REVIEW
THE
OCTOBER 2017
An in-house publication by Aptec – an Ingram Micro Company
Business insights for IT solution providers
Convergence of cloud and security Exploring channel opportunities
INSIDE
06
Microsoft Customized cloud solutions for enriched customer experiences
16
Oracle Minicluster: simple, secure and efficient
25Â
McAfee Integrating Machine Learning into endpoint security strategies
Vendors and Contact Information
Contact Information Aptec - GCC Dubai Internet City P.O.Box 33550 Tel: (+971 4) 3697111 Contact: Svetlana Sorokina Email: inquiry@ingrammicro.com
Aptec – Oman Knowledge Oasis Muscat Building 4 P.O.Box 100, Rusayl, Oman Tel: +968 96429250 Contact: Shivanand Palaniprasad Email: inquiry@ingrammicro.com
Ingram Micro – Pakistan Ingram Micro Pakistan (Private) Limited, Suite# 1310, 13th Floor, Caesars Tower, Shahrah-e-Faisal, Karachi, Pakistan Tel: +9221 32786675/ 32783209 Email: inquiry@ingrammicro.com
Aptec – Egypt KM 30 Cairo, Ismailia Desert Road , Al-Obour Investment Complex, Al-Obour City, Cairo, Egypt Tel: (+2) 24772156 / 24772157 / 24772159 Contact: Mohamed Selim Email: Mohamed.Selim@ingrammicro.com
Aptec – Saudi Arabia Office 519, Akariya Bldg. 2, Olaya Rd P.O. Box 94609, Riyadh 11614, Saudi Arabia Tel: +966 11 460 1950 Contact: Mohammed Sheikh Email: info@aptecsa.com
Ingram Micro – Turkey Suleyman Seba Card 82 / 3 Macka 34357 Istanbul, Turkey Tel: (+90 212) 259 0064 Contact: Hulya Erkam Email: hulya.erkmen@ingrammicro.com
Ingram Micro– Lebanon St. Georges Square Blk A Floor 1 Jal-El-Dib, Beckanaya Str., Lebanon Tel: (+961) 4718817 Contact: Elie Abou Emaan Email:apteclblevantinfo@ingrammicro.com
2
October 2017
Ingram Micro – Morocco Lot.33, La Colline 2, Immeuble les Alizés,Bureau 302, Sidi Maarouf, Casablanca, Morocoo Tel: +212-522 786 171/+212-522 786 223 Contact: Nouha Doudouh Email: marketing-na@ingrammicro.com
ae.ingrammicro.com
Published by
Introduction
10 How to protect data seamlessly across all clouds with Veritas
Dear Partners, The advent of cloud solutions has brought the importance of security to the forefront. We have seen the adoption of cloud gradually picking up within the region, although lack of strong security frameworks continues to make customers think twice before committing to the technology. At Ingram Micro, we encourage our partners to adopt an approach that knits security closely with all stages of cloud deployments. The channel ecosystem needs to enhance their competencies in different areas to be able to sell these technologies successfully. For example, they have to build their capabilities in sales and pre-sales for solution selling, implementation, migration and project management practices. It is imperative that partners begin looking at key technical certifications around virtual infrastructure environments. As a regional value-added distributor who has been taking the lead in bringing innovative solutions to the market, our offering ranges from solutions, services and training around best-in-breed global cloud and security vendors. These solutions can be combined into an easy buy, implement and use approach. We are also focusing on dedicated programs around cloud, Infrastructure-as-a-Service (IaaS) and security to enable partners to develop their skillsets. Additionally, we ensure our partners have access to our advanced training sessions built for cybersecurity and end-user trainings, which can be resold by them. Over the course of 2018, one of our objectives is to increase our focus and investments in both, cloud and security, as the technologies become even more sophisticated. Our partners have a definite opportunity here and we aim to work together to address customers’ challenges in these areas. Visit us at GITEX 2017 to have fruitful conversations around these technologies. Ali Baghdadi SVP & Chief Executive Ingram Micro META
12 1
Hype
2
Hype
3
Hype
4
Hype
5
Hype
Know more about HPE SimpliVityIf you u hyperconverged infrastructure backup storage
HPE SimpliVity HyperGuarantee
18
Discover Cisco CAT 9K switches to enable digital transformation
26
If you u capabili or local
Using H vCenter all from
Using th minute 1000s o
You will • Witho • Witho • Witho or rem • Witho
No gimmicks, no separate c
These guarantees are available to all customers who use HPE SimpliVity 380 a valid for three years after delivery of the product to the customer. The warrant
How GFI Software and Ingram Micro alliance empowers partners
Aptec news
APTEC ACCOLADES VENDOR AWARDS
MEDIA AWARDS Global Distribution Partner of the Year 2017
Value Added Distributor of the Year 2017 Channel Middle East Awards
Partner of the Year 2017 META @ Microsoft Inspire Conference Distributor of the Year 2016 Gulf
Networking VAD of the Year 2017 The Integrator ICT Champions Award
Largest Global Coverage Distributor Award Year 2017 Best Distributor Partner Development Award Year 2017 –UAE & GULF
Cloud Distributor of the year – Reseller ME Readers’ Choice Partner Excellence Awards 2017
MENA Distributor of the Year Award 2017 @ VM World Partner Awards in Barcelona
4
October 2017
ae.ingrammicro.com
Aptec news
DELL EMC NAMES INGRAM MICRO AS KEY ME DISTRIBUTION PARTNER portfolio of products, including advanced cloud IT infrastructure, converged systems, server/storage solutions and Client Systems. “We are very pleased to have Ingram Micro on board in this important market, as they are a key player of ICT distribution who is well connected to the partner landscape both on a global scale and specifically in the META region,” said Mohammed Amin, senior vice president, Middle East, Turkey and Africa, Dell EMC. Ingram Micro Dell EMC forum 2017 was held last month to announce the partnership to the channel. Centered on ‘Powering Digital Transformation’, the forum discussed the channel strategy and highlighted key solutions that can help partners be profitable in the digital era. Going forward, we will see Ingram Micro delivering on a joint go-to-market strategy with Dell EMC built around its key technology differentiators.
Mohammed Amin, Senior VP, META, Dell EMC
Aptec, an Ingram Micro company, has been selected as a strategic distribution partner by Dell EMC across the United Arab Emirates, Oman, Qatar, Bahrain, Kuwait and Yemen. The expanded relationship builds on Aptec’s current partnership with Dell EMC and further strengthens Ingram Micro’s relationship with the company. The Middle East value-added distributor’s vendor solutions offerings now provide access to Dell EMC’s full
INGRAM TO HOST CLOUD AND SECURITY SUMMIT speakers include Renee Bergeron, SVP, Global Cloud Channel; Rahul Bhavsar, Director Cloud, META and Marc Kassis, Cyber Security Director EMEA. In 2016, the event saw 130 plus partner attendees, 16 cloud vendors, 14 breakout sessions and several keynote sessions along with panel discussions.
Ingram Micro aims to bring together a large gathering of cloud and security resellers, VARs and vendors on a single platform at its Cloud & Security Summit. Partners can expect to have dedicated discussions with over 250 cloud innovators and participate in more than 40 sales and technical educational sessions across three days. Ingram Micro
INGRAM MICRO FORGES TRAINING PARTNERSHIPS WITH RED HAT, SUSE, NUIX, ARUBA AND KASPERSKY LAB Ingram Micro has signed training partnerships with several global vendors such as SUSE, Red Hat, Nuix, Aruba and Kaspersky Lab over the last few months. As part of these collaborations, Ingram Micro’s training center in Dubai will offer instructor-led training modules designed to help organizations transform to digital businesses. Channel partners will have access to vendor-authorized certification training, which ranges from web classes, real labs and live instructors. Partners
have an opportunity to earn considerable margins by adding training to their end-user solutions and reselling to their technical end clients. With the firm’s training modules, available across the Middle East and Africa regions, solutions providers stand to gain significantly. Ingram Micro Training Academy certification training prepares partners for certification exams designed to measure knowledge and skills related to their field in the IT industry.
ae.ingrammicro.com
NEW VENDOR PARTNERSHIPS DellEMC - Middle East region
Parallels - Middle East, Turkey and Africa (META) region
Honeywell - Middle East region
Zebra - Gulf Region
iBoardTouch - Gulf Region
GFI - Middle East region
Enterprise portfolio - Gulf Region
NCR - Gulf Region
APG Cash Drawer - Gulf Region
NEC - Gulf Region
Middle East, Turkey and Africa (META) Region
October 2017
5
Microsoft
EMBARK ON YOUR PATH TO PROFITABILITY WITH MICROSOFT THROUGH INGRAM MICRO Learn Profitable, Sustainable, Proven Global Practices & Solution Selling Techniques to Own Your End-to-End Customer Relationships & Seize Every New Opportunity.
A
t Ingram Micro we offer customized solutions to all our partners to empower them for delivering an enriched customer experience. Parul Pathak, Product Manager Microsoft Gulf at Ingram Micro says, “Our strategic focus is on offering various solutions bundled with Microsoft products to support our re-seller community for establishing deeper engagement with their end-customers. We are also supporting this initiative with our Valued Added Services, which our resellers may leverage to increase their efficiency & gain a competitive edge in the market.” We are focused on driving awareness & momentum for Microsoft Azure as a Platform that offers multiple solutions for unique business needs & as for solution selling we have signed up with Parallels (Remote Application Server). To elaborate, Microsoft Azure is an open and flexible cloud platform which can help you build applications using multiple languages, tools, frameworks, & enables easy integration for your on-premises IT environment with the public cloud. It offers some unique use cases like building anything from lightweight websites to multitier cloud services or accelerate Mobile App Development by using a backend hosted on Microsoft Azure that scales up, as your traffic grows.
6
October 2017
One can rely on geo-redundant cloud storage for backup, archiving, and disaster recovery. And as for Parallels Remote Application Server (RAS) it is powered by Microsoft Azure & makes application and desktop delivery extremely fast, easy, & affordable on any device. Parallels (RAS) when deployed on Microsoft Azure provides employees with secure, fast, and reliable access to Windows applications and desktops at any time, on any device, from any location & with the advanced filtering of Parallels RAS in Azure, the solution protects sensitive information and enhances overall corporate data security. To offer all round support to our partners we have designed 3 step Partner Engagement Model “Enable-Engage-Encourage” where our dedicated in-house teams will be providing one on one consultations on Solution Selling to end customers & owning the end to end customer relationship. Unique to reseller needs we are offering ValueAdded Services in terms of Pre-sales (trainings, certifications, sizing opportunities), Post-sales (implementation, deployment) & Marketing support to rev up reseller’s digital transformation & establish a strong differentiated brand presence in the region. Last year we were awarded by Channel Middle East with “Channel Champion Award” for our
ae.ingrammicro.com
Double Treats Campaign for Gulf Partners as the Best Channel Marketing Campaign of the year. This year in Microsoft WPC, Ingram Micro won Partner of the Year Award for recruiting maximum number of cloud partners in META region. We are ready to support each & every partner in the region who is focused & has potential to transform & embark on the journey to cloud transformation.
By Parul Pathak, Product Manager Parallels & Microsoft Gulf at Ingram Micro
For consultation or queries please mail us at: microsoftgulf-sales@ingrammicro.com http://tiny.cc/microsoftazure-parallels https://www.facebook.com/imcloud.me/
Veritas
VERITAS CLOUD VERITAS 360 DATA MANAGEMENT:
VERITAS MULTI-CLOUDS ONE APPROACH: To successfully navigate the multi-cloud, you need to manage and protect data and workloads seamlessly across all clouds. Avoid Siloes Multi-cloud adoption has many benefits. But productivity, performance and effectiveness can be hindered when data is not integrated and scattered across clouds and date centers. Maintain Visibility and Control of Data The cloud may seem like a cost-effective solution for keeping all your data. But you may be driving up both your cost and exposure to risk. Instead, identify what data you have, assess whether it is worth keeping and then migrate it to the cloud. Reduce Complexity Backing up to multiple clouds can increase the complexity within the IT environment. Each cloud provider uses proprietary metadata, policies and protocals that do not work accross other cloud platform, or onpemises solutions. Veritas 360 Data Management removes the complexity and cost of data siloes by consolidating multiple functions into a single platform that can accommodate your new and existing landscapes. When you scale your data management and protection across your entire environment with Veritas, the multi-cloud becomes an extension of your strategy — rathar than a standalone piece of infrastructure. Veritas Information Map allows enterprise to understand what data they both on-premises and in multiple clouds. These insights can inform decision about what keep, archive or delete. Migrate your data to the cloud or even between clouds intelligently, by first gaining visibility of your entire environment. Veritas NetBackup enables enterprise to extend their data protection platform to the cloud using the same policies as your other servers. The reslut: greater controls and visibility that ever before. Protect physical, virtual and cloud environments through a single platform that leverages the same policies and processes no matter where your data is being backed up.
10
October 2017
ae.ingrammicro.com
Specialized Security Distribution
Regional value added distributor of complete IP surveillance and security solutions for META Region NIT an Ingram Micro Company, P.O. Box 23043, Dubai, UAE - www.nit.ae
HPE Synergy
The first platform achitected for Composable Infrastructure ONE infrastructure
An infrastructure so intelligent, it can adapt to every workload and deliver services at lightning speed
TWO operating models
A new category of infrastructure designed to accelerate application delivery in both traditional and new IT environments.
THREE design principles
Fluid resource pools: Single infrastructure of disaggregated resources Software-defined intelligence: Template-driven workload composition Unified API: Infrastructure as code
FOUR big benefits for IT and business
Reduce cost: Up to 30 percent reduction in ongoing CAPEX Savings Deploy at cloud-like speed: Minutes to provision a workload-ready host Simplify apps: One step to implement updates Develop more apps: Single line of code to stand up infrastructure
FIVE elements to HPE Synergy
Composer: Composes infrastructure at near instant speeds Composable frame: All resources needed to run any application Composable compute: Full portfolio for performance and scalability Composable storage: High density integrated storage Composable fabric: Rack scale multi-fabric connectivity
Learn more at
hpe.com/info/Synergy
HPE SimpliVity HyperGuarantee A Complete Guarantee HPE SimpliVity hyperconverged systems Only HPE SimpliVity hyperconverged infrastructure delivers the enterprise-class performance, protection, and resiliency that you require, with the cloud economics your business demands. As a proof point of our platform maturity and what our capabilities can do for our customers, we offer one of the industry’s most complete guarantees including data efficiency, protection, simplicity, management, and availability.
HPE SimpliVity HyperGuarantee
1
HyperEfficient
2
HyperProtected
3
HyperSimple
4
HyperManageable
5
HyperAvailable
If you use HPE SimpliVity hyperconverged infrastructure and its built-in VM-centric backup capability as outlined below, you will achieve 90% capacity savings across storage and backup combined, relative to comparable traditional solutions.
If you use HPE SimpliVity hyperconverged infrastructure and its built-in backup capability, it will take less than one minute, on average, to complete a local backup or local restore of a 1 TB VM.
Using HPE SimpliVity user interface, which is fully integrated with VMware® vCenter™, you only need three clicks to back up, restore, move, or clone a VM, all from a single console.
Using the HPE SimpliVity user interface in a central location, in less than a minute on average, you will be able to create or update backup policies for 1000s of VMs across dozens of sites.
You will be able to add or replace HPE SimpliVity hyperconverged systems • Without any downtime for local or remote sites. • Without any disruption to local or remote HPE SimpliVity backups. • Without any reconfiguration of HPE SimpliVity and backup policies for local or remote sites. • Without the need to reenter any IP addresses in remote sites.
No gimmicks, no separate contracts, no additional steps These guarantees are available to all customers who use HPE SimpliVity 380 and are covered under the standard HPE SimpliVity 380 product warranty, which is valid for three years after delivery of the product to the customer. The warranty is described in the HPE SimpliVity 380 QuickSpecs at hpe.com/info/simplivity.
Editorial
CONVERGENCE OF CLOUD AND SECURITY Identifying that security is integral to a successful cloud deployment, Ingram Micro proposes a joint approach that includes key elements from both technologies for partners to maintain profitability in this space.
14
October 2017
ae.ingrammicro.com
A
s the advantages of cloud are wellunderstood by organizations, we see the adoption levels increasing rapidly on a global level. Benefits such as scalability, flexibility, costeffectiveness and pay-as-you-go models are attractive to both enterprise as well as SME businesses. Middle East customers didn’t immediately warm up to the reality of cloud, although it has picked up significantly over the last few years. One of the main reasons for this was that regional customers viewed cloud solutions as insecure. While this viewpoint is gradually diminishing, security within cloud infrastructures continue to be a fundamental factor for customers to adopt cloud solutions. According to Rahul Bhavsar, Director, Cloud Sales, Ingram Micro META, the core challenge customers have faced in the past and continues to do so today is around data. He says, “Data migration and its security on the cloud are vital aspects for any business. Over the last few months, we have observed an increasing appetite for migration to the cloud within regional customers. Although the industry has paid attention to data security, the lack of robust frameworks is leading to hesitation among customers.” There is no disputing that security is definitely closely intertwined in a cloud-first business landscape. In such an environment, what are the elements partners must keep in mind before deploying a related solution? The first key aspect is to understand that when it comes to cloud solutions for enterprises, it means a loss of direct control on their data and processes. This is why, says Bhavsar, cloud solution providers must focus on offering control to the
Rahul Bhavsar, Director, Cloud Sales, META
As security is essential in all aspects of cloud, from storage and data protection to network visibility, it is imperative that partners who sell cloud solutions also have expertise in securityrelated solutions.
Marc Kassis, Cyber Security Director, EMEA
business owners. “Or, they need to give enough confidence to these customers through reporting of the control aspect of the business processes. For instance, provide the information on number of connections or non-authorized attempt to connect, etc. All these aspects need to be part of the proposed cloud solutions.” As security is essential in all aspects of cloud, from storage and data protection to network visibility, it is imperative that partners who sell cloud solutions also have expertise in securityrelated solutions. Marc Kassis, Cyber Security Director, Ingram Micro EMEA says, “Ingram Micro is proposing a joint cloud and security approach to all our business partners. Our offering ranges from solutions, services and training that can be delivered to end-users. We also bundle cloud and security vendors into an easy buy, implement and use approach. We operate in this model to bring ready go-to-market and fast growth.” In such a scenario, partners should focus on building their capabilities around sales and pre-sales for solution selling, implementation, migration and project management practices and key technical certifications around virtual infrastructure environments, he adds. To refine partners’ skillsets in these areas within the cloud and security space, Ingram Micro is focusing on programs around cloud, Infrastructure-as-a-Service (IaaS) and security. “For instance,” Bhavsar explains, “the IaaS program helps resellers with opportunity generation within the IaaS space as well as one click solutions on IaaS platforms and hybrid cloud offerings. Other Ingram Micro initiatives
include technical enablement programs, partner marketing programs for opportunity generation, fully automated Cloud Marketplace and Professional Services.” Ingram Micro META region has built a comprehensive enablement training session for cybersecurity, which is provided to all its business partners. The distributor has also created a complete range of end-user trainings that can be resold. Kassis says, “We also provide Assessment Services and Consultancy to help our channel partners address new markets. We also deliver a large quantity of contents through white-papers and webinars as well as events such as the upcoming Cloud and Security Summit to communicate, educate and deliver the best solutions to our market.” Over the last year, the regional value-added distributor has experienced a strong double digit growth in its security portfolio. The channel opportunities will continue to develop in 2018 as security increasingly becomes intertwined with all technology layers deployed at an enterprise. “We also see many new vendors emerging and growing quickly in the domains of Investigation and Forensic, Data Protection, Identity Management, etc.,” adds Kassis. Bhavsar says, “We are expecting our overall cloud business to grow between 20 to 25 percent as compared to last year. We are anticipating a steeper increase in the IaaS space, considering our focus and investments in this space.” As the regional security and cloud markets are set to grow even further, channel partners must maximize the opportunities and reach out to distribution partners such as Ingram Micro for in-depth support to develop their offerings.
ae.ingrammicro.com
October 2017
15
Oracle MiniCluster
ORACLE MINICLUSTER Simple, Secure & Efficient
O
racle MiniCluster S7-2 is a simple and efficient engineered system designed to run enterprise databases and applications with uncompromising security. Oracle MiniCluster is integrated server, storage, networking, and software systems that provide maximum end-to-end database and application efficiency, and security while reducing complexity and delivering the lowest total cost of ownership. Oracle MiniCluster is ideal for Oracle Database and Oracle application customers looking to maximize return on their software investment. Listed below are the features and benefits of Minicluster:-
Oracle MiniCluster Virtual Assistant • Dramatically simplifies and accelerates day-to-day operation, eliminating the need for specialized system administration skills and training Database automation • Provides an easy, error-free approach to implementing Oracle Real Application Clusters and highly available Oracle Database instances • Support for Oracle Database Enterprise Edition and Oracle Database Standard Edition 2 Security automation • Activate and configure hundreds of technologies and integrated security controls with the push of a button
• Easily comply with DISA-STIG, PCI-DSS and CIS equivalent security profiles Patch automation • Execute pretested and verified rolling, full-system patches and updates faster with less risk Compliance automation • Verify security by running compliance reports with the push of a button Silicon Secured Memory • Secures databases and tampering and unreliability
applications
from
Cryptographic acceleration • The industry’s most advanced wide-key cryptographic acceleration provides end-to-end network and data encryption with virtually no performance cost Data analytics accelerators • Dramatically speed up analytics by offloading key operations to data analytics accelerators High-performance and high-efficiency architecture • Reduce software and hardware footprint with SPARC processors that deliver 50 to 100 percent better Oracle Database and Java application performance per core than any comparable x86 processor
For more information on the product, please get in touch with Oracle team at Aptec – An Ingram micro company.
JULIE VARGHESE ORACLE Business Unit Manager Email: julie.varghese@ingrammicro.com
16
October 2017
ABDALLA QUQAS Oracle Technical Manager Abdallah.Quqas@ingrammicro.com
ae.ingrammicro.com
TANIA THOMAS Oracle Sales Executive Tania.VattazhiThomas@ingrammicro.com
Millions of data points. A singular vision. Data Visionaries Wanted
netapp.com/datavisionary
Š2017 NetApp, Inc. All Rights Reserved. NETAPP, the NETAPP logo, and the marks listed at http://www.netapp.com/TM are trademarks of NetApp, Inc. Other company and product names may be trademarks of their respective owners.
Cisco
A BLUEPRINT FOR DIGITAL TRANSFORMATION Cisco Catalyst 9000 Series (CAT 9K)
T
echnology trends such as big data and Blockchain are beginning to take their place on the ground, in government and business strategies for digital transformation, and in the transformation of industry towards the next leap; the industry 4.0.
• IOT-Ready
Cisco Digital Transformation; at a glance
• Open for Cloud and Integration
Digital transformation is the process of re-defining the strategies, plans, services and customer experience to create a sustainable and competitive advantage for the organization. Cisco solutions provide the innovative network services to keep pace with the accelerated growth in data and digital business services.
How Cisco help organizations applying the Winning Infrastructure model for Digital Transformation Journey • Security Cisco CAT 9K switches enable AES-256 MACsec encryption is the IEEE 802.1AE standard for authenticating and encrypting packets between switches. They provide segmentation and micro-segmentation. The Encrypted Traffic Analytics (ETA) help you detect malware and other threats on encrypted traffic as first line of defense starting from the access layer. The Cryptographically signed images provide assurance that the firmware, BIOS, and other software are authentic and unmodified. Cisco Trust Anchor module provides single-chip solution provides hardware authenticity assurance.
18
October 2017
The IOT-Ready CAT9K switches delivers scalability, convergence and applicationvisibility to the top-down and bottom-up approach of network design, making the network able to offer world-class mobility services and bandwidth capacity.
CAT 9K switches are able to handle more complex workloads with the ability to act as self-starter infrastructure. Cisco IOS® XE 16 delivers advanced programmability across the different infrastructure resources. They apply Software-Defined Access (SD-Access) and the Cisco Application Policy Infrastructure Controller Enterprise Module (APIC-EM), delivering the policy-based automation from edge to cloud.
• Able to enhance workers and end user experience. The next generation infrastructure should be able to secure, authenticate and authorize users while delivering the highest level of innovative collaboration services and connected mobile experience. By Waddah Fadul, Cisco Infrastructure Consultant at Aptec –An Ingram Micro Company.
For consultation or queries: waddah.fadul@ingrammicro.com https://www.facebook.com/Aptec.Ingramflyhigher.Cisco.Page/ @flyHigherME
ae.ingrammicro.com
Securing the Cloud Generation We Are The Cloud Generation. The Cloud Generation is everyone who lives and works in this unique era— as computing breaks the boundaries of desktops and data centers to embrace the mobile, social, global, crowd-sourced, always-on realities Copyright © 2017 Symantec Corporation. All rights reserved.
of modern life. It’s a time when critical data, applications and infrastructure are shifting from “behind the firewall” to “running on the cloud.” Some of us are “all in.” Some are only 20% there. Yes, it’s liberating. And yes, it’s chaotic. Symantec is here to help.
Ingram Micro
INGRAM MICRO ADVANCED SOLUTIONS
PROFESSIONAL AND TRAINING SERVICES As a distributor, Ingram Micro serves a wide range of partners in the region with diverse technologies. Ingram Micro’s services role is to provide its partners with increased expertise in the skill-set and background required to optimize full solution deployment.
W
ith the current economical market conditions, naturally the budgets for training and development of partners are being allocated and spent more carefully. The same is evident with end users such as enterprises and government verticals. This has led to an increased number of partners relying on distributor implementation and deployment of services. Ingram Mirco offers its partners the option to train their engineers and maintain the running of their development plans at a reduced cost through the Virtual Training Delivery option. Ingram Micro runs several campaigns and promotional offers on its services to encourage and enable its partners to attain new business
20
October 2017
opportunities. This in turn leads to better support for their customers. The Ingram Micro management team is largely focused on delivering added value to its partner community by offering skill development resources regionally to all its partners in the META region. Ingram Micro is currently a certified services delivery partner to select vendors and it supports these vendors by delivering their own branded services to enterprise clients through its pool of resources located in UAE, KSA, Egypt, Turkey and South Africa. Ingram Micro actively encourages its partners to reach out and rely on its structured services sales team to help identify opportunities and assist in expanding services.
ae.ingrammicro.com
Mohammad Sabry, Head Of Services, Gulf and Near East, Aptec - an Ingram Micro company The vendors in Ingram Micro’s services portfolio are A10, Netapp, Cisco, Vmware, Veeam, IBM, Symantec, Nexthink, Veritas, Aruba, McAfee, Kaspersky Lab, Nuix, SUSE, Microsoft, HP.
McAfee
MACHINE LEARNING – TAKING YOUR SECURITY TEAM TO THE NEXT LEVEL I
n relation to cybersecurity, machine learning has been changing the game as a means of managing the massive amounts of data within corporate environments. However, machine learning lacks the innately human ability to creatively solve problems and intellectually analyse events. It has been said time and again that people are a company’s greatest asset. Machine learning makes security teams better, and vice versa. Human-machine teams deliver the best of both worlds. Machine learning allows endpoint security to continually evolve to stop new attack tactics The dark web is driven by intelligent bad actors who are often financially motivated to create new threats with new attack techniques. Security becomes personal when considering the people behind the attacks, making the human-machine team the best sustaining defence. While machine learning can detect patterns hidden in the data at rapid speeds, the less obvious value of machine learning is providing enough automation to allow humans the time and focus to initiate creative responses when responses are less obvious. By using a filter for optimization across the best advantages of human and machine elements, it’s easier to evaluate the relationship between them. Machine learning adds critical capability to security strategies The process of security researchers analysing malware to develop signatures is still important, but only as a capability to address the large volume of known malware because it cannot be expected to evolve quickly enough to meet the rapid pace of malware being introduced to the wild. Machine learning becomes the fastest way to identify new attacks and to push that information out to endpoint security platforms. The key differentiator in incorporating machine
learning into endpoint security is the amount of relevant data consumed by the algorithms. Machine learning manifests itself in multiple ways in helping save security teams’ time and energy: User experience is optimized - Machinelearning algorithms feed information to the endpoint about file attributes that indicate the presence of malware. These attributes may be related to type, size and source, as well as header anomalies and detected sequences of operating system calls. A quick scan before execution allows security to perform its preliminary triage without souring the user experience. Suspicious behaviour flagged automatically Once the program is running, machine learning on the endpoint monitors behaviour for signs of an attack. This runtime detection is keyed by information on attack tactics again uncovered by machine-learning analysis of malware samples in the datacentre. While pre-execution checks file attributes to make a malware decision, runtime execution requires knowledge of specific actions attackers are likely to use. For example, ransomware can render your files useless in less than a minute. Machine-learning analysis of ransomware attacks may uncover timing and access patterns of file shares that would indicate an attack is underway – allowing endpoint security to stop the threat before all files are encrypted. Highly valuable investigation and response data available automatically - Helping security teams respond to an incident, machine learning can identify suspicious connects and create alerts based on equations. In this case, security analysts need precise information on the threat such as files touched, registry changes, server connections, etc. Because machine learning looks across multiple dimensions, much of the data that incident response teams require is already available, but has traditionally required extensive manual correlation. Ideally, highly
ae.ingrammicro.com
Raj Samani, Head of Strategic Intelligence, McAfee LLC valuable investigation and response data would be available through the already-present endpoint management console. The presence of machinelearning technology results in significant time savings – by a factor of 10 is not uncommon – that can help security teams keep the business running Elevate security teams with machine learning People matter the most, but combining human intelligence with machine-learning technology creates strong security teams. With machinelearning assistance, security teams have greater insight into who the attacker is, the methods being used, where the attacks are coming from and how they are spreading, as well as which security measures are working and which are being defeated. To conclude, machine learning should be a critical component of an enterprise’s endpoint security strategy. Given the volume and evolution of attacks hammering away at endpoints, security must be able to adapt without human intervention, and must provide the visibility and focus to enable humans to make more informed decisions. Machine learning has come of age with big data driving accuracy up and false positives down. The proof of successful human and technology teaming will be seen in the ability to rapidly dismiss alerts and accelerate solutions to thwart new threats. Your users deserve the best that cybersecurity has to offer, and today the best endpoint security products leverage machine learning.
October 2017
25
GFI
SELLING NETWORK SECURITY AND COMMUNICATIONS SOLUTIONS JUST GOT EASIER Thanks to the GFI Software and Ingram Micro partnership
F
inding the right technology vendor to partner with can be a daunting task. IT resellers and cloud service providers need a vendor that will support their business, providing the right tools and products to fulfill the needs of their customers and enable future growth. For partners based in META (Middle East, Turkey and Africa), the wait to find the right one is over! Earlier this year, GFI Software and Ingram Micro announced their expanded partnership. The agreement means that channel partners in 16 additional countries, including Afghanistan, Algeria, Bahrain, Egypt, Iraq, Jordan, Lebanon, Kuwait, Morocco, Oman, Pakistan, Qatar, Saudi Arabia, Tunisia, United Arab Emirates and Yemen, have access to GFI’s full range of award-winning network security and communications solutions and a great network of support from a distributor that is 100% committed to the channel. Together, the two companies are on an exciting growth journey. Earlier this year, GFI released two new products to the market; GFI OneConnect, a cloud-based email security and continuity platform, and GFI OneGuard, an IT management platform which centralizes, simplifies and automates the process of managing the security status of machines, network resources and users. Not only that, GFI acquired two companies, Kerio Technologies and Exinda. With the product portfolio continuing to grow, partners are all set to have their pick of the best technology to better serve small and medium-sized businesses (SMBs). To find out more about the partnership and what it means for partners in the META (Middle East, Turkey and Africa) region visit http://meta.ingrammicro.com.
26
October 2017
ae.ingrammicro.com
Unlocking Cyber Security Potential The Ingram Micro Cyber Security Business Unit offers an expansive suite of Technical, Consultancy and Managed Security Services. We have developed a wide range of Cyber Security services by building key and exclusive relationships with our vendors. As a result, we are able to help maximize our Business Partners’ revenue potential and grow our vendors in the META region.
IM Cyber Security Assessment Services
IM Cyber Security Consultancy Services
Public Discovery Report (PDR) Vulnerability Assessment (VA) Web Malware Detection Scanning Web Application Scanning (WAS)
Cyber Security Governance Policies & Procedures Review Security & Operations Review Risk Assessment
Penetration Testing Blackbox Testing (PT)S PCI DSS ASV Scan
Physical Security Assessment Incident Management Access Control Review Compliance Assessment
IM Cyber Security Trainings ►
Fundamentals of Information Security
► CompTIA Advanced
►
CyberSAFE: Security Assets for the End User
► Certified
Security Practitioner
Security First Responder (CFR) ► CompTIA Network Plus (N+)
Information Systems Security Professional (CISSP) ► PCI DSS & Payment Card Security
► CompTIA
► ISO
► Cyber
Security Plus (S+)
► Fundamentals
of a Formal Information Security Risk Assesment ► Information Security Risk Assessment as per NIST SP 800-30, OCTAVE & ISO 27005
27001
For our latest Cyber Security Webinar Recordings, please visit the link http://security.ingrammicro.com/News/Events-Webinars.aspx
Our Partners
INGRAM MICRO CYBER SECURITY DIVISION CONTACTS
OFFICE ADDRESS
Web: http://security.ingrammicro.com Email: cyber.meta@ingrammicro.com
Ingram Micro, P.O.Box: 33550, Dubai Internet City – UAE Tel: +971 4 369 7111 | Fax: +971 4 369 7110
Your security products working as one. That’s orchestration. Together is power.
Learn more about dynamic endpoint threat defense, pervasive data protection, data center and cloud defense, and intelligent security operations at www.mcafee.com/us/solutions.
McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Copyright Š 2017 McAfee, LLC