. FlexPod data center solutions are the new foundation to deliver impactful services to your business. Why? Because FlexPod enables IT to absorb new technologies and capabilities seamlessly and non-disruptively. That translates to the delivery of new services and capabilities that further enable the business without negatively impacting the business. Flash is a great example of this. We rolled flash innovations seamlessly into the cozy umbrella of services and solutions that comprise the FlexPod platform, and no one had to power down or schedule an outage. That’s more than most of our competitors can say. When they say flash is disruptive, they are talking about the outage you have to take in your datacenter to introduce an all-flash array into your converged infrastructure.
22
April 2016
When we say flash is disruptive, we are talking about the way we enable a shift in the services offered by IT that exponentially improves the time-to-value to a business. Seriously, you ask, what is the big deal? So you’ve taken an all-flash array and shoved it into a FlexPod—so what? Years ago in the ancient history of IT—three years ago, to be precise—flash was important because it brought greater performance at lower latency. Nothing reduced the price per IOP like flash technology. Today, having an all-flash array is like saying “I have a Sonic Care toothbrush. Sure, it’s fast and it’s a step above the average toothbrush, but these days a lot of folks have one. You’re just not that special. But if I said I had a Sonic Care toothbrush that could brush my teeth, wash my clothes, clean the house, and dynamically balance the tasks simultaneously on the fly while keeping a secondary Sonic Care toothbrush updated on progress so it could pick up where the other left off when it broke—I’d at least crack a smile of enthusiasm. Honestly, I’d probably brag to my neighbors. Back to the question of what’s the big deal of flash in a FlexPod. Not only did we bring flash into FlexPod, but we enabled the all-flash FlexPod to scale into a traditional FlexPod non-disruptively in terms of performance, capacity, operations, and seamlessly into cloud. We maintained consistency of deduplication, compression, and snapshots across the entire FlexPod cluster. So regardless of the type of hard drive or flash drive, there’s no change in your enterprise
w w w. a p t e c o n l i n e . c o m
“FlexPod continues to generate strong demand in the Converged Infrastructure space. With FlexPod All Flash Version customers can expect enhanced performance and superior IT responsiveness to challenging business requirements, thus ensuring better ROI.” Arnab Majumder Product Manager - NetApp, Aptec - Ingram Micro
efficiency, performance management, and capacity management. We applied Quality of Service (QoS) across our all-flash arrays with consistent methodology, as we do across our hybrid arrays. That makes service policy provisioning and management in a datacenter dependable across the datacenter. Data Protection (sync and async) strategies don’t change, backups don’t change, operational processes don’t change, support processes don’t change. And as your time-to-value proposition for your business potentially drives you into a hybrid cloud strategy (even if only for a short period of time), your enterprise-class services and management stay consistent both on premise and off premise for your data. The same cannot be said of any other solution in the industry, because there is likely no other solution in the industry that can match the capabilities of FlexPod. Simply stated, the all-flash FlexPod is flash, it’s flexible and it’s fast.
Oracle ZDLRA
Oracle Zero Data Loss Recovery Appliance World’s first engineered system designed specifically for database protection. The Recovery appliance delivers continous protection for critical databases while offloading all backup processing from production from servers to minimize overhead. Eliminate Data Loss Unique database integration enables continuous transport of redo data to the appliance, providing real-time protection for the most recent transactions so that databases can be restored without data loss.
offloads tape archival The Recovery Appliance can directly archive database backups to low-cost tape storage, offloading production database servers. Archival operations can run both day and night to improve tape drive utilization.
sanjay naithani Senior Sales Director Storage, Backup & Archive Oracle
ZDLRA is a unique appliance from Oracle, providing near ZERO RTO & RPO for Oracle Database. Recover your mission critical applications in 15-30 minutes instead of 3-4 hours! No more mid-night back-up but instant and incremental, at any time go to ‘point in time’ and recover. An Oracle appliance that provides CIOs a “good night sleep” and their customers reliability!
Delivers cloud-scale protection A single Recovery Appliance can serve the data protection requirements of thousands of databases in a data center or region. Capacity expands seamlessly to petabytes of storage, with no downtime
Protects data from disasters The Recovery Appliance can replicate data in real time to a remote Recovery Appliance or to Oracle Database Backup Cloud Service to protect business data from site outages. Database blocks are continuously validated to eliminate data corruption at any stage of transmission or processing.
Eliminate production impact Backup algorithms integrated into Oracle Database send only changed data to the appliance, minimizing production database impact, I/O traffic, and network load. All expensive backup processing is offloaded to the Appliance
enables restores to any point in time The database change data stored on the Appliance can be used to create virtual full database copies at any desired point in time.
Aptec ZDLRA Accelerator Launch Share leads & sell ZDLRA to win Apple iPhone 6s. Hurry Now !
24
April 2016
w w w. a p t e c o n l i n e . c o m
Most enterprises expect 50x data growth by 2020, resulting in sprawling data sets at high risk for data loss.
Oracle ZDLRA
TOP CHALLENGES Companies already struggle in the following areas: Data Protection
Efficiency
• 5 out of 6 businesses experience failed recoveries and potential data loss
• Backup performance is the top challenge for database backup and recovery
Scalability
Manageability
• Companies generate at least 3x more data than current standalone backup appliances can handle
• 2 out of 3 organizations need multiple tools to back up a single database
Oracle Zero Data Loss Recovery Appliance
2 x 36 port QDR (40 Gb/sec) InfiniBand Switches · Each InfiniBand switch has 6 ports available for external connectivity
Oracle can help. Eliminate business data loss and slash overhead with Oracle's Zero Data Loss Recovery Appliance.
DATA PROTECTION Zero Data Loss: Real-time redo transport eliminates data loss. Current Backup Appliances
Data loss exposure
Data integrity
Oracle’s Recovery Appliance
Hours to days
Zero to subsecond
No database validation
Continuous databaseaware validation
E5-2699 v3 Processors (2.3 GHz) · 256GB DD4 Memory · 2 x QDR (40Gb/s) InfiniBand Ports · Oracle Integrated Lights Out Manager (ILOM) · 2 x Redundant Hot-Swappable Power Supplies · Redundant Hot-Swappable Fans · Disk Controller HBA with 1 GB Supercap-backed Write Cache 3 x Storage Servers each with: · 12 x 8TB (raw) 7,200 RPM High Capacity disks
Database recovery
1 in 4 failed recoveries are due to data corruption
End-to-end corruption detection
EFFICIENCY
Base Rack Transceivers. ROHS-5. 2 x Compute Servers, each with » 2 x 10 Ethernet Minimal Impact Backups: Production onlyGb sends changes.Ports All backup and tape offloaded. the following connectivity forprocessing use (optical) by protected databases, replication, · Sun Storage Dual 16 Gb Fibre Current Backup Appliances Oracle’s Recovery Appliance or tape backup: Channel PCIe Universal HBA, Wasted CPU cycles slow Near-zero impact · 3 x 1/10 GbPerformance Ethernet Ports QLogic for tape performance connectivity for disk or tape backup impact down performance (copper) (optional) · Sun Dual 10 Gb Ethernet SFP+ » 2 x 16 GB Fibre Channel Ports PCIe 2.0 Low Profile Adapter incorporating Intel 82599 10 Each compute server additionally Eliminated Backup 6 to 8 hours per day Gb Ethernet controller contains: window and supporting pluggable SFP+ · 2 x Eighteen-Core Intel® Xeon®
Process efficiency
For more information, please contact:
SCALABILITY
Time-consuming full backups and complex restore
Each storage server additionally contains: · 2 x Eight-Core Intel® Xeon Processors for implementing network I/O and offloading data compression · Between 2x and 4x PCI flash cards for caching metadata and other functions · Oracle Integrated Lights Out Manager (ILOM) · 2 x Redundant Hot-Swappable Power Supplies · 2 x QDR (40Gb/s) InfiniBand Ports · Redundant Hot-Swappable Fans · Disk Controller HBA with 1 GB Supercap-backed Write Cache
Lightweight virtual full backups with simple, anytime
Julie Varghese restore Oracle Business Unit Manager Julie.Varghese@ingrammicro.com
Sujith Sudhakaran Oracle Hardware Team Sujith.Sudhakaran@ingrammicro.com
Ambili K.A Oracle Software Team Ambili.AyyappanNair@ingrammicro.com
Tania Thomas Business Development Executive Tania.VattazhiTomas@ingrammicro.com
Database Protection as a Service: w w w. a p t e c o n l i n e . c o m Easily protect all databases using a scalable centralized service. Current Backup Appliances
Oracle’s Recovery Appliance
Management Connectivity · Ethernet switch for administrative connectivity to servers » 2 x 1GbE copper uplink ports available for connectivity to data center management network Rack Infrastructure Hardware: · 42U Rack · 2 x Redundant Power Distributions Units (PDUs) Included Spare Parts Kit Contains: · 1 x 8TB High Capacity disk · 1 x PCI flash card Incrementally add storage servers to a Base Rack to increase capacity · Maximum of 18 Storage Servers in a single X5 Full Rack Software Configuration All software needed to run the Recovery Appliance is included in a single software license: · Backup, recovery, and replication · Embedded Oracle database for metadata and RMAN recovery catalog · RMAN backup module for Recovery Appliance · Storage software · Oracle Secure Backup software · Oracle Enterprise Manager monitoring and management
Sweta Rai Oracle Sales Specialist Sweta.Rai@ingrammicro.com
April 2016
25
IBM Software
Grow with security solutions I BM Security solutions are built on a framework that spans hardware, software and services. These capabilities comprise a robust set of tools and best practices designed to help address: Intelligence: Through a common and intuitive view that combines deep analytics with security intelligence. Integration: Through unifying existing tools and infrastructures with new forms of defense in order to reduce complexity and lower the cost of maintaining a strong security posture. Expertise: Through a more proactive and trusted source of truth in order to stay ahead of emerging threats and risks.
reduce costs, improve service, manage risk and enable innovation.
Featured Security solutions IBM Security solutions help you establish a holistic and mature security posture that can help
Advanced fraud protection Detect and prevent attack vectors responsible for the majority of online, mobile and cross-channel fraud.
26
April 2016
Security intelligence and analytics Apply analytics and automation to data and incidents to detect threats, perform forensic analysis and automate compliance.
Identity and access management Govern and enforce access across multiple channels, including mobile, social and cloud. Application security Test and verify applications before deployment to reduce risks and costs.
w w w. a p t e c o n l i n e . c o m
Data security and privacy Prevent data loss and enable data access to support business operations, growth and innovation. Infrastructure protection Achieve in-depth security across your networks, servers, virtual servers, mainframes and endpoints.
For More Information, please contact: Prashant R. Menon Senior Product Manager- IBM Software Direct :+971-4-3697111 Ext 305 Email: prashant.menon@ingrammicro.com Aptec - an Ingram Micro Company
For more information, please contact: Prashant R. Menon, Senior Product Manager - IBM Software Tel : +971 4 369 7111 Ext: 305 Email : prashant.menon@ingrammicro.com Aptec - an Ingram Micro Company
Make sure you can Weather the Storm Stay ahead with the latest Multienterprise Process Collaboration news and updates. Visit http://www.ibm.com/b2b-integration
For more information, please contact: Prashant R. Menon Senior Product Manager - IBM Software Tel : +971 4 369 7111 Ext: 305 Email : prashant.menon@ingrammicro.com Aptec - an Ingram Micro Company