Value Journal | Issue 30 | February 2019

Page 1

Issue 30 // February 2019

Oracle Cloud Centre of Excellence (CCoE) launched in Dubai

The CCoE will furthermore bring together Oracle’s best practices, deep insights into cloud strategy and Redington’s experience in building serThe new facility is aimed at enabling knowledge sharing and promote ready availability of Oracle Cloud. vice offerings, professional services and marketing assistance to deliver Redington Value, a leading Value-Addthe best possible support for partners ed Distributor (VAD) for Oracle with that will enable them to develop their coverage across 50 countries in the business and deliver unique soluMiddle East and Africa, has recently tions. launched the Oracle Cloud Centre of “This new CCoE will provide a vaExcellence (CCoE), as a joint initiative riety of enablement, engagement and with Oracle. Located at Redington’s development resources that will help state-of-the-art data center in Dubai, the Oracle PartnerNetwork (OPN) CCOE opening ceremony ribbon cutting by Ramkumar Balakrishnan, President, Redington the CCoE will not only be a facility to partners drive cloud adoption across Value and Husein Hamza, Vice President, Oracle, Gulf States impart learning and trainings but will the Middle East. In addition to delivalso act as a catalyst for organizations ering technical training workshops that are willing to undertake the digital customers an in-depth understand- on Oracle Cloud, a lot of focus will aimed at developing partner skills ing of the journey to the cloud with be on driving Innovation, Improvetransformation journey. to support the digital transformaThe key objective of the CCoE is to Oracle. While the new facility will pro- ment and Improvisation using Oracle tion strategy of Continued on page 3 provide Oracle channel partners and mote cloud adoption and “test drives” Cloud. customers, the

AMAZON WEB SERVICES ANNOUNCES AWS BACKUP Centralized backup service makes it easier and more cost-effective for customers to automate backups of their data and meet business and regulatory requirements. Amazon Web Services, Inc. (AWS), an Amazon.com company, has announced AWS Backup, a fully-managed, centralized backup service that makes it faster and simpler for customers to back up their data across AWS services and on-premises, helping customers more easily meet their business and regulatory backup compliance requirements. AWS Backup makes protecting storage volumes, databases, and file systems easier by giving customers a single service to configure and audit the AWS resources they backup, automate backup scheduling, set retention policies, and monitor recent backups and restores in one place.

“As the cloud has become the default choice for customers of all sizes, it has attracted two distinct types of builders. Some are tinkerers who want to tweak and fine tune the full range of AWS services into a desired architecture, and other builders are drawn to the same breadth and depth of functionality in AWS, but are willing to trade some of the service granularity to start at a higher abstraction layer, so they can build even faster,” said Bill Vass, VP of Storage, Automation, and Management Services, AWS. “We designed AWS Backup for this second type of builder who has told us that they want one place Continued on page 3

Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:

For more information, please write to sales.value@redingtonmea.com



3

From page 1

COLUMN: REDefined

From page 1

Oracle Cloud Centre...

Amazon web...

CCoE will also rollout a Digital and Cloud accelerator program to help partners align and transform their business model in the cloud era,” said Ramkumar Balakrishnan, President, IT Value Distribution, Redington Gulf. “Cloud adoption in the UAE and wider Middle East is on the rise and in order to help our customers achieve maximum value and unprecedented growth, it is important for us to invest in empowering our partners with the right skills,” said Orfhlaith Ni Chorcora, Vice President, A&C Leader, Technology and Cloud Systems, South Europe and ECEMEA, Oracle. “The Cloud Centre of Excellence will allow partners to focus on continuous skills development and education of their employees thus empowering the partners to provide better service to customers that are embarking on their cloud journey.” Apart from the CCoE in Dubai Redington also operates and manages the CCoE in Kenya and soon will be launching another one in Nigeria and other regions as well. Look out for further announcements around the CCoE soon and do send in your requests and enquiries to ­CCOE.UAE@redingtongulf.com.

to go for backups versus having to do it across multiple, individual services. Today, we are proud to make AWS Backup available with support for block storage volumes, databases, and file systems, and over time, we plan to support additional AWS services.” Initially, AWS Backup is integrated with Amazon DynamoDB, Amazon Elastic Block Store (Amazon EBS), Amazon Elastic File System (Amazon EFS), Amazon Relational Database Service (Amazon RDS), and AWS Storage Gateway, with support for additional services planned for the future. Customers can also back up on-premises application data through the AWS Backup integration with AWS Storage Gateway, providing a common way to protect their on-premises data in the AWS cloud.

Check Point launches hyperscale network security solution Maestro Revolutionary security platform delivers unprecedented scalability, resilience and control to any organisation.

Check Point Software Technologies has introduced Check Point Maestro, the industry’s first truly hyperscale network security solution. Check Point Maestro is a revolutionary new architecture that enables businesses of any size to enjoy the power of flexible cloud-level security platforms, and to seamlessly expand their existing security gateways to hyperscale capacity. With Check Point Maestro, organizations can easily scale up their existing Check Point security gateways on demand, in the same way as spinning up new servers and compute resources in public clouds. Maestro enables a single gateway to

expand to the capacity and performance of 52 gateways in minutes, giving companies elastic flexibility and enabling massive Terabit/second firewall throughput. This almost limitless scalability enables organizations to support 5G networks’ high data rates and ultra-low latency, and secure the largest, most resource-hungry environments, setting new standards in hyperscale network security. “Check Point Maestro extends the Gen V security capabilities of our Infinity architecture into hyperscale environments. It ensures organizations can secure their dynamic, evolving environments without limits, now and in the future,” said Itai Greenberg, VP of Product Management at Check Point. “The principle behind Maestro is very simple: it enables organizations to start with their existing security implementations, no matter how small, and scale their protection almost infinitely according to their changing business needs.” Check Point Maestro delivers advanced new capabilities such as hyperscale security, cloud-level resiliency and operational supremacy. Maestro is available from February 2019.

Don’t let anyone steal your bread

By Rajesh Mathrani, GM Sales, MENA and Director Operations, Redington Value

The fact of the matter today is that the business pie is shrinking. Due to the market slowdown and deeper penetration of virtualisation and cloud, the erstwhile business pie is declining at a rapid pace. Partners can no longer afford to let anyone else come in and steal the hard-earned bread that has been built painstakingly with lots of efforts and hard work over many years. To protect interests in the long run, partners need to specialize and build businesses parallelly. Businesses, which are considered niche today, will become mainstream soon. The current business model will gradually become ancillary operations, tied to the outcome of what the customer demands. We have already started walking that path almost three years ago. We have built practices around cloud adoption and migration, analytics, IoT, solution consulting and in focused areas of services delivery. We have gained insights and have built a knowledge base, which is available to every partner in Redington’s channel ecosystem. Partners’ business is at threat as the market is already moving towards these outcome-based approaches. Although quite a few proactive partners have started adopting such practices and are learning on the way. We are here to collaborate with our partners to identify their strengths and zero in on lucrative market opportunities together, as well as identify the skill gaps, to enable and empower them. Over the years, we have gained substantial knowledge, which we are keen to share with our partner community. We invite our partners to talk to us to help build a robust future jointly.

For more information, please write to sales.value@redingtonmea.com


4

Huawei releases CloudEngine 16800 It is the industry’s first data center switch built for the AI era Huawei has unveiled the industry’s first data center switch built for the Artificial Intelligence (AI) era – CloudEngine 16800, at its network product launch event for Spring 2019 themed “A CloudEngine Built for the AI Era”. The firm defines three characteristics of data center switches in the AI era: embedded AI chip, 48-port 400GE line card per slot, and the capability to evolve to the autonomous driving network, and innovatively incorporates AI technologies into data center switches. Kevin Hu, President of Huawei Network Product Line, said, “A fully connected, intelligent world is fast approaching. Data centers become the core of the new infrastructures such as 5G and AI.

Huawei will first introduce AI technology to data center switches, leading data center networks from the cloud era to the AI era.” The CloudEngine 16800 uses the iLossless algorithm to implement auto-sensing and auto-optimization of the traffic model,

thereby realizing lower latency and higher throughput based on zero packet loss. The CloudEngine 16800 overcomes the computing power limitations caused by packet loss on the traditional Ethernet, increasing the AI computing power from 50 percent to 100

percent and improving the data storage Input/Output Operations Per Second (IOPS) by 30 percent. The CloudEngine 16800 boasts an upgraded hardware switching platform, and with its orthogonal architecture, overcomes multiple technical challenges such as highspeed signal transmission, heat dissipation, and power supply. With CloudEngine 16800’s local intelligence and the centralized network analyzer FabricInsight, the distributed AI O&M architecture identifies faults in seconds and automatically locates the faults in minutes, helping to accelerate the advent of autonomous driving network. Furthermore, this architecture greatly improves the flexibility and deployability of O&M systems.

Mimecast acquires Simply Migrate Mimecast expands its migration services with this acquisition. Mimecast has acquired Simply Migrate Ltd., an innovative provider of archive data migration technology. With this acquisition, Mimecast expands its migration services with a rich portfolio of connectors, combined with a deeper experience in helping organizations get out of the business of managing expensive, unreliable legacy archives so they can move to a next-generation data protection strategy in the Mimecast cloud. This helps enable them to reduce costs, safeguard their intellectual property, preserve institutional memory, accelerate e-discovery and achieve compliance. The cost and complexity of legacy data migration is one of the leading obstacles preventing enterprises from moving to modern

cloud-based archiving solutions such as Mimecast. The acquisition of Simply Migrate will offer customers and prospects a faster, less expensive and more reliable path to the Mimecast cloud. “Legacy archiving systems are outdated and unable to handle growth and ever-changing demands of a modern enterprise. Many organizations struggle with the ballooning email storage volumes alongside other unstructured data types, coupled with the cost and management burdens of storing it on-premises,” said Peter Bauer, Chief Executive Officer at Mimecast. “With the acquisition of Simply Migrate, customers can reap the benefits of the Mimecast Cloud Archive, which was recently named a Leader in

For more information, please write to sales.value@redingtonmea.com

Peter Bauer, Mimecast

the Gartner Magic Quadrant for Enterprise Information Archiving for the fourth year in a row. The technology Simply Migrate offers is engineered to provide end-toend migration into the Mimecast

Cloud Archive, helping to cut costs and operational complexity while achieving a superior result with more flexible access to data, case management, supervision and more.”


5

Veeam expands leadership in Cloud Data Management Adds new capabilities for Microsoft Azure and Azure Stack as well as Amazon Web Services, IBM Cloud and thousands of service providers. Veeam Software has announced general availability for new cloud data management capabilities as part of Veeam Availability Suite 9.5 Update 4, as well as the upcoming Veeam Availability for AWS and Veeam Availability Console v3. The new major capabilities deliver cost effective data retention, easy cloud migration and data mobility, cloud-native backup and protection for Amazon Web Services (AWS), portable cloud-ready licensing, increased security and data governance, and solutions to make it easier than ever for service providers to deliver Veeam-powered services to market. Ratmir Timashev, Co-founder and EVP of Sales & Marketing at Veeam, said, “Our latest version of Veeam Availability Platform is one of our most important and anticipated releases to date, providing simple, flexible and reliable solution to help customers migrate to and keep data available in the hybrid cloud regardless of its location Veeam Availability Platform gives customers agility, availability and business acceleration leveraging the following new major capabilities; Veeam Availability Suite 9.5 Update 4 • Cloud Tier: Provides unlimited capacity for long term data retention by using native, cost-effective object storage integrations with Amazon Simple Storage Service (Amazon S3), Azure Blob Storage, IBM Cloud Object Storage, as well as Amazon S3-compatible service providers and on-premises storage solutions. With Veeam, customers avoid double charges for storing data in

Our latest version of Veeam Availability Platform is one of our most important and anticipated releases to date, providing simple, flexible and reliable solution”

Ratmir Timashev, Veeam

the cloud – unlike with other backup providers who impose “cloud tax” on top of the cloud provider’s storage cost. Cloud Mobility: Businesses can easily migrate, move and recover any on-premises or cloud-based workloads to AWS, Azure and Azure Stack in just two steps to maintain business continuity and availability, increase agility and optimize cost across hybrid cloud environments. Enhanced Veeam DataLabsM: Businesses will have increased security and data governance options including GDPR readiness and malware prevention with DataLabs Staged and Secure restore. Intelligent Diagnostics: Companies can reduce management and support costs through proactive resolution of configuration problems. Enhanced Veeam Cloud Connect Replication for Service Providers (VCC-R): Service providers using VMware vCloud Director can leverage existing net-

working, infrastructure and self-service management investments for Disaster Recovery as a Service (DRaaS) solutions for lower TCO and higher margins. Veeam Availability for AWS Part of Veeam Availability Platform, this new solution combines Veeam N2WS cloud-native backup and recovery of AWS workloads with the ability to consolidate the backup data in a central Veeam repository. This new offering enables customers to reliably move data to and holistically manage across multi-cloud environments. It also mitigates the risk of losing access to cloud applications and ensures protection of AWS data against accidental deletion, loss of AWS account access, data-level security threats and outages. Veeam Instance Licensing (VIL) Veeam new cloud-ready licensing is the industry’s first portable subscription licensing enabling IT agility and workload mobility for multi-cloud enterprises. Licenses are moved automatically when workloads are moved between platforms: “VMware – Hyper-V – Physical – Windows – Linux – AWS – Azure – IBM Cloud –

other” helping customers in their multi-cloud strategy with no additional license cost. Veeam Availability Console v3 More than 20,000 Veeam Cloud & Service Providers (VCSPs) will accelerate the growth and delivery of a Backup as a Service (BaaS) and Disaster Recovery as a Service (DRaaS) services to their customers with: • Reseller Tier: Cloud service providers (CSPs), managed service providers (MSPs) and resell channel partners (VARs) can collaborate to deliver more value to joint customers by leveraging three-tier (SP – VAR – customer) capabilities including a partner-branded portal, customer setup features, monitoring capabilities – all with the best-fit level of access for their role. • Scale-out Architecture: Service providers will experience unprecedented levels of scalability to support multiple Veeam Cloud Connect (VCC) installations, more customers and more devices – all leading to increased revenue streams.

For more information, please write to sales.value@redingtonmea.com


6

Trend Micro: One third of cybersecurity staff feel isolated from the business 57 percent say the biggest cybersecurity challenge is communicating threats internally.

Trend Micro has revealed that IT executives responsible for cybersecurity feel a lack of support from company leaders, and 33 percent feel completely isolated in their role. IT teams are under significant pressure, with some of the chal-

lenges cited including prioritizing emerging threats (47 percent) and keeping track of a fractured security environment (43 percent). The survey showed that they are feeling the weight of this responsibility, with many (34 percent) stating that the burden they are under has led their

job satisfaction to decrease over the past 12 months. “Company leaders must recognize that any individual responsible for cybersecurity will be feeling the strain,” said Bharat Mistry, Principal Security Strategist, Trend Micro. “As cyber-attacks increase in volume and sophistication, accountability needs to be shared. No business can afford for the IT function to be an island, because it will inevitably buckle. This means shifting the mindset from cybersecurity being a standalone initiative to a shared responsibility across an organization.” While 72 percent stated that cybersecurity is represented at the board level, many are still not ben-

efitting from having a seat at the table, and the issue appears to be ineffective communication. Trend Micro’s survey showed that 44 percent struggle to translate complex threats to their organization’s leadership, and 57 percent say internal communication is the biggest cybersecurity challenge for their business. Respondents revealed that it often takes a prominent cyberattack to get their voice heard, with 64 percent saying communication becomes easier in the wake of a high-profile cyberattack like WannaCry. This raises the question of how IT teams can break down these communication barriers before an incident occurs.

Veritas NetBackup certifies backup and recovery solution With the Docker certification, NetBackup rounds up its extensive coverage of modern new workloads like Hadoop or MongoDB Veritas Technologies has announced that NetBackup 8.1.2 has received certification for protecting Docker container based workloads. Veritas’ customers will be able to protect their containerized data and other legacy or modern workloads like SAP Hana, Hadoop or MongoDB in multi cloud, virtual and physical environments. Containerization of modern workloads are becoming the norm for organizations all around the world as an efficient way to develop and deploy applications. Gartner expects that “by 2020, more than 50% of global organizations will be running containerized applications in production, up less than 20% today.” This rapid deployment is leading to questions about data integrity as an increasing number of new containerized applications are designed to create and modify

persistent data. This evolution is emphasizing the need for mature backup and recovery processes that protect containerized data and applications wherever they reside. In container-based application architectures, some containers are designed to create or modify persistent data. In this case, the protection of the data would be critical but it also allows for other scenarios where data can be safely excluded

For more information, please write to sales.value@redingtonmea.com

from backup processes. As a Docker Certified Container for backup and recovery, Veritas offers three different ways to protect containers with NetBackup, to enable maximum flexibility. Veritas has developed a containerized NetBackup client that can be deployed as a container and utilized to protect persistent application data in this dynamic environment. Certification to the Docker Enter-

prise platform ensures a smooth deployment for the customer with cooperative support from both Docker and Veritas for production environments. Veritas customers can also protect their physical environments as well as their modern virtual and multi-cloud deployments with enterprise scale performance as the latest NetBackup 8.1.2 supports Docker and other next-generation workloads like Hadoop, Nutanix, MySQL, PostgreSQL, MariaDB, SQLite, HBase and MongoDB. The backup and restore operations in these heterogeneous complex architectures are being managed through a radically simplified and intuitive user interface that enables authorized employees to easily protect and monitor their own data and applications, wherever they reside.


7

Securing your networks Husni Hammoud, General Manager, CEE, MEA & Turkey, Barracuda, elaborates on how partners can optimize opportunities in the network security space with the firm’s offerings. Cybersecurity adversaries are increasingly becoming more sophisticated and advanced in the way they architect attacks. Regional businesses need to be a step ahead in order to protect their networks and infrastructures. The Middle East is moving quickly to adopt transformative digital technologies, through the increasing penetration of the internet, adoption of IoT, and cloud, among others to enable economic diversification. Thus, the region has witnessed a healthy adoption of cybersecurity solutions for these digital platforms to avoid increasingly complex threats. In 2019, the biggest market opportunity that Barracuda Networks; a security, application delivery and data protection solutions provider; will tackle in the Middle East is helping its mutual customers to build a robust stack of email protection solutions. According to Husni Hammoud, General Manager, CEE, MEA & Turkey, Barracuda Networks, attacks that target the individual, such as phishing, spear phishing, and business email compromise are increasing, and organizations need to prevent these types of attacks. He says, “Solutions that provide security awareness training and phishing simulation, for example, can help users learn how to identify these attacks and avoid falling victim to them. If an email-borne attack is successful, customers also need forensics tools to quickly identify the scale of impact and efficiently remediate the problem right away. “Also, as email is a mission-critical service, components like cloud backup and redundant continuity can provide peace of mind and resiliency.” How can channel partners drive the growth of this space to be profitable?

BARRACUDA’S NETWORK SECURITY OFFERINGS •

Husni Hammoud, Barracuda

Hammoud says, “Channel partners need to stay relevant as their customers move to public cloud solutions and as technology decisions shift beyond the IT department.” He explains that more and more decisions at companies are being made by application owners and business-line owners. More importantly, these companies don’t want their lines of business to be restricted by legacy on-premises security rules and connectivity paradigms that are pushed by traditional technology firms. “Through innovation and our cloud-first architecture, Barracuda has become a favorite among application owners, manufacturing heads and other decision-makers. Channel partners need to adjust to this new reality and start getting more involved in other areas of the company,” Hammoud

Barracuda offers a complete set of solutions to protect networks and applications in the cloud as well as services to ensure data integrity. The frontrunner of cloud-delivered services is in application and vulnerability management. “These services are fully cloud integrated and are entirely DevOps compliant with a complete API and are thus received extremely well.” However, adoption of new technologies related to cloud services and keeping up to date with the evolving technological landscape, are two challenges that channel partners can face when providing network security solutions, technology and services. “For the first challenge,” says Hammoud, “we have established a cloud-first organizational culture. This means that we have adopted the widespread principle in going the cloud way with everything we

CloudGen Firewall: Advanced nextgeneration firewall security with seamlessly integrated SD-WAN Specialized Web Security and Email Security Solutions Web Application Firewall (WAF) and WAF-as-a-Service IoT Connectivity and Security solutions (as a part of the CloudGen Firewall lineup with different variants) Central management and reporting solutions

do and find solutions to the problems we encounter.” Barracuda provides free partner trainings, product information and technical webinars so that its channel ecosystem can stay abreast of the technological landscape. “As a company, we spend a significant time to make sure every partner can go through basic to advanced sales and technological trainings free of charge via campus.barracuda.com,” he adds. “Indepth advanced trainings are also offered worldwide via certified training partners in 41 locations in 24 countries around the world.” Over the next 12 months, we will see the company doubling up its efforts in the Industrial Internet of Things, Industrial Control System Security and Operational Technology Security areas. Hammoud says, “With the advent of the fourth industrial revolution, we have seen an overly large demand in these areas. Combined with our existing strong points in the resale and MSP/MSSP business, we expect to see significant growth over this year.” For training details, please see https://campus.barracuda.com/ trainingcenters/

For more information, please write to sales.value@redingtonmea.com


8

EVENTS

Splunk PIT Session - Kuwait, 16 January

Splunk End Customer Session - Kuwait, 16 January

SonicWall Partner Enablement Session - Dubai, 9 January

Splunk End Customer Session with Mannai - Qatar, 14 January

Splunk PIT Session - Qatar, 14 January

MobileIron-Partner Enablement Session - Riyadh, 24 December 2018

MobileIron-Partner Enablement Session - Riyadh, 24 December 2018

Nutanix-End User for Velocity Session - Riyadh, 21 January

Nutanix-End User for Velocity Session - Riyadh, 21 January

For more information, please write to sales.value@redingtonmea.com


9

EVENTS

Splunk 4 Rookies - Dubai, 22 January

Cisco - SMB Partner Session - Kenya, 17 January

Oracle - Autonomous Blockchain Cloud Service Workshop - Kenya, 15 January

Oracle - Innovate On The Cloud - Uganda, 25 January

Oracle - Database As a Service and Autonomous Database - Uganda, 24 January

Dell EMC - Integrated Data Protection Appliance - Nigeria, 23 January

Oracle - PaaS4SaaS - Integrate & Extend SaaS with PaaS - Nigeria, 30 January

Microsoft Azure Technical Training - Dubai, 07 January

Palo Alto Cloud Security Seminar - Dubai, 17 January

For more information, please write to sales.value@redingtonmea.com


10

Tripp Lite expands line of modular 3‑phase UPS systems Upgradeable design allows capacity to grow with user demands.

Tripp Lite has expanded its SmartOnline SV Series of modular 3-phase UPS systems. Seven new models are pre-configured to use external battery cabinets instead of internal batteries, allowing them to

support extended-runtime applications. Tripp Lite makes 18 compatible external battery cabinets to accommodate a wide range of runtime requirements—up to 405 minutes at full load. “The existing SV Series configurations with internal batteries are perfect for edge computing applications that require a minimal footprint and optimized runtimes. The new models without internal batteries give IT managers more options for extended runtimes,” said Jose L. Medina, Tripp Lite’s 3-Phase UPS Product Line Manager. “All the cabinet sizes and capacities are now available without internal batteries for extended-runtime

applications, and the expanded SV Series UPS line offers maximum configuration and pricing flexibility for a full range of applications.” The SV Series is available with capacities from 20 kVA to 140 kVA. User-installable, hot-swappable 20 kVA power modules can increase capacity or provide N+1 redundancy for fault tolerance. All models provide true on-line, double-conversion power protection to deliver clean and reliable backup power. They are ideal for small and medium businesses, data centers, financial operations, healthcare facilities and government agencies with mission-critical equipment that requires high availability.

The existing SV Series configurations with internal batteries are perfect for edge computing applications that require a minimal footprint and optimized runtimes. The new models without internal batteries give IT managers more options for extended runtimes.”

New CyberArk report highlights approaches to reduce cybersecurity risk Global CISOs provide recommendations for protecting privileged access in DevOps and cloud environments. CyberArk has issued a new research report, “The CISO View: Protecting Privileged Access in DevOps and Cloud Environments.” Based on the direct experiences of a panel of Global 1000 CISOs, the report provides advice for security teams to help effectively assess risk, drive developer collaboration, and prioritize steps to protect DevOps processes while maintaining developer velocity. While security strategies should address privileged access and the risk of unsecured secrets and credentials, they should also closely align with DevOps culture and methods to avoid negatively impacting developer velocity and slowing the release of new services. Despite this, 73 percent of organizations surveyed for the 2018 CyberArk Global Advanced Threat Landscape report have no strategy to address privileged access security for DevOps.

4.

5.

The report summarizes five key recommendations based on the real-world experiences of participating CISOs, including: 1. Transform the security team into DevOps partners – Ensure security practitioners and developers have the right skills, make it easy for developers to do the right thing, encourage collaboration and adopt agile DevOps methods within security. 2. Prioritize securing DevOps tools and infrastructure – Set

For more information, please write to sales.value@redingtonmea.com

3.

and enforce policies for tools selection and configuration, control access to DevOps tools, ensure least privilege and protect and monitor infrastructure. Establish enterprise requirements for securing credentials and secrets – Mandate the centralized management of secrets, extend auditing and monitoring capabilities, eliminate credentials from tools and applications, and develop reusable code modules.

Adapt processes for application testing – Integrate automated testing of code, compel developers to fix security issues using a “break the build” approach and consider a bug bounty program. Evaluate the results of DevOps security programs – Test secrets management solution deployments, measure and promote improvements and educate auditors.

Marianne Budnik, CMO, CyberArk, said, “For organizations embarking on digital transformation initiatives, it has never been more important to align security and risk postures across new tools and technologies. In understanding organizational and operational challenges, security teams can more effectively drive productive discussions across executive, security and developer teams.”


Stu & Mitch IT Team of Two Retailer 198 Employees Technology: HPE Aruba Access Points and Switches HPE StoreVirtual HPE ProLiant Servers

IT resiliency and security for everyone. Keep your business moving forward with secure, right-sized networking, servers, and storage from Hewlett Packard Enterprise. If disaster strikes, minimize disruption with powerful backup and recovery that delivers 99.999%* continuous data availability. See how easy it is to make uptime a key advantage. HPE Just Right IT for any size business. Brought to you by HPE & Intel®. Intel Inside®. Powerful Productivity Outside. *HPE internal testing on StoreVirtual VSA software-defined storage, February 16, 2016. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries. © 2016 HPED LP.



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.