Redington Value Plus January 2013

Page 1

valueplus

03

Palo Alto Networks

06

HP

09

EMC

12

Cisco

quarterly

15

Checkpoint

A special publication from Redington Gulf Value Division

18

Tripp Lite

presents

the

January 2013

Powering ahead Redington Value is geared up to meet surging market needs with new alliances and unmatched channel outreach


For more information or to place an order on EMC, please write to sales.value@redingtongulf.com


09

Accelerate the Virtualisation Journey

06

BYOD and addressing the penetration of Wi-Fi devices

BYOD BY BYO B YO YO OD

contents 02 Blog 03 Interview: Palo Alto Networks 06 Focus: HP 09 Feature: EMC 12 Highlight: Cisco 15 Opinion: Checkpoint

11

18 In depth: Tripp Lite Delivering IT agility

from the director: Dear Partner,

I

welcome you to the year 2013! As we enter the new year, the business outlook in emerging markets seem positive. Although there are concerns of low consumer demand and pockets of expected political risk. From an IT industry perspective, emerging/ innovative products and technology

could offer incremental growth for businesses. New forms of competition may be experienced by traditional players within the IT channel with the emergence of newer technologies/ avenues which would result in positive outcomes for the industry in the long-term. At Redington Gulf, we will continue to innovate as a supply chain services company by

introducing newer services to meet the changing needs of the market. Wish you a steady 2013! Yours sincerely,

Raj Shankar Managing Director, Redington Gulf

For more information, please write to sales.value@redingtongulf.com

September 2012

The ValuePlus Quarterly

1


ramkumar’s BLOG

A vision to succeed to serve your needs better in this market place. As we enter 2013, we have listed the following as our most important priorities : Training and Enablement – We will continue to invest more aggressively in training and enabling our partners on newer technologies and alternative sources of revenue generation. We hope that you are part of our partner community in the “Partner connect” programme (www.redingtonvalue.com) and you are attending our weekly webinars conducted by our presales teams.

Dear Partner, The year 2012 has come to a close. The year gone by was no doubt one of the most challenging periods that our industry has seen in a long time. As we enter 2013, we continue to be cautious yet very optimistic of what the new year holds for us. We, at value division, would like to thank you for your continued patronage during this trying period and also

believe we have come a long way in our ability to serve your needs to your utmost satisfaction. The year 2012 also saw us getting recognised for our efforts from four very distinguished vendors – Avaya, Dell Sonicwall, Red Hat and Trend Micro – as the “Best Distributor” across the MEA region. This recognition is a testimony to the fact that partners believe in Redington Value and we are in a position

For more information, please write to sales.value@redingtongulf.com

2

The ValuePlus Quarterly September 2012

Marketing Services – During the course of 2013, we will launch more marketing services, which will help our partners to market themselves better. We are more than welcoming to suggestions and feedback. Please write in to valueplus@ redingtongulf.com Launch of “Data centre Practice” from Redington value – Very soon, we intend to launch our VSPEX offering in the African markets in conjunction with EMC, Cisco and VMware. Along with this initiative, we

will be launching our “Data centre Practice” in the region, where we will be in a position to consult, help build and deliver data centres – end to end. Opensource community – We will also be more visible in the market with a whole host of “opensource” offerings in the MEA region. Along with Red Hat, Enterprise DB, Acronis and more newer offerings, we will enable a lot of “opensource” opportunities to the partner community to enable them to differentiate themselves in the market place Cloud offerings – We will also bring forward knowhow, relationships, consulting, service and to compliment your presence in the “cloud” space. Watch this sapce! I wish all our partners a great 2013 and much brighter prospects of working together and winning together.

Regards, Ramkumar B. Vice-president Redington Gulf, Value Division


Palo alto networks | interview

Blazing a new trail What kind of opportunities do you see in the Middle East market? This is a very strategic market for us and we are investing heavily here to grow our business. The recent highprofile security breaches in the region have spurred demand for next-generation security technologies and what we offer is a revolutionary technology that is being appreciated by both customers and partners. The market opportunity is on a multiple billions Dollars level per year, which we serve through a 100% channel model. Most firewalls deployed by end users today are based on 15 years plus technology. We believe the current stateful inspection firewalls will become obsolete over the next couple of years and next-generation firewall is the way to go to meet this generation’s network and threat environment.

Karl Driesen, VP EMEA, Palo Alto Networks

Next-gen firewall is emerging as the centre of enterprise security. Palo Alto Networks, which defined this category on their own terms, is bringing new innovations to market. Karl Driesen, VP EMEA, Palo Alto Networks, talks about the strategy for growth in the region and opportunities for its channel partners.

How do you define NGFWs? Palo Alto Networks has pioneered the next generation of network security with its platform that allows enterprises resp. customers to secure their network and safely enable the increasingly complex and rapidly growing number of applications running on their networks. The main principles of the NextGeneration Firewall (NGFW) were developed in 2005 and the first product was launched in 2007. At the core of our platform is its NGFW, which delivers

visibility and control over application, users, and content within the firewall using a highly optimised hardware and software architecture. This platform offers enterprises the ability to identify, control, and safely enable applications while inspecting all content for all threats in real time. The Palo Alto Networks NGFW platform can address a broad range of network security requirements, ranging from the data centre to the network perimeter to the far edges of the enterprise, which includes branch offices and mobile devices. There is a common perception that Palo Alto products are more expensive. Is it because you do everything from ground up on high performance hardware, compared to your competitors who have retro-fitted? To the chagrin of many IT professionals, the industry’s traditional response to new applications and threats has been to add more appliances – each “helping” the firewall with a piece of the network security function. This unsustainable approach has long proven complex and costly, and now appears to be broken – since these firewall helpers either can’t see all of the traffic, rely on the same port- and protocol-based traffic classification that has failed the legacy firewall, or proxy a very limited number of applications (a dozen instead of hundreds or thousands). Given that

For more information, please write to sales.value@redingtongulf.com

January 2013

The ValuePlus Quarterly

3


INTERVIEW | Palo alto networks

enterprises had little choice, most have adopted an array of firewall helpers – resulting in a network security infrastructure that is expensive, difficult to manage, and increasingly ineffective at controlling application or the threats that applications might carry – characteristics proving unacceptable to enterprises today. What is the difference between NGFW and UTM? Are they conceptually the same? As mentioned above, Palo Alto Networks next-generation firewalls enable policy-based visibility and control over applications, users and content using three unique identification technologies: App-ID, User-ID and Content-ID. Due to the fact that the Palo Alto Networks firewall can perform traditional firewall functions, and is also capable of blocking threats and controlling web usage, logical comparisons to Unified Threat Management (UTM) offerings are made. Our firewall is not a UTM. Palo Alto Networks’ next-generation firewalls FIX the problem that is plaguing network security – the inability to identify and control the applications running on enterprise networks. By giving control back to IT in the firewall, many network security band-aids can be removed. The only value proposition a UTM provides is to collapse the traditional (broken) network security infrastructure into a single box as a cost savings mechanism. All in all, UTM solutions are merely attempting to reduce the cost of deployment without addressing the business and security risks presented by the loss of visibility and control over applications, users and

content that IT managers are faced with today. What is WildFire? It’s a cloud-based malwaredetection and analysis service that can detect targeted attacks within 30 minutes. It’s a subscription-based service that allows our customers to monitor zero-day malware attacks and block them. Modern attackers have increasingly turned to targeted and new unknown variants of malware in order sneak past traditional security solutions. To meet this challenge, Palo Alto Networks has developed WildFire, which provides the ability to identify malicious behaviors in executable files by running them in a virtual environment and observing their behaviors. This enables Palo Alto Networks to identify malware quickly and accurately, even if the particular sample of malware has never been seen in the wild before. Once a file is determined to be malicious, WildFire automatically generates signatures for both the infecting malware and the resulting command and control traffic. Signatures are delivered with regular security updates to provide automated in-line protection from these highly advanced threats. Your IT team is provided with a wealth of forensics to see exactly who was targeted, the application used in the delivery and any URLs that played a part in the attack. How do you plan to address virtualisation security? Two months back, we have introduced the first virtualised version our next-gen firewall

For more information, please write to sales.value@redingtongulf.com

4

The ValuePlus Quarterly January 2013

which is a server-based software intended to run on VMware platform. Called VM-series, this new software will allow security managers to set up firewall application-layer controls in virtual machines and overcome the limitation that physical firewall appliances face in virtual environments. Though we are entering the virtualised firewall market, it doesn’t mean we will not stop selling physical application-layer firewalls. In fact, we have recently updated our physical appliance portfolio by new introducing

companies in this market being dedicated to Network Security and is committed to continue to innovate in a market in which the problems customers have to deal with are very daynamic. Given the fact that NGFW is a relatively new technology, how do you plan to create awareness among users and also train your channel to sell this technology? We are in contact with our addressable market on a daily basis. The largest organisations we are in contact with directly, mid size and small companies

“Modern attackers have increasingly turned to targeted and new unknown variants of malware in order sneak past traditional security solutions.” two NGFWs – the PA 3020 and PA 3050, which respectively deliver 2Gbps and4Gbps of throughput. All of our new products are based on an updated OS, PAN OS 5.0. How do you plan to tackle competitors and what differentiates your company? By Innovation. Palo Alto Networks was the first manufacturer bringing NGFW technology to market back in 2007. Two years later, Gartner validated that what we did was setting the pace. Since 2011 we are being considered a technology leader by Gartner per their Magic Quadrant of Enterprise Firewalls. Palo Alto Networks is one of the few

via our value added resellers. In parallel we have dedicated channel teams and distributors educating our channels on an ongoing basis in line with our NextWave Partner program. What is your message to the channel community? Palo Alto Networks is one of the most exciting companies in the tech industry today. We have reinvented firewalls and we have bet everything on it. Our motto is very simple nothing that travels on your network should be invisible to a next-gen firewall. The era of traditional firewalls is very likely to be over and the NGFW market is a long term revenue opportunity with significant profit for the channel community.


Servers that remove the ordinary so your business can be extraordinary HP ProLiant Gen8 e-Series servers. So smart, you’re finally free to grow your business. HP ProLiant Gen8 e-Series servers virtually eliminate tedious, manual tasks that consume time and energy better spent innovating for your business. Built on HP ProActive Insight architecture, these servers are a market breakthrough in performance, reliability, and intelligence—ideal for SMBs. So now you can spend your time being extraordinary.

The power of HP Converged Infrastructure is here.

HP ProLiant DL360e Gen8 servers • Powered by the Intel® Xeon® processor E5-2400 series

HP ProLiant DL380e Gen8 servers • Powered by the Intel® Xeon® processor E5-2400 series

HP ProLiant ML350e Gen8 servers • Powered by the Intel® Xeon® processor E5-2400 series

For more information, please write to sales.value@redingtongulf.com


focus | HP

BYOD BY BYO B YO YO OD BYOD and addressing the penetration of Wi-Fi devices

Can your wired/wireless network handle the bandwidth and security challenges of BYOD Trends? From Wi-Fi smart phones, iPhones, iPads, tablets, to hand held devices, the demand for Wi-Fi access is growing in enterprise settings. Enterprises are adding improved Wi-Fi capabilities, and some are making wireless LANs the primary or default access technology at the edge of the network. To address these trends, HP Wi-Fi solutions part

of HP’s FlexCampus solution provide you with improved service level agreements (SLAs) with “wire-like” service delivery that doubles the number of users per access point and provides you up to 50 percent improvement in performance. Maintaining high-quality wireless sessions for the increasing number of mobile devices that are joining the

For more information, please write to sales.value@redingtongulf.com

6

The ValuePlus Quarterly January 2013

network places a tremendous burden on the network. Without the correct infrastructure in place, a wireless LAN network risks an inconsistent user experience that increases operational complexity and creates gaps in access enforcement and security while constraining budgets and adding headcount to support the network.

A secure Unified Architecture that simplifies your IT administration HP FlexNetwork architecture is the industry’s only unified architecture for the data centre, campus, and the branch. It consists of four interrelated modular building blocks FlexFabric, FlexCampus, FlexBranch, and FlexManagement that are based on open standards


HP | focus

and leverage a set of switch virtualisation technologies that allow enterprises to dramatically simplify the design and operations of their data centre, campus, and branch office networks. FlexCampus, a building block of the FlexNetwork architecture,converges wired and wireless networks to deliver richmediaoptimised, secure, identitybased access to business-critical applications and services. The solution delivers a superior user experience, simplifies network engineering and management, and ensures performance and agility at the network edge to meet today’s business-critical IT initiatives. Enterprises gain a secure and flexible campus LAN infrastructure that delivers voice, video, and other demanding services—whether hosted in corporate data centre or the cloud—to wired or wireless users anywhere on the corporate campus. The unified network access layer delivers a comprehensive unified LAN/WLAN access solution, with unified management, troubleshooting and network analyses (sFlow), and consistent security, policy enforcement and guest access. It offers a clear advantage over any standalone wired or WLAN-only solution with: • Wired-like wireless performance, delivering seamless 802.11n mobile worker connectivity and a consistent rich media experience ensured by QoS and identity-based network access using IEEE 802.1X.

• sFlow sampling of wireless traffic and a single pane-ofglass management tool that enables unified network visibility and monitoring of traffic metrics, including wired and wireless network top talkers, top applications, and network connections. • Intelligent Network Management “Power-Saving” policies for PoE capable switches that can schedule the distribution of voltage to PoE powered devices such as wireless access points for optimum energy savings. • Unified and consistent RADIUS services, security, policy enforcement and a single pane-of-glass management platform that reduces TCO and simplifies the implementation and maintenance of the unified access layer. Single pane-of-glass management with Unified Access and Policy Control Many wireless LAN vendors sell separate equipment, software and tools for wired and wireless environments, placing extra management, costs, and training burdens on enterprises. HP, by contrast, offers integrated wired and wireless networking solutions with HP Intelligent Management Center (IMC) providing “single pane of glass” wired/wireless device management. HP IMC, a unified single-point network management solution provides visibility across the entire enterprise, from wired and wireless networks to physical and virtual environments. It aggregates information from

network devices and services to give visibility into the enterprise from the data centre to the network’s edge. At the network edge it provides seamless wired and wireless infrastructure management, user access policies, and traffic analysis across a mixed environment. IMC’s modular service oriented architecture design allows for the effective integration of traditionally separate management tools, network services, and policy management. This simplifies provisioning

based on a variety of parameters, including identity, device type, device posture, and even time of day. Access rights can also be enforced based on a particular application or service. Users can also be granted access to network resources based on their devices’ IP or MAC addresses e.g. printers, IP phones. IDM fully supports the IEEE 802.1X standard for networkaccess control and also offers a simple guest self-registration portal that leverages HP’s device fingerprinting technology to

“HP IMC, a unified single-point network management solution provides visibility across the entire enterprise, from wired and wireless networks to physical and virtual environments.” and maintenance and reduces the need to train personnel on multiple network management platforms, increasing operational efficiency. IMC’s restful APIs further enables federation with other orchestration tools to deliver single-button provisioning. Enterprises can leverage, HP Identity Driven Manager (IDM), a module to HP unified management solution, to dynamically provision and enforce network security and performance policies based on user, device, location, time, and end-point posture. Users can be assigned automatically into the appropriate virtual LAN (VLAN)

automatically identify users’ mobile devices. This allows enterprises to support BYOD more quickly while reducing administrative burdens. Flexibility to choose how you want information to flow The increase in wireless users and the number of Wi-Fi clients that are being deployed over a wireless LAN, in addition to higher bandwidth applications, have the ability to degrade the overall user experience. HP’s optimised WLAN architecture which is part of the FlexNetwork Architecture, provides customers the choice of either centrally controlling network traffic or distributing network traffic with

For more information, please write to sales.value@redingtongulf.com

January 2013

The ValuePlus Quarterly

7


focus | hp

intelligent access points at the edge of the network. This architecture enables customers to choose how they want to address application delivery, whether centralised or distributed, via the same access point. Having the flexibility to distribute network traffic is important especially when using low-latency applications such as voice traffic. The ability to choose the best distribution model is key to network efficiency, for example voice traffic can be processed at the edge of the network, which is faster than competitive architectures that require the traffic to flow back to a centralised controller before being redistributed. HP set the benchmark for 802.11n performance last year with the launch of the industry’s first three-spatial stream 802.11n dual-radio access points. The HP MSM460 and HP MSM466 dualradio 802.11n APs deliver near gigabit-speed connect rates to Wi-Fi client devices and offer superior range, density, and coverage. These traits add up to unmatched performance and reliability for today’s BYOD onthe-go workforce. The product family also provides a solid foundation for current and future bandwidth-intensive, delay-sensitive applications while preserving full compatibility with legacy 802.11 clients and existing HP wireless controllers. HP differentiators With HP FlexNetwork Architecture, enterprises can support BYOD users’ requirements in a way that is scalable, agile,

In Summary secure, flexible, and consistent,

For more information, please write to sales.value@redingtongulf.com

8

The ValuePlus Quarterly January 2013

Enterprises can leverage HP suite of intelligent wireless networking

devices wired/wireless being introduced no single point ofsolutions failureasand part of a converged campusinto The Influx of Wi-Fi client into the network scalability while reducing TCO.devices being introduced cost-effective network requires thatstrong, the infrastructure and enjoythe a lower operational costs and requires that the networkingof infrastructure can effectively support,security consistent leader in mobility offerings, and the Key differentiators HP infrastructure can • Integrated with security. As anetworking manage and secure these devices on the enterprise network. largest IT provider in the world, HP is helping customers mitigate converged wired and wireless effectively support, manage consistent security and policy For high density enterprise customers HP’s family of three spatial the Wi-Fi challenges of today and tomorrow with HP converged stream MSM460 and 466 access points support more Wi-Fi solution: FlexNetwork infrastructure. and secure these devices on the enforcement across the wired devices, while providing increased range, performance, and • Single pane-of glass enterprise network. and wireless infrastructure. HP network reliability. HP optimized architecture provides flexible management delivering end For high density enterprise Identity Driven Manager (IDM) traffic distribution enhancing network scalability and efficiency. to end network visibility, customers HP’s family of three provides endpoint integrity consistent and unified spatial stream MSM460 and and wired/wireless network management of the entire 466 access points support more security and performance networking portfolio and Wi-Fi devices, while providing policies based on user, device, thousands of third-party increased range, performance, location, time, and endpoint devices. and network reliability. HP posture, to enable bring your • High-performance dual-radio, optimised architecture provides device (BYOD) policies three-spatial-stream indoor flexible traffic distribution • Unified network monitoring and outdoor access points and enhancing network scalability and troubleshooting (sFlow) integrated controller blades and efficiency. for the unified wired/wireless for HP 5400, 8200, 7500, Enterprises can leverage HP access layer 10500 switching chassis, offer suite of intelligent wireless • Open standards-based high availability, redundancy, networking solutions as part implementation andscalability. of a converged wired/wireless • Wired and Wireless IDS/ • Concurrent operation in the campus infrastructure and enjoy IPS delivering full-time 5 GHz band to improve noise a lower operational costs and perimeter scanning and threat immunity (fewer sources of strong, consistent security. As a mitigation with compliance interference) and increase leader in mobility offerings, and reporting to meet heightened channel availability for higher the largest IT provider in the security requirements for PCI, density/high bandwidth world, HP is helping customers HIPAA, SOX, and DOD 1800.2 deployments. mitigate the Wi-Fi challenges compliance 7 • A non-blocking optimised of today and tomorrow with WLAN architecture enables HP converged FlexNetwork Summary optimal application delivery, infrastructure. The Influx of Wi-Fi client


EMC | feature

Accelerate the Virtualisation Journey Cisco Unified Data Center and EMC VSPEX server virtualisation solutions for midsized companies The path to complete IT virtualisation with cloud computing capabilities has three three distinct phases, has three distinct phases, each with its own separate challenges. Phase 1 is characterized by the challenge of identifying a server virtualisation solution that will reduce costs and operating expenses. Phase 2 focuses on the virtualisation of mission-critical applications, and the main challenges in this phase are helping ensure application availability and improving compliance with service-level agreements (SLAs). In Phase 3 the challenge is to deliver business

agility through increased emphasis on end-to-end automation and delivery of IT as a service (ITaaS). Each of these phases can be an obstacle that prevents businesses from advancing toward a virtualisation solution. The Solution: Proven Infrastructure As customers contemplate the transformation of IT, they realize that they need a complete and modular virtualisation solution that is prevalidated. The EMC VSPEX platform provides such a solution. EMC VSPEX can accelerate your organisation’s

journey through the phases of virtualisation with solutions that are designed to scale as your business grows. Designed to provide a simple, efficient, and flexible infrastructure, EMC VSPEX solutions come in a variety of modular configurations to meet the needs of your business no matter whether you have just started or are already on your way toward virtualisation of your infrastructure. EMC VSPEX solutions offer architecture choices and enable faster deployment, greater efficiency, and lower risk.

High Performance The Cisco Unified Data Center is a complete data centre solution that combines computing, networking, security, virtualisation, and management resources in a framework that delivers outstanding performance for physical and virtualised business applications. It is uniquely capable of providing the kind of simplicity, performance, and security that IT departments demand as they transition from physical to virtual and then to cloud environments.

For more information, please write to sales.value@redingtongulf.com

January 2013

The ValuePlus Quarterly

9


rack composed of leading computing, networking, storage, and infrastructure software components on a cho hypervisors through joint partners Cisco and EMC (Figure 1).

feature | emc Figure 1:

Sample VSPEX Solution

ESSENTIALS Challenge Deliver a complete and modular virtualisation solution that is prevalidated. Solution The EMC VSPEX platform accelerates your organisation’s journey through the phases of virtualisation with solutions that are designed to scale as your business grows. High Performance Implement a combined computing, networking, security, virtualisation, and management solution in a framework that delivers outstanding performance for physical and virtualised business applications. Scalable

industry’s highest-density

network fabric for data centre The Cisco Unified Information Computing For More

business applications, delivers System (Cisco UCS)” integrating end-to-end network fabric at half computing, networking, and http://www.cisco.com/go/emc the cost of competitive systems storage resources to provide and with twice the scalability of a unified data centre, is a any competitive alternative. complete data centre solution Cisco Unified Management, that combines computing, a framework of award-winning networking, security, solutions for IT service creation virtualisation, and management and self-service capabilities, solutions in a framework enables IT to operate more that delivers outstanding © 2012 Cisco | EMC. All rights reserved. efficiently and to more quickly performance for physical and offer new services to the virtualised business applications. business. Cisco solutions manage “Cisco UCS” has been shown to and simplify the deployment reduce infrastructure capital and operation of networking, expenditures (CapEx) by 20 to 40 computing, and applications percent and operating expenses and cloud services in the data (OpEx) by up to 40 percent and centre, and they support open, can be deployed more quickly than traditional server platforms. third-party integration with Cisco’s ecosystem of storage, virtualisation, application, and Agile Infrastructure management solution partners. Cisco Unified Fabric, the For more information, please write to sales.value@redingtongulf.com

10

The ValuePlus Quarterly January 2013

VSPEX Offerings from Cisco and EMC Cisco and EMC are offering VSPEX solutions built on the Cisco Unified Data Center infrastructure architecture. In combination with EMC storage solutions, these reference configurations enable flexible solutions that can easily be scaled, optimized for a variety of application workloads, configured for virtual desktop applications, and optimized for mixed application workloads and cloud environments. EMC VSPEX with Cisco Unified Data Center is a validated configuration that delivers a virtualised data centre in a rack composed of leading computing, networking, storage, and infrastructure software components on a choice of hypervisors through joint partners Cisco and EMC.

Scalable The Cisco Unified Data Center is a complete data centre solution that combines computing, networking, security, virtualisation, and management solutions in a scalable framework that delivers outstanding performance for physical and virtualised business applications. Agile Significantly reduces infrastructure capital expenditures (CapEx) and operating expenses (OpEx) with a solution that can be deployed nearly 90 percent more quickly than traditional server platforms.


Cisco | highlight

Delivering IT agility Information technology organisations are in the midst of a major transition. As they move from being cost centres to integrated, strategic parts of the business, IT administrators, managers, and executives are keenly aware of the challenges they face. As IT organisations shift to providing services through an elastic, self-service, pay-as-yougo cloud-computing model, they still must continue to support applications running in bare-metal and virtualised environments. The problems they face include: • Manual assembly: To support every step from server refresh to cloud computing, administrators are still burdened with the

time-consuming, errorprone, manual assembly of server, storage, and networking components into infrastructure that supports applications. • Complex and siloed infrastructure: The infrastructure that results from manual assembly of components is complex and inflexible and does not adapt dynamically to changing workload demands and

business requirements. • Fragmented management: Traditional systems are configured using a collection of individual management tools on discrete management servers that together do not provide an automated, endto- end way to configure both rack and blade servers all the way from firmware revisions to I/O connectivity. • Rack-in-a-box architectures: Most blade systems in

use today incorporate all the supporting network infrastructure and management points that would normally service an entire rack. As the infrastructure is scaled, cost and complexity escalates. • Multiple switching layers: Typical virtualised environments include hypervisor-based software switches, blade-serverresident switches, and access-

For more information, please write to sales.value@redingtongulf.com

January 2013

The ValuePlus Quarterly

11


highlight | cisco

IT Agility Delivered: Unified Fabric layer switches, often each one having unique features and management interfaces. Multiple switching layers make network traffic even more difficult to observe, manage, and debug in virtualised environments. While the pace of most industries has been accelerated through the use of standardised components and automation, traditional environments require numerous administrators rushing to configure new servers to keep up with the scale that virtual environments demand. Changing the Way Organisations Do Business The Cisco Unified Computing System (Cisco UCS) changes the way organisations do business through policybased automation and standardization of IT processes. The industry’s first unified data centre platform, Cisco UCS combines industry-standard x86- architecture blade and rack servers, networking, and enterprise-class management into a single system. The system’s configuration is entirely programmable using unified, model-based management to simplify, and accelerate deployment of enterprise-class applications and services running in baremetal, virtualised, and cloudcomputing environments. A unified I/O infrastructure uses a high-bandwidth, lowlatency unified fabric to support networking, storage I/O, and management traffic.

The Cisco Fabric Extender Technology (FEX Technology) directly connects the fabric to servers and virtual machines for increased performance, security, and manageability. Unified Fabric Cisco UCS is designed with a unified fabric that condenses three network types—IP, storage, and management—into one. This “wire-once” philosophy means that the system is wired only once, when it is installed, with bandwidth allocations and I/O configurations managed dynamically through the system’s embedded management features. Since all servers are physically wired with the same 10 Gigabit Ethernet and Fibre Channel over Ethernet (FCoE) network, they all can host the same workloads simply by changing configurations through software. This “zero-touch” approach increases business agility because connectivity is uniform, and therefore hardware configurations no longer limit the applications that can be supported. The use of a single network technology reduces rack-level infrastructure costs by up to two-thirds by eliminating discrete Fibre Channel, interprocess communication, and management networks. Transparency with Cisco Virtual Interface Cards Inside each server, Cisco virtual interface cards (VICs) can make the unified fabric’s existence completely transparent by presenting both Ethernet

For more information, please write to sales.value@redingtongulf.com

12

The ValuePlus Quarterly January 2013

Unified Fabric Yields Massive Infrastructure Reduction Traditional rack and blade server environments use separate infrastructure for IP, storage, and management networks, resulting in a massive number of cables, I/O interfaces, and upstream switch ports to support the servers. Total number of network cables in this example: 138. Traditional Blade and Rack Servers

Cisco’s unified fabric carries IP, storage, and management traffic over a single infrastructure, reducing cost and complexity while establishing uniform I/O connectivity to each server. Total number of network cables in this example: 60. Cisco UCS

ActiveInternal model t availabi appear the data hierarch

Unified Cisco in increas externa fabric in 6200 S network bandwi

© 2011–

network interface cards (NICs) and Fibre Channel host bus adapters (HBAs) to the host operating system or hypervisor. This approach facilitates the use of existing drivers, management tools, and data centre best practices. The

fabric interconnects can pass storage traffic onto native Fibre Channel SANs and can connect directly to FCoE-capable storage systems. The standards-based, highbandwidth, low-latency unified fabric is supported by up to two


cisco | highlight

Cisco fabric interconnects, that provide cut-through switching and lossless handling of FCoE traffic for faithful support of Fibre Channel protocols. The fabric has sufficiently low latency to fully support interprocess communication mechanisms that are essential for applications, including highperformance computing, highfrequency trading applications, and parallel database management systems.

unified fabric into Cisco UCS through a modular approach that offers increased investment protection. Customers have already been able to increase the system’s external Fibre Channel connection speed from 4 Gbps to 8 Gbps simply by upgrading a single fabric interconnect component. Today, customers can use the universal ports on Cisco UCS 6200 Series Fabric Extenders to connect any port to 10 Gigabit Ethernet or

Cisco FEX Technology helps organisations maintain existing administrator roles as they transition from bare-metal to virtualised to cloud-computing environments. Active-Active Model with Fabric Failover Internally, the fabric interconnects support three independent networks through an active-active model that allows available bandwidth to be more fully utilized. Fabric failover supports continuous availability even in the event of a single fabric interconnect loss. Externally, the fabric interconnects appear as the system itself. This LAN-safe approach simplifies integration of the system into the data centre fabric, in contrast to traditional systems which increase complexity by adding a hierarchy of switches to handle IP, storage, and management networking. Unified I/O Means Investment Protection Cisco integrates the

native Fibre Channel networks or to directly connect to FCoE storage devices—all while achieving up to 160 Gbps of bandwidth per server. Cisco Fabric Extender Technology Traditional blade servers replicate all of a typical rack’s components inside each chassis, escalating customer costs. These chassis host six devices: two Ethernet and two Fibre Channel switches plus two management modules. In Cisco UCS, a single pair of fabric extenders bring the management and data plane of the fabric interconnects to the blade chassis or server rack, condensing up to three network layers into one. The entire system becomes a distributed, virtual blade chassis that incorporates a full range of blade and

rack server products able to handle any workload. The integrated system efficiently and consistently manages all network traffic at a single point. Cisco FEX Technology decouples complexity from capacity, enabling Cisco UCS to scale more gracefully and at lower cost. Directly Connecting Network Fabric to Servers and Virtual Machines Through Cisco VICs, Cisco FEX Technology brings the network directly to servers and virtual machines using the same technology. These connections terminate in the fabric interconnects as virtual ports that are managed exactly the same way as physical ports. This design combines the performance and management of physical networks with the scalability of virtual networks. Cisco UCS brings exceptional visibility and control over virtual environments, an essential characteristic for scalable, secure, and manageable cloudcomputing environments. • Cisco fabric extenders directly connect fabric interconnect ports to blade and rack servers. These low-cost, lowpower-consuming devices pass all management and data traffic to the fabric interconnects for consistent, centralized management. When used in a top-of-rack configuration, Cisco Nexus 2232PP 10GE Fabric Extenders aggregate in-rack cabling so that only a few uplink cables need to be connected when a new rack of servers is rolled into the data centre. Blade

chassis are connected directly to the fabric interconnects with only one set of cables supporting management, IP, and storage networks. • Cisco VICs directly connect fabric interconnects to hypervisors, operating systems, and virtual machines. Cisco Data Center Virtual Machine Fabric Extender (VM-FEX) technology directly connects fabric interconnect ports to virtual machines without hypervisor intervention. Virtual NICs are attached to virtual machines, and their network profiles remain constant even as virtual machines are moved from server to server to balance workloads, enhancing mobility and security. Passing all traffic through the fabric interconnects results in consistent latency for I/O traffic between virtual machines. Eliminating the need for hypervisor-based switches can increase network throughput by as much as 38 percent, while making more CPU cycles available to deliver greater application performance. Cisco FEX Technology helps organisations maintain existing administrator roles as they transition from baremetal to virtualised to cloudcomputing environments. Because the network remains always in the domain of network administrators, Cisco FEX Technology eliminates the overlap of server and network administrator roles that often occurs with traditional blade chassis.

For more information, please write to sales.value@redingtongulf.com

January 2013

The ValuePlus Quarterly

13


opinion | checkpoint

Anti-DDoS protection Check Point’s DDoS Protector line of appliances are intended for use in the enterprise networks, and thwart Denial of Service attacks in seconds with customised, multi-layered protection that blocks a wide range of attacks. The new Check Point anti-DDoS line is being offered as seven different appliances in two basic form factors, a two-rack unit and a one-rack unit. In today’s threat landscape, “Denial of Service (DoS)” attacks are increasing in number, speed and complexity. Denial of Service and Distributed Denial of Service (DDoS) attacks are relatively easy to carry out, and can cause serious damage to companies who rely on web services to operate. Multiple (more than 50) DDoS attack “toolkits” are readily available on the Internet, and an increasing number of attacks are initiated in over 230 countries. DDoS attacks are often profit-driven: in 2011, cyber criminals earned a whopping $12.5 billion dollars. 2012 shows an alarming surge of DDoS threats to the financial services industry. However hacktivisim and political motivations are fast becoming the most popular forum to launch Denial of Service attacks. Anonymous successfully spearheaded numerous attack campaigns against individuals, organisations, governments and countries in retaliation for actions or statements they didn’t agree with. Many DDoS solutions are deployed by an Internet Service Provider, offering generic

protections against network layer attacks. However today’s DDoS attacks have become more sophisticated, launching multiple attacks at networks and applications. Successful DDoS solutions will offer companies the ability to customize their protec¬tions to meet changing security needs, fast response time during an attack, and a choice of deployment options. OVERVIEW Check Point’s new DDoS Protector keeps businesses running with multi-layered, customizable protections and 12Gbps performance that automatically defends against network flood and application layer attacks for fast response time against today’s sophisticated denial of service attacks. DDoS Protector appliances offer flexible deployment options to easily protect any size business, and integrated security management for realtime traffic analysis and threat management intelligence for advanced protection against DDoS attacks. Check Point also

For more information, please write to sales.value@redingtongulf.com

14

The ValuePlus Quarterly January 2013

provides dedicated 24/7 support and resources to ensure up-tothe-minute protections. MULTI-LAYERED PROTECTIONS Network and Traffic Flood Protections Protection against DDoS attacks aimed at networks using: Behavioral DoS—Protects against TCP, UDP, ICMP, IGMP and Fragment DDoS attacks with adaptive behavioral based detection. DoS Shield—Protects against known DDoS attack tools with pre-defined and customized filters to block rate-limits per pattern. Syn Protection—Blocks SYNspoofed DoS with SYN rate thresholds per protected servers. Black List—Blocks generic attacks with L3 and L4 source-destination classifications and expiration rules. Connection Rate Limit—Blocks generic, non-supported protocols (non DNS, HTTP) and application level flood attacks with ratebased thresholds. Application Based Dos/Ddos Protections Protects against more complex

DDoS attacks that misuse application resources with: SYN Protection with Web Challenge—Protects against HTTP connection-based DoS attacks with SYN rate threshold per protected server. Behavioral DNS Protections—Block DNS query DoS attacks with DNS adaptive behavioral based detection using DNS footprint blocking rate limits and DNS challenge and response. Behavioral HTTP Protections (The “HTTP Mitigator”)—Blocks HTTP connection-based DoS attacks and upstream HTTP bandwidth attacks with server-based HTTP adaptive behavioral detection, HTTP footprint with web challenge response, 302 redirect and JS challenge actions. Directed Application Dos/DDoS Protections Repels Dos and DDoS attacks that require special filtering criteria. Flexible filtering definitions search for specific content patterns in each packet. Enables the ability to analyze and block ongoing attacks by defining on-the-fly protections.


checkpoint | opinion

Datasheet: Check Point DDoS Protector

KEY FEATURES

SPECIFICATIONS DDoS Protector Model

506

1006

Network Grade

2006

3006

4412

Enterprise

8412

12412

Datacenter

Performance 1 Capacity 2

500Mbps

1Gbps

2Gbps

3Gbps

4Gbps

8Gbps

Throughput 3

500Mbps

1Gbps

2Gbps

3Gbps

4Gbps

8Gbps

12Gbps

Max Concurrent Sessions

2,000,000

2,000,000

2,000,000

2,000,000

4,000,000

4,000,000

4,000,000

Max DDoS Flood Attack prevention rate (packets per second)

1,000,000

1,000,000

1,000,000

1,000,000

10,000,000

10,000,000

10,000,000

14Gbps

<60 micro seconds

Latency Real-time Signatures

Detect and protect against attacks in less than 18 seconds

Inspection Ports 10/100/1000 Copper Ethernet

4

4

4

4

8

8

8

GbE (SFP)

2

2

2

2

4

4

4

10GbE (XFP)

-

-

-

-

4

4

4

Management Ports 10/100/1000 Copper Ethernet

2

2

2

2

2

2

2

RS-232

1

1

1

1

1

1

1

Operation Mode Network Operation

Transparent L2 Forwarding

Deployment Modes

In-line; span port monitoring; copy port monitoring; local out-of-path; out-of-path mitigation

Tunneling protocols support

VLAN Tagging, L2TP, MPLS, GRE, GTP

IPv6

Support IPv6 networks and block IPv6 attacks

Policy Action

Block and Report; Report Only

Block Actions

Drop packet, reset (source, destination, both), suspend (source, src port, destination, dest port or any combination); Challenge-Response for HTTP and DNS attacks

High Availability Fail-open / Fail-close

SKU 1

Internal fail-open/fail-close for copper ports; internal fail-close for SFP ports; optional fail-open for SFP ports 4 CPAP-DP506

Internal fail-open/fail-close for copper ports; internal fail-close for SFP and XFP ports; optional fail-open for SFP and SFP ports 5

CPAP-DP1006 CPAP-DP2006 CPAP-DP3006 CPAP-DP4412 CPAP-DP8412 CPAP-DP12412

Actual performance figures may change per network configuration, traffic type, etc.

Capacity is measured as maximum traffic forwarding whenfield no security are configured Alerting forprofiles instant visibility into MANAGEMENT Throughput is measured with behavioral protections and signature protections using eCommerce protection profile SNMP V1, 2C and 3, Log File, of log records over DDoS Appliances are integrated External fiber fail-open switch with SFP ports is available atbillions additional cost External fiber fail-open switches with SFP or XFP ports are available at additional cost Syslog, Email multiple time periods and with Check Point Security Configuration domains. Management, including: SmartEvent: Unified security event SmartView Tracker: Comprehensive SNMP, V1, 2C, 3, HTTP, HTTPS, SSH, Telnet, SOAP, API, Console and analysis solution that delivers auditing solution to troubleshoot (user selectable). system and security issues, gather real-time threat management information for legal or audit information to instantly stop Time Synchronization purposes, and generate reports to threats and block attacks with ©2012 Check Point Software Technologies Ltd. All rights reserved. Based on Network Protocol analyze network traffic patterns. on-the-fly protections. Move from Classification: [Protected] Time - All rights reserved | 3 (NTP). In the case of an attack or other business view to forensics in just suspicious network activity, use three clicks. SmartLog: Advanced log analyzer SmartView Tracker to temporarily Export Real-Time Signature Information or permanently terminate that delivers proactive security Northbound XML interface connections from specific IP intelligence with split-second exports behavioral parameters. addresses. search results from any log

2 3 4 5

• Protects against known and unknown DDoS attacks • Defends against both network and application attacks • Flexible filter engines detect and prevent malicious exploits • Protects against HTTP attacks • Protects against bandwidth flood attacks • Fast, customized signature creation keeps businesses running

KEY BENEFITS • Protection against evolving DDoS attacks to minimize business impacts • Advanced techniques help maintain web services during an attack • Turn-key appliance works right out of the box • Integrated with Check Point security management for greater visibility and control • High-performing DDoS solution with 14Gbps capacity and 12Gpbs throughput • Multi-layered protection blocks multiple attack types • Customized protections fit different business sizes and security needs • Flexible deployment options include on-site installation or through your ISP

For more information, please write to sales.value@redingtongulf.com

January 2013

The ValuePlus Quarterly

15


Did I just send that file to the wrong person? Check Point DLP prevents data breaches before they occur Have you ever accidentally sent an email to the wrong person or attached a document that wasn’t meant to be shared?

Check Point makes DLP work by combining technology and processes to move businesses from passive detection to prevention, before data breaches occur.

PREVENT data loss

EDUCATE users

ENFORCE

data policies

For more information, write to sales.value@redingtongulf.com

©2010 Check Point Software Technologies Ltd. All rights reserved. Check Point, the Check Point logo, and Check Point Endpoint Security Full Disk Encryption are trademarks or registered trademarks of Check Point Software Technologies Ltd. or its affiliates.


tripp lite | IN DEPTH

Powered up

Vipin Sharma, VP - Middle east, turkey, cis and africa, tripp lite

Tripp Lite PowerVerter APS DC-to-AC inverter/ chargers offer reliable alternative power sources for backup, mobile, emergency and remote power applications, Vipin Sharma, VP - Middle East, Turkey, CIS and Africa, Tripp Lite, gives the low down. What does an inverter/charger do? Inverter/chargers provide mobile power and backup power for generators and other AC power sources. They are especially useful in areas where the utility power grid is unreliable or unavailable. When an AC source is available, the Inverter/Charger

conditions AC power before passing it to your equipment and simultaneously charges your user-supplied batteries. Built-in battery backup, surge suppression, noise filtering and regulated output voltage protect your equipment, your data and your productivity.

If an AC source is not available (during power failures, at remote sites, while driving or when your generator is turned off), the Inverter/ Charger automatically switches to battery power and your equipment continues to operate without interruption. If an AC source becomes available, the Inverter/Charger automatically switches back to passing AC power to your equipment and recharges your batteries. Inverter/chargers also provide stable output voltage to protect your equipment and help it perform at its peak. When the AC power source generates voltages too high or too low for safe operation, the Inverter/ Charger acts as an intermediary, correcting unsafe voltage levels before AC power reaches your equipment. Models with automatic voltage regulation are able to correct voltages without switching to battery, preserving battery backup runtime and reducing battery wear. Inverter/ chargers also correct output frequency, allowing sensitive equipment such as computers and electronics to operate without malfunction. When Inverter/chargers operate from battery power, the AC output is strictly controlled by a microprocessor to provide your equipment with clean, safe, reliable power at all times. Why should one select an inverter/charger? The primary reason to choose one is to handle peak power requirements. Many tools, appliances and printers require brief bursts of power that

exceed their continuous wattage ratings, either at startup, during use or both. Inverter/chargers temporarily provide extra output power to handle these “peak surge� demands without shutting down. For example, the DoubleBoost feature from Tripp Lite delivers up to 200% output for up to 10 seconds, and the OverPower feature delivers up to 150% output for up to 60 minutes. By providing ample reserve power to support heavyduty startup and usage demands, Inverter/chargers can support a much wider range of equipment and applications. Preserving your batteries is another reason. An advanced 3-stage charger recharges your batteries faster than conventional chargers, while protecting batteries against over-charge and overdischarge. A charge conservation setting preserves battery power by automatically shutting off the inverter in the absence of any power demand from connected equipment. When in use, all models operate with high efficiency, extending battery backup runtime. Runtime is also determined by the number and size of user-supplied batteries connected to the inverter/ charger. Since you can connect as many batteries as you want, runtime can be tailored to match any application. Inverter/chargers also offer a cleaner and greener backup power. With no fumes, fuel or excess noise, it is a better option for applications where generators would be hazardous such as indoors or inside a vehicle or too loud such as residential areas or outdoor areas during quiet hours.

For more information, please write to sales.value@redingtongulf.com

January 2013

The ValuePlus Quarterly

17


tripp lite | IN DEPTH They’re also ideal for backing up generators with a more reliable source of power for uninterrupted equipment operation. It is important to note that inverter/chargers consume no fuel as it draws power from your AC source and battery system instead. Generators require frequent, costly trips to the pump. Inverter/ chargers can also store power while your generator is running, allowing you to turn it off to conserve fuel without turning off your equipment. Further, inverter/chargers produce stable, microprocessorcontrolled voltage and frequency to help your equipment perform at its peak. Generators can compromise the reliability of your equipment by producing

Charger. Equipment wattages are often listed on nameplates or in manuals. If your equipment is rated in amps, multiply by the AC voltage to estimate wattage. For example, 1,3 amps × 230 volts = 300 watts. If your AC source suffers from frequent voltage fluctuations, consider models with automatic voltage regulation (AVR). AVR corrects voltages without draining battery power, preserving runtime and reducing battery wear. AVR is very useful for conditioning generator sources. If you are powering computers, network equipment or other sensitive electronics, consider models with fast transfer times (from AC source to battery) and pure sine wave output for maximum compatibility.

Also, Inverter/chargers function as UPS systems, providing surge suppression, line noise filtering, voltage correction, frequency regulation and battery backup power. overvoltages, frequency variations and surges. Using an Inverter/ Charger between the generator and your equipment conditions the generator output to keep your equipment safe. Less maintenance is another added benefit as inverter/chargers provide years of worry-free operation without requiring maintenance. Generators require frequent maintenance and parts replacement, increasing expense and waste. What should you keep in mind while choosing inverter/charger? To avoid overloads, the total wattage of connected equipment must be lower than the continuous wattage rating of the Inverter/

How do you go about selecting batteries? Select a battery or battery system that will provide the Inverter/ Charger with the correct DC voltage and an Amp-Hour capacity that provides adequate runtime for your application. The first step is to determine total wattage requirement. After finding the wattage ratings of the equipment that you will connect to the Inverter/Charger, add them together. The next step is to determine DC amps required. For this, divide the total wattage required (from Step 1) by the battery system voltage to determine the DC amps required. The step 3 is to estimate battery amp-hour capacity required.

For more information, please write to sales.value@redingtongulf.com

18

The ValuePlus Quarterly January 2013

Multiply the DC amps required (from Step 2) by the runtime required—the estimated number of hours you need to operate your equipment before recharging your batteries. Multiply this number by 1,2 to allow for inefficiency. This will give you a rough estimate of how many Amp Hours of battery capacity you need. Keep in mind that runtime varies with load characteristics, temperature, battery condition and other factors. Then the final step is to estimate battery recharge time. Divide the battery capacity (from Step 3) by the Inverter/Charger’s charger capacity to estimate the time required to recharge your batteries completely. What can you use inverter/ chargers for? It can be used to provide reliable backup power for all business and residential applications. In areas with limited or unreliable access to ongrid power sources, Inverter/chargers store power to be used when the on-grid source is unavailable. They also make irregular utility power and generator output safer for your equipment. Also, Inverter/chargers function as UPS systems, providing surge suppression, line noise filtering, voltage correction, frequency regulation and battery backup power. They also convert generator output to computer-grade power safe for use with computers, network equipment and other sensitive electronics. Models with faster transfer times and pure sine wave output are ideal for maximum compatibility and system availability. Inverter/chargers support point-of-sale equipment, ATMs, kiosks and back-office systems, keeping retail locations productive, avoiding lost sales and protecting important data, and provide reliable backup power to security systems,

cameras and alarms, ensuring continued functionality during blackouts and other power problems. It can be used to provide mobile backup power for vital equipment in ambulances and other emergency and service vehicles, keeping them fully operational in any location. Renewable Energy is another application as inverter/chargers store power generated by solar panels, wind turbines and other renewable energy systems, ensuring that backup power will be available during nongenerational periods such as night time hours. Inverter/chargers provide reliable battery backup power when generators break down or run out of fuel. They also act as intermediaries, providing surge suppression, line noise filtering, voltage correction and frequency regulation to make generator output safer and more compatible with your equipment. In the area of telecommunications, inverter/ chargers provide reliable backup power for telecommunications equipment in remote GSM network sites, VoIP systems and traditional PBX systems. They also make irregular utility power and generator output safer for your sensitive telecom equipment. Models with faster transfer times and pure sine wave output are ideal for maximum compatibility and system availability. In remote sites using generators, Inverter/chargers make generator power safer for your equipment and provide reliable backup AC power when generators break down or run out of fuel. In sites using solar panels and other renewable AC sources, Inverter/chargers store power for use at night or during other non-generational periods to keep equipment operating around the clock.


S

tripp lite | IN DEPTH F

E

A

T

U

R

E

F

O

C

U

S

F

E

A

T

U

R

E

F

O

C

U

S

F

E

A

T

U

R

E

F

O

C

U

PowerVerter APS DC-to-AC Inverter/Chargers

M

Q

Q

K F

G

D

B

K

A N

J

B

L H

APSX700HF

I

K

A

B J H A

M L

L

A

N

G

H

O

I

C E

L

A H

R S

I

C E D

O

D F

F G

K M P Q

B M H A

G

APSINT2424

L APSINT2012

B J H A

M

G

M

APSX750 Similar Model: APSX1250

K

C E D F

B J

J

M

C

I C E D F

K

I C E D

APSINT3636VR

N

L

APSX6048VR Similar Model: APSX3024SW

Medical-Grade Inverter/Charger Pure Sine Wave Output

Durable Metal Case

Internal Isolation Transformer

Mounting Hardware Kit

Remote User Interface

UserReplaceable Battery Module

PowerAlert Data-Saving Software

C14 Inlet Fan Fast Transfer Time HCRK-INT C13 Outlet IEC 60601-1 • IEC 62040

USB Port

SPECIFICATIONS

Focus onContinuous features Peak

Nominal Nominalalso indicate conditioned AC power to your your batteries. They AC Output Nominal AC Input Battery Unit Shipping Output AC Voltage/ DC Voltage Voltage/ AC Input Charger equipment Transfer TimewhenDimensions Output available. Weight whether the connected equipment A) AC Outlets or(A) Hardwire AC Model Rating Outlets Frequency (Range) Frequency Connector Capacity (AC to Battery) (G) Rating (B) (H x W x D) (kg) load exceeds the continuous output I) Configuration DIP Switches Output PowerVerter Terminals APS Inverter/Chargers (C) (F) 230V / 50Hz 12Vof (10-15V) 230V / 50Hz 10A Use the ½ cycle 70 x 138 x 323 2,4 kg 1 400W C14 Inlet APSX700HF the700W 1 C13 DIP switches to mm change rating the Inverter/Charger. Connect outlets or terminals to 230V / 50Hz 12V (10-15V) 230V / 50Hz ½ cycle 178 x 222 x 229 mm 9,1 kg 750W 1 500W C14 Inlet (F) 20A or 5A (E) APSX750 2 C13 (C) (E) Inverter/Charger’s settings 230V / 50Hz 12V (10-15V) 230V / 50Hz ½ cycle 178 x 222 x 229 mm 11,8 kg 1 250W equipment, 2 500W E) Remote Control Jack C14 Inlet(F) 30A or 7,5Athe your compatible outlet APSX1250 2 C13 (C) 1 cycle 178 x 216 x 356 mm 20,9 kg 2 000W 4 000W Hardwire 230V / 50Hz 12V (10-15V) 230V / 50Hz Hardwire APSINT2012 60A or 15A (E) operation for your Connect the jack an optional strip, power2 400W distribution unit 4 800W Hardwireor 230V / 50Hz 24V (20-30V) 230Vto / 50Hz Hardwire 30A and optimise 1 cycle 184 x 216 x 413 mm 19,1 kg APSINT2424 3 600W 7 200W Hardwire 230V / 50Hz 36V (30-45V) 230V / 50Hz Hardwire 1 cycle 178 x 216 x 356 mm 28,6 kg APSINT3636VR panel. Remote Control Module (model 30A application. electrical PowerVerter APS Inverter/Chargers with Pure Sine Wave Output (E) Resettable Breakers sold separately) to enable B) Operating Mode6 000W Switch 24V (20-30V) 230V / Hardwire 254 x 229 x 318 mm 39,5 kg 3 000W Hardwire 230V /APSRM4, 90A or 22,5AJ) ½ or 1 cycle (E) Circuit APSX3024SW 50Hz or 60Hz (E) 50Hz or 60Hz (E) K) Polycarbonate or Metal remote monitoring and control. Inverter/Charger models have an (E) Durable (E) 6 000W 12 000W Hardwire 208V or 230V / 48V (42-60V) 208V or 230V / Hardwire 90A or 22,5A 254 x 229 x 495 mm 56,7 kg APSX6048VR ½ or 1 cycle 50Hz or 60Hz 50Hz or 60Hz (E) Case F) (E)Battery Conservation Dial operating mode switch with three Medical-Grade Inverter/Charger (Complies with IEC 60601-1 and IEC 62040. Includes Isolation Transformer, 90 Amp-Hour Battery Module, Remote, USB Port and Pure Sine Wave Output.) (F) (H) Mounting Feet/ The dial sets the load settings: “Auto”, Only” 12A L) Integrated ¼ cycle 300W “Charge 300W 230V / 50Hz 12V (10-15V) 230V / 50Hzlevel 89 x 152 x 292 mm 7,3 kg (H) HCRK-INT 1 C13 C14 at Inletwhich 178 x 216 x 368 mm (I) 30,4 kg (I) Flanges the inverter shuts off to conserve and “Off”. Inverter models have an PowerVerter Inverters (Inverters provide mobile AC power derived from your vehicle’s battery. They do not include a battery charger.) 12V (10-15V) N/A N/A M) Cooling N/A 375W 600W 1 Universal (D) 230V / 50Hz PVINT375 switch. Fan51 x 108 x 197 mm 1,1 kg battery power. N/A On/Off 12V (10-15V) N/A N/A N/A N/A 70 x 126 x 208 mm 2,5 kg 700W 1 400W 1 Universal (D) 230V / 50Hz PVX700

S

frequent voltage fluctuations. P) Pure Sine Wave Ouput Select Inverter/Charger models include pure sine wave output from battery, making them ideal for supporting the most sensitive electronic equipment, including servers, networking and telecommunications equipment. Q) Fast Transfer Time from AC Source to Battery Inverter/Charger models with a fast transfer time (½ cycle) are better for supporting computers and network equipment. The fast transfer time ensures that sensitive electronic equipment loads will not be dropped when switching from the AC source to battery power during a power failure. R) Remote Battery Temperature Sensor The sensor increases the operational lifespan of your batteries by adjusting the charging level based on battery temperature. S) Remote Generator Controller The remote generator controller automatically starts or stops your generator to keep your batteries at an optimal charge level. Low Battery Alarm (internal, not shown) Automatically detects low battery voltage and shuts down the inverter to prevent battery depletion/damage. Overload Alarm (internal, not shown) Automatically detects output overloads and shuts down the inverter to prevent damage.

Online Selector Guide

Find the perfect Inverter/ N) Grounding Lug G) DC Input Terminals C) Battery Level LEDs (A) Maximum output power available only when connected batteries are properly charged. (B) Peak output level and duration varies with model, battery condition, charge level, ambient temperature and other factors. Peak output duration for Inverter models is instantaneous. (C) Includes an adapter that converts a C13 outlet to a universal outlet compatible with more than 20 plug types, including most household plugs worldwide. (D) Compatible with more Charger or Inverter for your O) Automatic Voltage Regulation The terminals connect to your The LEDs indicate the approximate than 20 plug types, including most household plugs worldwide. (E) User-selectable. (F) C14 inlet connects to user-supplied input power cord with a region-specific plug. APSX750 and APSX1250 include a detachable 2-meter C13to-C14 power cord. (G) 1/2 cycle = 10 milliseconds at 50Hz (nominal). 1 cycle = 20 milliseconds at 50Hz (nominal). (H) Power module. (I) Battery module. application! Go to Select Inverter/Charger models batteries with user-supplied charge level—High/ Medium/Low— 7 www.tripplite.com/selectors For additional product specifications and the most recent updates, go to www.tripplite.com. can correct abnormal voltages cabling. of connected batteries. and use Tripp Lite’s dynamic without draining battery power, H) AC Inlet or Hardwire Terminals D) Operation LEDs Selector Guide to choose the making them ideal for supporting Connect the inlet or terminals to The LEDs indicate whether the features you want and see equipment powered by generators your AC power source to charge Inverter/Charger is supplying matches instantly! and other AC sources that experience connected batteries and pass power from an AC source or from For more information, please write to sales.value@redingtongulf.com

January 2013

The ValuePlus Quarterly

19


Redington Value Channel Events

1

2

1. Fortinet Launch Event in Nigeria on 9th October 2012 2. Siemens Partner Road Show in Qatar on 19th December 2012 3. Tripp Lite Product Road Show in Al Khobar on 28th November 2012 4. EMC RUSH Event in Ethiopia on 16th October 2012 5. Avaya Partner Launch in Ghana on 22nd November 2012

3

4

5


Breathe easy. Partner with Redington Value. Redington Value is an end-to-end value-added distributor in Middle East and Africa. It assists value-added resellers with most optimal IT solutions across technology domains such as Unified Communications, Virtualization and Cloud Computing, Converged Infrastructure, End-to-end security, Mobility Solutions, Power Solutions, Cabling Solutions, Storage, Back-up and Recovery. They are also supported with in-house pre-sales expertise and regular sales/technical training and programs. For more information, contact sales.value@redingtongulf.com Some recent recognitions:

Avaya

Distributor of the Year 2012

Dell SonicWall

Distributor of the Year 2012

Red Hat

Value Added Distributor of the Year 2012

Redington Value is a value-added distributor for the following brands in parts of Middle East and Africa:

Trend Micro

Distributor of the Year 2012



Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.