Value Journal | Issue 13 | July 2017

Page 1

Issue 13 // July 2017

VMWARE INTRODUCES INTEGRATIONS WITH DELL EMC TO ACCELERATE WORKFORCE TRANSFORMATION With these integrated solutions, organisations will be able to leverage converged infrastructure to optimise integrated desktop and application workloads.

V

Mware has introduced new technology integrations with Dell that enhance VMware End-User Computing (EUC) solutions to help customers realise the benefits of workplace transformation through mobile, desktop and cloud technologies. With these integrated solutions, organisations of all sizes and industries with various

use cases will be able to leverage converged infrastructure to optimise integrated desktop and application workloads and utilise unified endpoint management (UEM) to streamline management and significantly drive down costs. Integration between VMware AirWatch and Dell Client Command Suite will extend remote management capabilities for key Dell hardware system attributes to enhance AirWatch

HPE unveils new high performance computing solutions The new HPE Apollo 6000 Gen10, HPE SGI 8600 and HPE Apollo 10 Series systems are workload-optimised to deliver faster, more efficient insights. Hewlett Packard Enterprise has announced a new generation of High Performance Computing (HPC) and artificial intelligence (AI) systems, software and

services. The new HPE Apollo 6000 Gen10, HPE SGI 8600 and HPE Apollo 10 Series systems are workload-optimised to deliver faster, more efficient insights

Unified Endpoint Management (UEM). Additionally, Dell has announced Dell EMC VDI Complete Solutions that will offer a complete desktop and application virtualisation solution powered by VMware Horizon with workload optimised infrastructure, integrated software, optional Dell Wyse thin clients and competitive pricing. According to the company, these integrated solutions

while reducing vulnerability to cyber-attacks and improving economic control, said the company. The first co-created system since HPE acquired SGI, the HPE SGI 8600 is a liquid cooled petascale system, based on the legacy SGI ICE XA architecture, purpose-built to solve the most complex scientific, engineering and national security challenges. According to the company, it delivers fast parallel processing performance, scales to more than 10,000 nodes without additional

Sumit Dhawan, VMware

showcase the benefits of Dell Technologies, a family of businesses that provides the essential infrastructure for organisations to build its digital future, transform IT and protect the most important asset – information. Continued on page 3

switches using integrated switches and hypercube technology and offers more choice and flexibility based on industry standards. The HPE Apollo 6000 Gen10’s new capabilities include reliability, accessibility, serviceability and manageability, better application licensing efficiency, reduced latency and higher IOPs performance and reduced power consumption and cooling requirements, said the firm. New cost effective platforms, Continued on page 3

Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:

For more information, please write to sales.value@redingtonmea.com


HPE SYNERGY A new category of Infrastructure designed to accelerate application delivery in both traditional and new IT environments.

For more information, write to us at sales.value@redingtonmea.com

Brought to you by HPEand Intel®. Intel Inside®.Powerful Productivity Outside. Intel and theIntel logo aretrademarksof Intel Corporation in theU.S.and/or other countries. © Copyright 2016 Hewlett Packard EnterpriseDevelopment LP.


3 From page 1

VMware... “VMware and Dell, together, are delivering powerful business benefits that can drive down cost and time-to-desktop that can have a real impact to the bottom line for organisations, and also to front line IT practitioners,” said Sumit Dhawan, Senior Vice President and General Manager, End-User Computing, VMware. “Integrating industry-leading solutions from both companies demonstrates that we are better together and in a stronger position to help businesses frustrated with the burden of managing multiple vendor contracts, service level agreements, solution management consoles and everything in between that drive up the total cost of ownership.”

COLUMN: REDefined

From page 1

HPE... “Organisations are looking for solutions that will help them accelerate their workforce transformation while controlling cost and complexity,” said Steve Lalla, Senior Vice President and General Manager, commercial client software and solutions, Dell. “Through our close collaboration with VMware, we are able to deliver integrated solutions from the endpoint to the data centre and required software that will provide even greater value to organisations than ever before.” Both VMware AirWatch integration with Dell Client Command Suite and the Dell EMC VDI Complete Solutions is available immediately through partners.

HPE Apollo 10 Series, are optimised for entry level Deep Learning and AI applications that are easy to manage and deploy. The HPE Apollo sx40 System is a 1U dual socket Intel Xeon Gen10 server with support for up to 4 NVIDIA Tesla SXM2 GPUs with NVLink. The HPE Apollo pc40 System is a 1U dual socket Intel Xeon Gen10 server with support for up to 4 PCIe GPU cards. HPE’s HPC systems are enhanced by a new compute experience designed to address the data intense needs of HPC and AI customers. The key elements of the HPC experience include enhanced firmware security and increased agility with software defined HPC capabilities.

AWS Greengrass is now available AWS Greengrass eliminates the complexity involved in programming and updating IoT devices.

Amazon Web Services has announced that AWS Greengrass is now available to all customers, enabling users to run AWS compute, messaging, data caching, and sync capabilities on connected devices. With AWS Greengrass, devices can run AWS Lambda functions to perform tasks locally, keep device data in sync, and communicate with other devices while leveraging the full processing, analytics, and storage power of the AWS Cloud.

AWS Greengrass “eliminates the complexity involved in programming and updating IoT devices.” Developers can add AWS Lambda functions to connected devices right from the AWS Management Console, and devices can execute the code locally, responding to events and taking actions in near real-time. AWS Greengrass also includes IoT messaging and synching capabilities so devices can send messages to other devices without connecting back to the cloud. It allows customers the flexibility to have devices rely on the cloud when it makes sense, perform tasks on their own when it makes sense, and talk to each other when it makes sense – all in a single, seamless environment. “By embedding AWS Lambda and IoT capabilities in connected devices, Greengrass

gives customers the flexibility to have devices act locally on the data they generate while using the AWS Cloud for management, analytics, and storage – all using a single, familiar AWS programming model,” said Dirk Didascalou, Vice President of IoT at AWS. “We are excited to make AWS Greengrass available to all customers, and with our partners shipping AWS Greengrasscapable devices it is now incredibly easy to build and run IoT applications that seamlessly span devices on the edge and in the AWS Cloud.” More than a dozen AWS partners, including Annapurna, BSquare, Canonical, Digi International, Intel, Lenovo, Mongoose, Qualcomm Technologies, Raspberry Pi, Samsung, Technicolor and Wistron are integrating AWS Greengrass into their platforms.

Weathering the cybersecurity storm By Hishamul Hasheel, VP, Software and Security, Redington Value

In the last two months itself, we have seen a glimpse of what can transpire if enterprises, whether small or large, take cybersecurity lightly. Both WannaCry and NotPetya, the recent ransomware attacks, have crippled organisations from going about their regular operations and had monumental information and financial loss. These kinds of attacks have tested the security posture of firms who had firmly believed that their security systems can provide adequate protection. WannaCry ransomware has brought the spotlight back on the fundamentals of evaluating a firm’s security vulnerabilities, ensuring security awareness among end-users and patching systems on time. The business of selling security solutions means that what we are trading is based on ‘trust’. The current market circumstances offer huge opportunities for our partners, both, from an advisory role and selling holistic solutions. Partners need to hone their skills in next-gen anti-malware, patch management, advanced email security, privileged identity management and APT protection solutions. They need to elevate their role from being only security solutions providers to trusted IT security advisors and consultants with a core competency in specific industry verticals. At Redington Value, we look to continue enabling our resellers in addressing the full life cycle of information security needs of regional customers. We provide end-to-end support in sales, presales, consultancy and professional services engagement in multiple areas. We encourage our partners to take advantage of our support to be able to emerge as successful security resellers.

For more information, please write to sales.value@redingtonmea.com


4

CyberArk acquires Conjur for $42 million Conjur’s technology for securing DevOps extends CyberArk’s reach deeper into the DevOps lifecycle.

Elizabeth Lawler, Conjur

Security solutions provider CyberArk Software has acquired privately-held Conjur, a Newton, Massachusetts based provider of DevOps security software for $42 million in cash. Conjur’s technology for securing DevOps extends CyberArk’s reach deeper into the DevOps lifecycle to protect

secrets and manage machine identities. “While empowering organisations with more efficiency and speed, the DevOps process is also dramatically expanding the attack surface across the entire enterprise,” said Udi Mokady, Chairman and CEO, CyberArk. “CyberArk’s acquisition of Conjur further strengthens our market leadership position – providing the industry’s only enterpriseclass solution for privileged account security and secrets management on premises, in the cloud and across the DevOps pipeline. Now with Conjur, CyberArk customers can truly embrace DevOps without compromising on security.” “Conjur’s innovative DevOps security solution is gaining

Conjur’s innovative DevOps security solution is gaining momentum with developers, security and operations teams in modern enterprise IT organisations around the world.” momentum with developers, security and operations teams in modern enterprise IT organisations around the world,” said Elizabeth Lawler, CEO and Co-Founder, Conjur. “We are excited to become part of CyberArk to set a new industry

standard for privileged account security and secrets management, helping customers move to a true DevSecOps delivery model that supports greater business agility.” The CyberArk-Conjur Solution for DevOps is available now from CyberArk.

Fidelis Cybersecurity releases endpoint cloud solution The solution includes all the benefits of the on-premise version of Fidelis Endpoint with the added convenience, scalability and economy of a cloud-based deployment model.

Fidelis Cybersecurity has announced the availability of Fidelis Endpoint Cloud, which is expected to provide security personnel with the visibility, context and automation required to investigate and resolve threats lurking on endpoints and to protect their organisations from cyberattacks. According to the company, this solution includes all the features and benefits of the on-premise

version of Fidelis Endpoint with the added convenience, scalability and economy of a cloud-based deployment model with capacitybased subscription pricing. With Fidelis Endpoint, users can quickly identify other compromised machines, determine the root cause of issues, and take rapid response and remediation actions. The solution eases the steps needed to retrieve information

For more information, please write to sales.value@redingtonmea.com

about alerts and affected endpoints while providing metadata, so users can quickly distinguish between threats and false alarms and save hours of legwork and research, said the firm. “When an attacker gets on an endpoint, they gain a foothold in your network – so what begins as an inadvertent click on a wellcrafted phishing email can escalate as attackers move laterally within your network and gain access to your sensitive information,” said Fidelis Cybersecurity CTO Kurt Bertone. “Security teams are buried in alerts, so we designed our technology to provide the visibility, context and automation that security professionals need to detect, investigate and resolve the modern threats that enterprises face today.”

With the Fidelis Endpoint Cloud offering, all of the management, metadata and analytics components of the Fidelis Endpoint solution are deployed in a Fidelis-provided cloud infrastructure – making it possible for organisations to focus on security without the distractions of provisioning, patching and maintaining their ‘back end’ security infrastructure. Fidelis Endpoint Cloud can be deployed as a standalone solution or in conjunction with the Fidelis Network product. When used together, network and endpoint event data is automatically correlated to confirm and validate alerts and suspicious activity. Fidelis Endpoint Cloud is generally available and includes all the benefits of the latest version of the solution.


5

Fortinet Threat Landscape report highlights most threats are opportunistic Research demonstrates highly automated cyber defenses are critical to mitigate pervasive ‘cybercrime-as-a-service’ attacks.

Phil Quade, Fortinet

Fortinet has announced the findings of its latest Global Threat Landscape Report. The data spans the cybersecurity kill chain focusing on three central aspects of the landscape, including application exploits, malicious software, and botnets against the backdrop of important enterprise technology and industry sector

trends. The research reveals that while more high profile attacks have dominated the headlines, the reality is that most threats faced by most organisations are opportunistic in nature fueled by a pervasive Crime-as-a-Service infrastructure. Phil Quade, Chief Information Security Officer, Fortinet said, “As organisations increasingly adopt convenience and costsaving IT techniques, such as cloud services, or add a variety of smart devices to their network, visibility and control of their security is at risk. Meanwhile, attackers are buying or re-using tools of their own. Cybersecurity strategies need to increasingly

adopt trustworthy network segmentation and high degrees of automation to prevent and detect adversaries’ efforts to target the newly-exposed flanks of our businesses and governments.” Three important research highlights are as follows: Attack tools never forget and are always ready for service, anywhere and anytime: Modern tools and Crime-as-aService infrastructures enable adversaries to operate on a global scale at light speed. As a result, the Internet seems not interested in geographic distances or boundaries because most threat trends appear more global than regional.

Fujitsu rolls out new biometric authentication solution The biometric authentication solution helps organisations secure their networks against unauthorised access, while also reducing the risk of attack from hackers and identity thieves.

Fujitsu has launched PalmSecure ID Login, a new biometric authentication solution that helps organisations secure their networks against unauthorised access, while also reducing the risk of attack from hackers and identity thieves. According to the company, PalmSecure ID Login integrates

Fujitsu’s highly secure biometric palm vein authentication technology into corporate network environments using Microsoft Active Directory – helping boost IT security while also making it easier for users to log on to their system without needing to remember complex passwords, which need to be changed on a regular basis. To log on to their PC, or authenticate for internal system access, PalmSecure ID Login users simply hover their hand over a contactless palm vein scanner – already built in to several Fujitsu Lifebook notebooks and Stylistic 2-in-1 tablets, and available as a stand-

alone USB pluggable device. Enrolled users can log in from any device within a corporate network, since PalmSecure ID Login is connected to Microsoft Active Directory, which centrally manages and stores all access data, including biometrics. The Fujitsu PalmSecure technology works by capturing an infrared scan of oxygendepleted blood veins within the palm of a hand. The technology combines the convenience of a contactless sensor with biometric security. For users, the system is more convenient and faster than typing a password – with identity verification usually completed within one second, said the firm.

Hyperconvergence and IoT are accelerating the spread of malware: As networks and users increasingly share information and resources, attacks are spreading rapidly across distributed geographic areas and a wide variety of industries. Studying malware can help provide views into the preparation and intrusion stages of these attacks. Visibility of distributed and elastic infrastructure is diminishing: Visibility and control over today’s infrastructures are diminishing as the number of potential attack vectors across the expanded network landscape continues to grow.

Thomas Bengs, Director and Head of Biometrics, Fujitsu, EMEIA, said, “Passwords are forgotten, lost and get stolen, which makes them a serious vulnerability in any organisation’s security arrangements. Replacing password logins with palm vein biometric authentication technology reduces the risk of misuse from stolen or unsecured passwords, including the worstcase scenarios of catastrophic hacker attacks, identity fraud and large scale data theft. It’s also impossible to forget your credentials, since they’re in the palm of your hand – unlike a smart card, or a difficult to remember password.” Fujitsu PalmSecure ID Login is available to order across EMEIA from June 2017, with availability in Oceania and the Americas to follow. Fujitsu PalmSecure ID Login is sold directly from Fujitsu and through the firm’s partners with pricing varying according to geographical regions.

For more information, please write to sales.value@redingtonmea.com


6

EVENTS

Veeam - Partner Academy - Dubai - 5 June

Veeam - Enablement Session with Fujisoft - Dubai - 8 June

Fortinet and Redington Value Iftar - Amman - 12 June

Fortinet - Enablement Session with Hilal Group - Dubai - 6 June

Sonicwall - CSSP Bootcamp - Dubai - 11-14 June

Barracuda, Microsoft and Redington Value Iftar - Dubai - 12 June

Check Point Suhoor - Manama - 12 June

Dell EMC,VMware and RSA - Iftar - Riyadh - 13 June

Fortinet - Partner Iftar - Jeddah - 13 June

Huawei - Partner Pre Sales Training Program - Volume Server - Dubai - 13 June

For more information, please write to sales.value@redingtonmea.com


7

Huawei - Partner Pre Sales Training Program - WiFi - Dubai - 13 June

Malwarebytes and Redington Value Iftar - Dubai - 13 June

HPE - Redington Value HPE Iftar - Riyadh - 20 June

Veeam - Enablement Session with Atom Options - Dubai - 18 June

Fortinet and Redington Value Iftar - Dubai - 14 June

Veeam - Enablement Session with Atom Options - Dubai - 18 June

Huawei - Partner Pre Sales Training Program - Campus Switch - Dubai - 20 June

Huawei - Partner Pre Sales Training Program - Entry Level - Dubai - 20 June

Huawei - Huawei Iftar with Partner - Jeddah -20 June

Veeam - Enablement Session with Mezzan - Dubai - 22 June

For more information, please write to sales.value@redingtonmea.com


8

EVENTS

Cisco - Sales Floordays and Demos - Nigeria - 8 June

Cisco - Sales Floor Day & Demos - Tanzania - 2 June

Fortinet - Partner Training - Tanzania - 6 June

Dell EMC - Partner Enablement Session - Kenya - 7 June

Fortinet - Partner Training - Uganda - 14 June

Dell EMC - Partner Enablement Session - Kenya - 14 June

Symantec - Partner Event - Kenya - 15 June

Tripp Lite -Lunch and Learn Partner Session - Kenya - 15 June

Cisco - Sales Floor Day and Demos - Kenya - 22 June

Dell EMC - Partner Event - Kenya - 23 June

For more information, please write to sales.value@redingtonmea.com

Tripp Lite -Lunch and Learn Partner Session - Kenya - 29 June



10

Trend Micro launches $100M venture fund The venture fund will allow the firm to explore emerging technology markets.

Eva Chen, Trend Micro

Trend Micro has announced the launch of a corporate venture fund to explore emerging technology markets. With an initial investment of $100 million, this venture fund will allow Trend Micro to nurture

a portfolio of startups that are incubating ideas and living at the epicenter of hyper growth markets, such as the Internet of Things (IoT). Eva Chen, Founder and CEO, Trend Micro, said, “Trend Micro’s vision has always been to make the world safe for exchanging digital information. The explosion of devices is transforming how the world works, thinks and acts. It is clear that the ecosystem is still evolving and there is work to do to ensure organisations and individuals can operate and live safely in this new reality.” Trend Micro’s venture will offer companies, financial backing, access to its worldclass global threat intelligence, strategic alliances, as well as its

channel of more than 28,000 partners. In return, working with these investments will uncover insights into emerging ecosystem opportunities, disruptive business models, market gaps and skillset shortages. These learnings will influence Trend Micro’s cybersecurity solution planning across the company. “We have a 29-year history of successfully anticipating technology trends to secure all types of environments,” said Chen. “The first mega wave we caught was the growth of the PC marketplace; we committed early on to endpoint protection and remain a Leader in Gartner’s Magic Quadrant for Endpoint Protection

Platforms today. The second mega wave was all about the cloud; we made a bet early on to securing the cloud and so far we have secured over two billion workload hours on Amazon Web Services (AWS) alone. Now, we believe the next wave has arrived with IoT; our fund will help us harness this opportunity.” With a strong financial position and 72 quarters of consecutive profitability, Trend Micro says it is well positioned to invest funds to do research and make advancements consistent with its corporate strategy. The formation of this venture arm allows additional freedom to dive into new areas without disrupting core business resources.

Malwarebytes unveils inaugural channel programme Partners can look forward to attractive margins from the new EMEA channel programme. Malwarebytes, the advanced malware prevention and remediation solution provider, has introduced its inaugural channel programme for partners across EMEA. According to the firm, the programme has been designed to be simple and focuses on driving deal registrations with a commitment from the company to help its partners “close business opportunities quickly and easily.” Where traditional channel schemes evaluate partners based on revenue, Malwarebytes looks to incentivise its reseller and distributor network based on the exposure and opportunity

reach they provide for the security company. Partners can attain gold and platinum levels based on numbers of deal registrations rather than revenue, certification programs or complex points based programmes. “As a company, Malwarebytes has always been innovative and we’re carrying that ethos through to our partner programme,” said Anthony O’Mara, EMEA Vice President, Malwarebytes. “Vendors often make partners jump through far too many hoops, wanting arbitrary criteria to be met, often dictating to resellers how to run their business. We’re not

For more information, please write to sales.value@redingtonmea.com

We want our channel to feel part of a mutually beneficial partnership where both parties are invested in driving growth together.” doing any of that. We know our partners run successful businesses. So, we’ve designed our programme to be flexible, forward-looking and mutually beneficial. We want our channel to feel part of a mutually beneficial partnership where both parties

are invested in driving growth together.” By providing support and positive incentives, the company said that it is offering the reseller community the tools they need to take advantage of the opportunities in the security space.


11

Red Hat Ceph storage release expands versatility as object store Newest version of storage platform broadens protocol support to extend flexibility of object storage deployments for traditional and modern workloads.

Ranga Rangachari, Red Hat

Red Hat has announced Red Hat Ceph Storage 2.3. This release, based on Ceph 10.2 (Jewel), introduces a new Network File System (NFS) interface, offers new compatibility with the Hadoop S3A filesystem client, and adds support

for deployment in containerised environments. According to the company, these improvements expand the product’s versatility as an object storage platform, offering the ability to support big data analytics and serve as a common platform for file-based workloads Red Hat Ceph Storage is an open, software-defined, unified storage platform. It decouples software from hardware to run cost-effectively on industrystandard servers and disks, scales flexibly and massively to support multiple petabyte deployments, and provides web-scale object storage for modern use cases. Ranga Rangachari, Vice

In today’s environment of exploding data growth, customers need support for existing and modern workloads as they update their infrastructure with software-defined technologies to be more nimble and cost-efficient.” President and General Manager, Storage, Red Hat, said, “In today’s environment of exploding data growth, customers need support for existing and modern workloads as they update their infrastructure with softwaredefined technologies to be more nimble and cost-efficient. Red Hat aims to assist customers with IT modernisation, and object storage

advancements in Red Hat Ceph Storage 2.3 coupled with Red Hat Consulting and Global Support can be instrumental to their transition and ultimate success.” Red Hat Ceph Storage 2.3 and its containerised image will be generally available via the Red Hat Customer Portal and on the Red Hat Container Registry, respectively.

Veeam and Microsoft extend alliance to deliver availability for the always-on cloud The new capabilities enable businesses to deliver digital life experience users expect.

Peter McKay, Veeam

Veeam Software has announced new capabilities enabling any business to deliver the digital life experience users expect by protecting applications and data running in hybrid cloud leveraging backup and disaster recovery based on Microsoft Azure and Veeam ‘Always-On Cloud’ Availability Platform. The new capabilities include the following: Veeam Disaster Recovery in Microsoft Azure simplifies and automates a disaster recovery in Azure, helping businesses maintain business continuity and availability of critical workloads with all-encompassing on-demand

DR in Azure. Veeam DR in Azure combines Veeam Direct Restore and new Veeam PN (Veeam Powered Network). Veeam PN for Microsoft Azure is designed to simplify and automate the setup of a DR site in Azure using lightweight software-defined networking (SDN). It helps maintain business continuity and availability by eliminating the complexity of VPN deployments and is designed for businesses of all sizes and service providers. The company announced a new Scale Out Backup Repository (SOBR) support for cloud object storage as an Archive Tier extent. This new functionality, arriving with Veeam Availability Suite v10, enables customers to archive Veeam backups to Azure Blob storage. This native support helps customers to leverage Azure to

reduce long-term data archival, retention and compliance costs. Veeam Agent for Microsoft Windows, previously announced and was made generally available at VeeamON 2017 in May. This solution extends Veeam ‘AlwaysOn Cloud’ Availability Platform to public cloud and physical servers. This new solution offers features and capabilities designed to ensure Availability for Windows-based physical servers, workstations and endpoints, as well as Windows workloads running in Azure. Microsoft announced that it will enable all Azure customers to access and use disks in Azure up to 4TB in size (previously 1TB). This enhancement means Veeam customers can fully realize a more cost-effective solution using a Veeam virtual appliance to back

up four times as much data in Azure Storage. The firm also announced an update to its SaaS Availability solution, Veeam Backup for Office 365. In this update, a multi-tenant architecture enables protecting larger Office 365 deployments with a single installation, while empowering Veeam Cloud and Service Providers (VCSPs) to deliver Office 365 backup services. Peter McKay, Co-CEO and President, Veeam, said, “Veeam and Microsoft have its customers covered with new solutions for backup and disaster recovery using Azure. With Veeam, enterprises can confidently move to Azure and Hybrid Cloud, and be confident that their data and applications will always be available, no matter what happens.”

For more information, please write to sales.value@redingtonmea.com



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.