Value Journal | Issue 26 | September 2018

Page 1

Issue 26 // September 2018

ORACLE AUTONOMOUS DATABASE CLOUD SERVICE NOW AVAILABLE

New self-driving cloud database uses machine learning and automation to deliver unprecedented cost savings, security, availability, and productivity.

Larry Ellison, Oracle

Oracle Executive Chairman and CTO Larry Ellison marked a major milestone in the company’s autonomous strategy with the availability of the latest Oracle Autonomous Database Cloud Service, Oracle Autonomous Transaction Processing. Leveraging innovative machine learning and automation capabilities, Oracle Autonomous Transaction Processing delivers unprecedented cost savings, security, availability, and productivity.

The company’s new self-driving database cloud service is built to run the world’s most demanding finance, retail, manufacturing, and government applications, supporting a complex mix of high-performance transaction processing, reporting, batch, and analytic workloads. Oracle’s Autonomous Database portfolio provides organizations with the most complete and advanced set of database capabilities on the market today. Continued on page 3

Dell EMC introduces latest Integrated Data Protection Appliance New Dell EMC IDPA DP4400 delivers innovative capabilities and broad application support in a solution sized and priced right for mid-market customers. Dell EMC has announced its newest Integrated Data Protection Appliance (IDPA), the Dell EMC IDPA DP4400, providing simple and powerful converged data protection to help mid-size organizations transform IT while combatting data sprawl and complexity. Comprehensive data protection has been a challenge for mid-size organizations. Enterprise-class products come with higher cost and complexity,

while lower cost products that have traditionally targeted these organizations sacrifice performance, efficiency and application support. Dell EMC built the IDPA DP4400 from the ground up as a simple, yet powerful, solution for midsize organizations—featuring enterprise-class capabilities for backup, deduplication, replication and recovery. IDPA DP4400 also offers built-in cloud readiness features with

Michel Nader, Dell EMC

disaster recovery and long-term data retention to the cloud. “For mid-size organizations, scaling can get expensive as they try to meet the needs of their ever-growing data,” said Michel Nader, Regional Director, Data Protection Solutions, META, Dell EMC. “With the new Dell EMC IDPA DP4400, we have integrated the best of breed components to offer better time to value and cloud-tiering for long Continued on page 3

Redington Value is a value added distributor for the following brands in parts of Middle East & Africa:

For more information, please write to sales.value@redingtonmea.com


$

DATA → INSIGHT → INNOVATION → REVENUE Capitalize on New Opportunities with the Right Infrastructure

ONE SCALABLE PLATFORM Intel® Xeon® Platinum Processor (8000 Series) Best Performance and Business Agility, Hardware-Enhanced Security

Up to 224 Cores (28 cores x 8 sockets)

Up to 12 TB of Memory (1.5 TB x 8 sockets)

Best for Mission Critical, Real-Time Analytics and Artificial Intelligence

Intel® Xeon® Gold Processor (6000 Series)

Up to 88 Cores (22 cores x 4 sockets)

Up to 6 TB of Memory (1.5 TB x 4 sockets)

Great Performance, Fast Memory, More Interconnect/Accelerator Engines More Interconnects

Intel® Xeon® Gold Processor (5000 Series)

Up to 56 Cores (14 cores x 4 sockets)

Up to 3 TB of Memory (768 GB x 4 sockets)

Better Performance, Advanced Reliability Advanced RAS Features

Intel® Xeon® Silver Processor (4000 Series)

Up to 24 Cores (12 cores x 2 sockets)

Up to 1.5 TB of Memory (768 GB x 2 sockets)

Efficient Performance at Low Power As Low as 70 Watts

Intel® Xeon® Bronze Processor (3000 Series)

Up to 16 Cores Up to 1.5 TB of Memory (8 cores x 2 sockets) (768 GB x 2 sockets)

Sockets Cores

Entry Performance As Low as 85 Watts

Memory


3 COLUMN: REDefined

From page 1

Oracle Autonomous Database... “Oracle is by far the best database in the world and it just got a lot better because now it’s autonomous,” said Ellison. “This delivers a much more reliable, much more secure system—a system that protects against data theft, a system that is up 99.995 percent of the time, and a system that makes organizations and their developers dramatically more productive.”

Traditionally, creating a database management system required experts to custom build and manually maintain a complex hardware and software stack. Oracle Autonomous Database revolutionizes data management by using machine learning to provide a self-driving, self-securing, and self-repairing database service with cloud economies of scale and elasticity. The service enables users to instantly create new autonomous databases and easily convert existing databases, dramatically

From page 1

Dell EMC introduces... term retention, enabling midsize organizations to greatly simplify and automatically adapt to the changing needs and requirements of their business, while keeping performance high and costs down.” The IDPA DP4400 blends

simplicity and performance for mid-size organizations and remote office-branch office (ROBO) environments. The IDPA DP4400 simplifies data protection management via a modern HTML 5 user interface that automates daily

reducing costs and time to market. Complementing the existing Oracle Autonomous Data Warehouse service, Oracle Autonomous Transaction Processing can support a complex mix of high-performance transactions, reporting, batch, IoT, and machine learning in a single database, allowing for simpler application development and deployment, and enabling realtime analytics, personalization, and fraud detection on live transactional data.

tasks including management, monitoring and reporting. The IDPA DP4400 is part of the Dell EMC Future-Proof Loyalty Program, offering a three-year Satisfaction Guarantee, Hardware Investment Protection, up to 55:1 Data Protection Deduplication Guarantee, and Clear Price.

Talend appoints Redington Value as Middle East and Africa VAD USA-based cloud and big data integration solutions company Talend has appointed Redington Value as the value-added distributor for the Middle East and Africa region. Headquartered in Redwood City, CA, USA, Talend provides big data and cloud integration solutions that helps companies become data driven by making data more accessible, improving its quality and quickly moving data where it’s needed for realtime decision making. The Talend VAD program is part of the firm’s growing alliances and technology network programme that is designed to accelerate the technical and sales development of specialist VARs, SIs and general resellers wishing to enter the rapidly growing market for data management and big data solutions. Brian Perrins, Manager, Talend Emerging Markets, said, “The VAD programme was developed to enable local and regional VARs to extend their technical and

Sayantan Dev, Redington Value

sales skills on new and emerging technologies that the big data and cloud ecosystems demand, to areas and regions where such skills are limited or not yet available. The skills of the VAD are offered in addition to those

of Talend and the VAR to deliver local knowledge and experience to VARs who do not have such skill.” Sayantan Dev, VP, Redington Value, said, “We have seen the huge demand for big data, cloud and associated analytics for a while now and have been building our competences and delivering solutions to our channel partners across MEA. Talend is a strategic partner and technology. We are delighted to now have the opportunity to share the skills and experience with our VARs across the region that do not or cannot reach the levels required or are demand by the end users adopting this leading-edge technology.” The distributor said that it is now in the process of developing an intense enablement and education programme to actively support VARs across the region.

Capitalizing on cloud success

By Cherian John, Vice President, Converged Infrastructure Systems, Redington Value

Automation has already transformed industries in which complexity and performance demands must meet the challenges of scarcer resources, narrower profit margins and expanding product volumes. Oracle predicts that by 2020: 50plus percent of all enterprise data will be managed autonomously and 80-plus percent of application and infrastructure operations will be resolved autonomously. As we move to autonomous technologies such as driverless vehicles, self-tuning databases, adaptive robots and the like, the obvious advantages from automation is immense, viz. lowers cost, reduces risk, accelerates innovation, and provides predictive insights. Oracle’s Autonomous Database with Autonomous Transaction Processing services, delivers a self-driving, self-securing, selfrepairing database service that can instantly scale to meet demands of mission critical applications. This new self-driving cloud database service uses groundbreaking machine learning and automation to deliver unprecedented cost savings, security, availability, and productivity. With this the DBAs role will change from build, test, tune, secure, and operate dB, to a more strategic one, focusing on data modeling, security, application tuning and data lifecycle management. Redington’s Cloud Center of Excellence (CCoE) across Kenya, Dubai, Lagos and Riyadh provide trainings and workshops to enable our partners and their end customers meet the challenges of an autonomous future.

For more information, please write to sales.value@redingtonmea.com


4

Huawei, Ivanti partner to maximize endpoint security for enterprises The agreement marks a significant partnership for Ivanti as Huawei becomes a key Ivanti partner for transnational large-scale integration projects. Ivanti and Huawei have announced the signing of a memorandum of understanding (MoU) for a partnership that will address the increasing security and service demands of the companies’ multinational customers. This agreement marks a significant partnership for Ivanti as Huawei becomes a key Ivanti partner for transnational large-scale integration projects supporting global IT enterprises and their digital transformation goals. Terms of the partnership enable Huawei to leverage Ivanti Unified Endpoint Manager and Endpoint Security for Endpoint Manager to enhance governance and control of the Huawei CloudCampus access control system, which

delivers fine-grained user group management policies. By leveraging these Ivanti unified endpoint management (UEM) and security products, both firms will work together to provide a seamless user experience through technology integration and delivery. “Like Ivanti, Huawei has a global vision to power multinational customers’ digital transformation goals with unprecedented security and efficiency,” said Steve Daly, CEO and Chairman of the Board, Ivanti. “We are honored to partner with Huawei in this win-win agreement, which will result in improved security and service availability for our mutual customers.”

The partnership also enables Ivanti, through Huawei Enterprise Service, to deliver broad, efficient services for multinational enterprises, as they enact their digital transformation strategies. “Ivanti and Huawei see the potential of unified endpoint management with integrated endpoint security in the market,”

said Lianhe Wu, Vice President, Switch & Enterprise Gateway Line, Huawei. “As influencers in their respective technical fields, they will promote the technological growth of these solutions, and bring more advanced, mature, and diversified solutions to more customers of Huawei, while growing greater customer marketshare.”

Veritas unveils NetBackup 8.1.2 with improved user interface New Veritas NetBackup modernizes how businesses back up and restore data on premise and in the cloud Veritas Technologies has unveiled Veritas NetBackup 8.1.2 with an improved user interface that simplifies how employees across an organization can effortlessly protect data and modern workloads. The new Veritas NetBackup 8.1.2 provides customers with “best-in-class data protection technology and enhanced user experience”, according to the firm. With an intuitive interface that enables authorized employees to easily protect and monitor their own data, on premises or in multicloud environments, Veritas NetBackup simplifies day-today operations and empowers employees to play an important

data management role in their department. “The explosion of data and the need to protect it, combined with new technologies, webbased workloads and mobile applications are reshaping customer expectations and fostering a new demand for consistent, yet personalized experiences,” said Jane Zhu, Senior Vice President, Data Protection and Governance Engineering, Veritas. “Our customer user experience is one of the critical priorities we’re focusing on today. Simplifying, standardizing and unifying the look and feel of our NetBackup user interface is the first step on this important journey.”

For more information, please write to sales.value@redingtonmea.com

With the new modernized interface of Veritas NetBackup 8.1.2, all authorized users, including backup administrators, will now be able to securely access and manage the backup and recovery of their company data with just a few clicks using their mobile device and save valuable time in day-to-day operations. Through integration with the ‘Veritas Smart Meter’ web service, users can easily identify any issues, view a report of capacity usage and take action to keep their backup environments running smoothly. The new version of NetBackup 8.1.2 will be available globally from Veritas and its worldwide channel partners in September.

The explosion of data and the need to protect it, combined with new technologies, webbased workloads and mobile applications are reshaping customer expectations and fostering a new demand for consistent, yet personalized experiences.”


5

Symantec offers free checkup for VPNFilter menace on routers

The free online tool is designed to help individuals and organizations determine if a router may be impacted by VPNFilter malware. Symantec has announced VPNFilter Check, a free online tool designed to help individuals and organizations quickly and simply determine if a router may be impacted by VPNFilter malware. “VPNFilter poses a very serious threat to both consumers and businesses including injecting malware and the stealing of passwords and other confidential data,” said Greg Clark, CEO, Symantec. “More than half a million routers are suspected to have been infected with VPNFilter and we urge the public to take action to determine if their own home router has been infected.” First reported in May, VPNFilter targets a wide range

Greg Clark, Symantec

of IoT devices such as routers and network-attached storage (NAS) devices. VPNFilter installs a plugin, which monitors and modifies web traffic sent through the infected router, allowing cyber criminals to inject malicious content, render routers inoperable or steal passwords and other sensitive user

information. Symantec’s VPNFilter Check determines if traffic in your home or your company is being altered by a router infected with the threat. “This malware is unlike most other IoT threats because it is capable of maintaining a persistent presence on an infected device, even after a reboot,” said Stephen Trilling, senior vice president and general manager, Security Analytics and Research, Symantec. “Symantec’s online VPNFilter Check tool provides individuals and organizations with an easy way to determine if their routers have been compromised by this threat and suggests steps they can take if infected.”

Check Point research reveals how criminals take over networks through fax machines Newly discovered vulnerabilities, affecting tens of millions of fax devices in businesses and homes worldwide, open the door for criminals to hack networks simply by sending malicious faxes. New research from Check Point Software Technologies has shown how organizations and individuals could be hacked via their fax machines, using newly discovered vulnerabilities in the communication protocols used in tens of millions of fax devices globally. A fax number is all an attacker needs to exploit the flaws, and potentially seize control of a company or home network. The Check Point research demonstrated the vulnerabilities in HP Officejet Pro All-in-One fax printers. The same protocols are also used by many other vendors’ faxes and multi-function printers, and in online fax services such as fax2email, so it is likely that these are also vulnerable to attack by the same method. Following discovery of the vulnerabilities, Check Point shared the findings with HP, which was quick to respond and to

organization’s fax develop a software number (which is patch for its easily obtainable printers. from corporate Not often websites), the perceived as attacker sends a modern-day specially created technology, there image file by fax are over 45 million to the target. The fax machines in vulnerabilities use in businesses Yaniv Balmas, Check Point enable malware globally, with 17 (such as ransomware, cryptobillion faxes sent every year. miners or spyware) to be coded “Many companies may not even into the image file, which the fax be aware they have a fax machine machine decodes and uploads to connected to their network, but fax its memory. The malware can then capability is built into many multipotentially breach sensitive data function office and home printers,” or cause disruption by spreading said Yaniv Balmas, Group Manager, across any networks to which the Security Research, Check Point. fax machine is connected. “This groundbreaking research The vulnerabilities were shows how these overlooked presented by Check Point devices can be targeted by criminals researchers Yaniv Balmas and Eyal and used to take over networks to Itkin at the security and hacking breach data or disrupt operations. conference DEF CON 26. Once an attacker obtains an

Cisco announces intent to acquire Duo Security Acquisition will help accelerate Cisco’s intentbased networking strategy, allowing David Goeckeler, Cisco customers to securely connect users to any application on any network. Cisco has announced its intent to acquire privately-held Duo Security, headquartered in Ann Arbor, Mich. Duo Security is the leading provider of unified access security and multifactor authentication delivered through the cloud. Integration of Cisco’s network, device and cloud security platforms with Duo Security’s zero-trust authentication and access products will enable Cisco customers to easily and securely connect users to any application on any networked device. As per the agreement, Cisco will pay $2.35 billion in cash and assumed equity awards for Duo Security’s outstanding shares, warrants and equity incentives on a fully-diluted basis. David Goeckeler, EVP and GM of Cisco’s networking and security business, said, “Duo’s zero-trust authentication and access products integrated with our network, device and cloud security platforms will enable our customers to address the complexity and challenges that stem from multi-and hybrid-cloud environments.” The acquisition is expected to close during the first quarter of Cisco’s fiscal year 2019, subject to customary closing conditions and required regulatory approvals. Duo Security, which will continue to be led by Song, will join Cisco’s Networking and Security business led by EVP and GM David Goeckeler.

For more information, please write to sales.value@redingtonmea.com


6

Fortinet report reveals home IoT devices are latest cryptojacking targets 96 percent of firms experienced at least one severe exploit. Fortinet has announced the findings of its latest Global Threat Landscape Report. The research reveals cyber criminals are becoming smarter and faster in how they leverage exploits to their advantage. They are also maximizing their efforts by targeting an expanding attack surface and by using iterative approaches to software development facilitating the evolution of their attack methodologies. Phil Quade, Chief Information Security Officer, Fortinet, says, “Cyber adversaries are relentless. Increasingly, they are automating their toolsets and creating variations of known exploits. Of late, they are also more precise in their targeting, relying less on blanket attempts to find exploitable victims. Urgently, organizations must pivot their security strategy to address these tactics. Organizations

Phil Quade, Fortinet

should leverage automated and integrated defenses to address the problems of speed and scale, utilize high-performance behavior-based detection, and rely on AI-informed threat intelligence insights to focus their efforts on patching vulnerabilities that matter.” The report highlighted that virtually no firm is immune from

severe exploits. Analysis focused on critical and high-severity detections demonstrates an alarming trend with 96% of firms experiencing at least one severe exploit. In addition, nearly a quarter of companies saw cryptojacking malware, and only six malware variants spread to over 10% of all organizations. FortiGuard Labs also found 30 new zeroday vulnerabilities during the quarter. It also discovered that cryptojacking moves to IoT devices in the home. Mining for cryptocurrency continues, cyber criminals added IoT devices, including media devices in the home to their arsenals. They are an especially attractive target because of their rich source of computational horsepower, which can be used for malicious purposes. Attackers are taking advantage

Mimecast unveils second-annual state of email security report More than 90 percent of global organizations reported the volume of phishing attacks have increased or stayed the same in past 12 months. Mimecast has announced it has released its second-annual State of Email Security report. The report identifies the latest email-borne threats facing organizations of all sizes and industries globally. Cyberattacks are on the rise. In fact, more than 50% of organizations reported seeing the volume of phishing attacks increase over the last twelve months, while 40% said they saw the volume of impersonation attacks rise. Making cybersecurity a priority should start from the top, yet this isn’t always the case:

Peter Bauer, Mimecast

20% of respondents said their C-level executive sent sensitive data in response to a phishing attack, and 49% admitted that

For more information, please write to sales.value@redingtonmea.com

their management and finance teams aren’t knowledgeable enough to identify and stop an impersonation attempt. “Email-based attacks are constantly evolving and this research demonstrates the need for organizations to adopt a cyber resilience strategy that goes beyond a defense-only approach. This is more than just an ‘IT problem,’ said Peter Bauer, Chief Executive Officer, Mimecast. “It requires an organization-wide effort that brings together many stakeholders, puts the right security solutions in place and

of them by loading malware that is continually mining because these devices are always on and connected. Segmentation will be increasingly important for devices connected to enterprise networks as this trend continues. Other findings included that data on botnet trends gives a valuable post-compromise viewpoint of how cybercriminals are maximizing impact with multiple malicious actions. Also, adversaries are selective in determining what vulnerabilities they target. With exploits examined from the lens of prevalence and volume of related exploit detections, only 5.7% of known vulnerabilities were exploited in the wild. If the vast majority of vulnerabilities won’t be exploited, organizations should consider taking a much more proactive and strategic approach to vulnerability remediation.

It requires an organization-wide effort that brings together many stakeholders, puts the right security solutions in place and empowers employees – from the C-suite to the reception desk – to be the last line of defense.” empowers employees – from the C-suite to the reception desk – to be the last line of defense.” Mimecast conducted the research with Vanson Bourne on the state of organizations’ cybersecurity, their expectations and needs and what attacks they’ve seen increase.


7

Cisco - Security & Servers Workshop - Kenya - 24 July

Dell EMC - Partnership Seminar - Kenya - 8 August

Dell EMC - Workshop With CRDB - Tanzania - 23 July

Fortinet - Partner Security Enablement Session - Uganda - 22 August

Fortinet - Partner Security Enablement Session - Ethiopia - 23 August

Hitachi - IOT and AI Summit - Kenya - 16 & 17 August

Oracle - Getting started with Cloud Infrastructure Workshop - Kenya - 1 August

Symantec - Bluecoat Pre-Sales Training Kenya - 14 August

Dell EMC - Server Workshop With Mantra Technologies - Uganda - 2 August

Oracle - Database Migration to Database Cloud Service - Kenya - 14 August

Oracle - Lift and Shift Partner Services - Use Cases on OCI Workshop - Kenya - 2 August

Veeam - Certified Engineer (VMCE) v9 Partner Training - Kenya - 20 - 22 August

Veeam - Launch Event - Kenya - 23 August

For more information, please write to sales.value@redingtonmea.com


8

Aruba Partner Roundtable, Khobar, 25 July

Avaya aura Bott Camp, Riyadh,1 August

Splunk Partner SE1 Boot Camp, Riyadh, 6 August

Cisco - Security Partner Enablement Session Nigeria - 25 July

VMware SDDC Experience Day-Riyadh,11 July

Check Point FW Technical Boot Camp, Riyadh, 25 July

HPE Hybrid IT Energizer Seminar,Riyadh,16,17,18 July

Palo Alto End User Roundtable, Riyadh, 23 July

Avaya Oceana Boot Camp, Riyadh, 15 August

Fortinet NSE 1,2 Technical Workshop, Riyadh, 29 July

HPE Simplivity Enablement Session, Riyadh, 14 August

Splunk For End User Rookies, Riyadh, 13 August

For more information, please write to sales.value@redingtonmea.com

Splunk Partner SE1 Boot Camp, Riyadh, 6 August


9

Cambium Networks Technical Certification - cnPilot - Dubai - 6 and 7 August

Fortinet NSE 1 and NSE 2 Workshop - Jordan - 6 August

Fortinet SMB Roadshow - Qatar - 14 August

Nokia - Build a Secure Foundation - Jordan - 31 July

Imperva - Technical Training - Dubai - 23 to 25 July

Palo Alto Networks Security Day - Egypt - 25 July

VMware VMUG Session with TCG Digital - Dubai - 26 July

AWS Solutions Training - Dubai - 7 August

Fortinet SMB Roadshow - Jordan - 8 August

Veeam Partner Enablement Session - Dubai - 30 July

AWS Cloud Security Solution Program by Palo Alto & Redington - Bahrain - 23 July

Microsoft Partner Roundtable - Oman - 13 August

Microsoft Partner Roundtable - Qatar - 15 August

For more information, please write to sales.value@redingtonmea.com


10

SonicWall report raises alarm on encrypted threats and chip-based attacks The aggregate purchase price for the transaction was approximately $120 million. Company publishes mid-year update of 2018 SonicWall Cyber Threat Report, finds more than 5.99 billion total malware attacks, up 102 percent, in the first six months of 2018. SonicWall has announced record numbers for malware volume, ransomware attacks, encrypted threats and chipbased attacks in the mid-year update of the 2018 SonicWall Cyber Threat Report. SonicWall CEO Bill Conner, said, “SonicWall has been using machine learning to collect, analyze and leverage cyber threat data since the ‘90s. This commitment to innovation and emerging technology is part of the foundation that helps deliver actionable threat intelligence, security efficacy and automated

real-time breach detection and prevention to our global partners and customers.” The malware boom of 2017 has shown no signs of stopping through the first half of 2018. SonicWall Capture Labs threat researchers recorded 5.99 billion malware attacks during the first two quarters of the year. At this same point in 2017, SonicWall logged 2.97 billion malware attacks. On a month-to-month basis in 2018, malware volume remained consistent in the first quarter before dropping to less than 1 billion per month across April, May and June. These totals were still more than double that of 2017. Published in March’s original report, SonicWall Capture Labs

Bill Conner, SonicWall

threat researchers found that ransomware attacks dropped significantly — from 645 million to 184 million — between 2016 and 2017. SonicWall now shows ransomware attacks surging in first six months of 2018. There have been 181.5 million ransomware attacks year to date. This marks a 229 percent increase over this same time frame in 2017.

The use of encryption continues to grow for legitimate traffic and malicious cyberattacks alike. In 2017, SonicWall reported that 68 percent of sessions were encrypted by SSL/TLS standards. Through six months of 2018, 69.7 percent of sessions are leveraging encryption. Cybercriminals are strategically following this trend to help prevent their malicious payloads from being discovered. Encrypted attacks increased 275 percent when compared to this time in 2017. Data for the 2018 SonicWall Cyber Threat Report midyear update was gathered by the SonicWall Capture Threat Network, which sources information from global devices and resources.

Red Hat announces Ansible Engine 2.6 availability Red Hat Ansible Engine 2.6 extends automation across AWS, Google Cloud Platform, Microsoft Azure, and VMware, brings new capabilities to network and Windows environments. Red Hat has announced the general availability of Red Hat Ansible Engine 2.6, the latest release of its “simple, powerful, and agentless open source IT automation solution”. Red Hat Ansible Engine 2.6 adds new content for automating across hybrid and multicloud environments, along with simplified connections to network APIs and updates for Ansible deployments overseeing Windows environments. When Red Hat Ansible Engine 2.6 combines with Red Hat Ansible Tower, the firm’s centralized control plane for managing and optimizing automated systems at enterprise scale, organizations can more easily extend automation across complex footprints. This includes hybrid and multicloud

environments as well as diverse infrastructure, network, and application deployments. The new features available in Ansible Engine are aimed at enabling users to more rapidly expand their infrastructure, without expanding manpower. Red Hat Ansible Engine 2.6 focuses on three key areas of automation – multicloud, network and windows. Red Hat Ansible Engine 2.6 helps organizations provision in public cloud and in on-premises virtualization infrastructure more simply through updated modules covering Amazon Web Services (AWS), Google Cloud Platform and Microsoft Azure. The public cloud modules add capabilities designed to match the latest functionality available in the respective cloud environments.

For more information, please write to sales.value@redingtonmea.com

Joe Fitzgerald, Red Hat

Additionally, an improved AWS EC2 Instance module can provide a more streamlined user experience when provisioning new and managing existing EC2-backed instances. When users provision their cloud infrastructure with Ansible Engine, creating, managing, and administering deployments on an ongoing basis is done through

a single tool - helping to meet policies regardless of cloud provider. This release also extends the support for VMware vSpheredeployed infrastructure, including VMware Cloud on AWS, enabling users to use automation across the hybrid cloud including legacy infrastructure. Joe Fitzgerald, Vice President, Management, Red Hat, said, “The latest version of Red Hat Ansible Engine builds on our strategy to help users extend automation across their public, private, and hybrid clouds. New cloud, network and Windows capabilities can drive end-toend automation throughout the enterprise.” Red Hat Ansible Engine 2.6 is available now through the Red Hat Customer Portal.


Veeam lasts the distance. Will You? TAKE THE CHALLENGE WIN THE CHALLENGER

Rahul Gulati

rahul.gulati@redingtongulf.com

H Hotel, Business Towers, SZR, 7th Floor, Dubai, UAE



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.