July Issue 2019

Page 1

PLUS

Fortinet Recomended again in SD-WAN Group Test Report /16 www.smechannels.com

India’s leading IT magazine for channel business VOLUME 10 | ISSUE 05 | PAGES 40 | JULY 2019 | RS. 20/-

SME CHAT  /18

SME CHAT  /24

Amit Mehta: Dell Emerges as a Leader in the Data Storage Market

LOGINRADIUS: LoginRadius simplifies Customer Identity Management..

CASE STUDY   /33 Matrix: Simplifies TimeAttendance Management for Tata Institute of Social Sciences (TISS)

IBM

PARTNER PROGRAMME

REDEFINES THE SECURITY LANDSCAPE In its journey in the Cybersecurity market, IBM is building up its Partner Programme to stand out from its competitors. The strength of the IBM Partner Programme is resulting in a consistent increase in partner participation for IBM p....20

1


10

th PARTNERS RECOGNITION

SUMMIT AND AWARDS 2019 T H E M E

“GROWTH OF THE PARTNERS IN THE DIGITAL TRANSFORMATION ERA”

MEET 200 SOLUTION

PARTNERS 20TH & 21ST SEP 2019 Le Meridien, Goa

BLOCK YOUR CALENDAR

FOR MORE INFORMATION, WRITE TO sanjay@accentinfomedia.com, sanjib@accentinfomedia.com EVENT BY

ORGANISED BY


PLUS

Dell Technologies Expand Their Data Protection www.smechannels.com

India’s leading IT magazine for channel business SME CHAT

/18 AMIT MEHTA,: Dell Emerges

SME CHAT

as a Leader in the Data Storage Market

simplifies Customer Identity Management..

CASE STUDY /33 MATRIX SIMPLIFIES TIMEATTENDANCE MANAGEMENT FOR TATA INSTITUTE OF SOCIAL SCIENCES (TISS)

/24 LOGINRADIUS: LoginRadius

MY EXPERIENCE EDITORIAL

TIME TO GIVE BACK TO THE INDUSTRY

SANJAY MOHAPATRA

sanjay@smechannels.com

Hello Friends You will be happy to know that the second half of the year is going to be fantastic for us as we have embarked upon a lot of events. One of them is CIO500, which is about connecting 500 decision makers of the industry who are responsible for purchasing of Rs.1250 crore IT assets from the industry. This event is going to be for three days in Delhi NCR in the month of October. This is grand in a sense as this is going to be the first and only event in the APAC region which will have 500 CIOs under one roof for three days. Of course, we will treat the CIOs of various age groups and experiences differently. Similarly, it will have various knowledge and interactive sessions for the CIOs to take back. Besides this flagship event, we are also organizing a 4 city CISO event series to update the market about the latest trends and challenges in the Cyber Security market. We have picked up all the metro cities including Mumbai, Delhi, Bangalore and Kolkata. Out of these cities, we have already done event in Bangalore, which turned out to be a good experience for us. Similarly, we have another 3 cities to go. In these four cities we are not only engaging the security professionals from morning 10:00 to evening 10:00 in serious discussions and presentations but also awarding them with CyberSentinel Awards 2019 for their contributions to the Industry. The third large event that we are committed is the Super 100 Awards for the channel partners in the month of September. This event is going to happen in Goa, Le Meridian. Like every year, we are also engaging the partners who have a turnover threshold of Rs10 crore. These partners need to be modern in their intent and action. They should have adopted cloud computing as part of their business, they should also have invested resources for cloud computing. Plus, they should have natural knack to invest in the byproducts of cloud computing too including BI & Analytics, DC, Security, etc. Last but not the list, we are also organizing a large CMO event in Mumbai, where we would invite and award 100 CMOs across IT industry. We would also invite Top of the line CMOs in various industries of IT industry. Along with the CMOs we will also invite IIM professors and other people who matter to the CMOs, etc. All these things we are doing in the second half of the year because we think, India has finally settled down under the Prime Minister Modi. So, keep tracking our events and be active in social media to get updates. Happy journey!

Alaris E1000 Series Scanners RECENTLY BUYERS LAB (BLI) has selected the Alaris E1000 Series Scanner as winner of the Summer 2019 Pick award for Outstanding Scanner for SMBs. Easy to set-up and integrate with existing business processes and applications – from network to Cloud – the Alaris E1000 Series from Kodak Alaris enables users to scan right out of the box. Productivity-boosting features include the ability to power up and start scanning in less than ten seconds and fast throughput. The devices can scan at speeds up to 25 pages per minute (ppm)/50 images per minute (ipm) and up to 35ppm/70ipm, respectively. The bundled Smart Touch scan utility lets users create scanning shortcuts – complete with image enhancement and document processing settings, plus routing instructions – to streamline and standardize frequently recurring scanning chores.

SPECIFICATION: THE DEVICES CAN SCAN AT SPEEDS UP TO 25 PAGES PER MINUTE (PPM)/50 IMAGES PER MINUTE (IPM) AND UP TO 35PPM/70IPM, RESPECTIVELY. FINAL WORDING: Ideal for SMBs, this product is really priced well. OVERALL RATING

SME CHANNELS JULY 2019

3


contents

Trusted Advisor of Channel Business

VOLUME 10 ISSUE 05

2019

JUL ER COV RY STO

Publisher: Sanjib Mohapatra Editor: Sanjay Mohapatra Sub Editor: Sailza Kumari / Pooja Jain Designer: Ajay Arya Assistant Designer: Rahul Arya Web Designer: Vijay Bakshi Technical Writer: Manas Ranjan Lead Visualizer: DPR Choudhary MARKETING Marketing Manager: Nidhi Sail, Priyanka Circulation and Printing: Rajkumar Hansa SALES CONTACTS Delhi 6/102, Kaushalya Park, Hauz Khas New Delhi-110016 Phone: 91-11-41055458 / 8587835685 sanjeev@smechannels.com Bangalore #28/1, 3rd Floor, Sri Lakshmi Krupa, Near Shamanna Park, Model House Street, Basavanagudi, Bangalore - 560004 Ph. No. +91 88618 21044 Mumbai Tahmeed Ansari 2, Ground Floor, Park Paradise, Kay-Bees CHS. Ltd.,Opp. Green Park, Oshiwara, Andheri (west), Mumbai - 400 053. Ph. +91 22 26338546, Fax +91 22 26395581 Mobile: +91 9967 232424 E-mail: Info@smechannels.com Kolkata S Subhendu BC-286, Laxmi Apartment, Kestopur Kolkata-700101 Phone: 9674804389 EDITORIAL OFFICE Delhi: 6/103, (GF) Kaushalya Park, New

IBM Partner Programme redefines the Security Landscape /20 In its journey in the Cybersecurity market, IBM is building up its Partner Programme to stand out from its competitors. The strength of the IBM Partner Programme is resulting in a consistent increase in partner participation for IBM

Delhi-110016, Phone: 91-11-41657670 / 46151993 info@smechannels.com Bangalore #28/1, 3rd Floor, Sri Lakshmi Krupa, Near Shamanna Park, Model House Street, Basavanagudi, Bangalore - 560004 Ph. No. +91 88618 21044 E-Mail info@ accentinfomedia.com

DESIGNED BY

SME CHAT DELL TECHNOLOGIES

/ 18

“Dell Emerges as a Leader in the Data Storage Market”

Printed, Published and Owned by Sanjib

SME CHAT

Mohapatra

LOGINRADIUS / 24

“LoginRadius simplifies Customer Identity Management.”

CASE STUDY

/ 33

“Matrix Simplifies TimeAttendance Management for Tata Institute of Social Sciences (TISS)”

Place of Publication: 6/101-102, Kaushalya

more inside Editorial~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ 03

Park, Hauz Khas New Delhi-110016

Phone: 91-11-46151993 / 41055458 Printed at Karan Printers, F-29/2, 1st floor, Okhla Industrial Area, Phase-2, New

Snippets~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~ 06

Delhi 110020, India.

Products~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~ 37

All rights reserved. No part of this publication can be reproduced without the prior written permission from the publisher. Subscription: Rs.200 (12 issues) All payments favouring: Accent Info

4

SME CHANNELS JULY 2019

Media Pvt. Ltd.



SNIPPETS PRODUCT | CHANNEL | CONSULTING | SERVICES

for more log on to smechannels.com

Alibaba Group and Yiwu City Government to Establish eWTP Hub Alibaba Group has entered into a strategic collaboration with the municipal government of Yiwu, Zhejiang Province, China to launch an eWTP hub in Yiwu to digitize trade infrastructure and empower new trade flows for the city, which is the world’s largest wholesale market. This collaboration between Alibaba Group and Yiwu will make cross-border e-commerce more accessible to small players in global trade. The eWTP hub, called the Yiwu eWTP Pilot Area, will build on the success of the eWTP hub established in October 2017 in Hangzhou, the capital of China’s Zhejiang Province. With the support of the

Radiant Info Solutions Commissions IT Lab at MTU Imphal The Delhi based leading IT Networking Company Radiant Info Solution, who had recently been in news being signed up by R&M for their North India Regional Distributor, has taken up a major project of supplying, integrating IT Equipment and providing solutions for commissioning IT Labs at the country’s premier Manipur Technical University (MTU) at Imphal.

6

SME CHANNELS JULY 2019

MTU’s Registrar Mr NG Bhogendra, said “We are very impressed with Radiant’s quick delivery & pricing, they are technically sound in providing the solution in good turnaround time.” Talking to newsmen Radiant’s MD, Mr Nishant Gupta said that the company is providing IT resources including all necessary Hardware like UPS, Think Clients, Data Storage for a New

Generation Advanced Grade IT lab. He said that a part of the consignment has already reached the site, while some are on the way. The first phase of the project is expected to cross Rs 40 lakhs and depending upon the influx of students, the supply of various ITEquipment could be increased as and when required, Gupta added.

Zhejiang Provincial Government and experience from the Hangzhou eWTP hub, the Yiwu eWTP hub will use technology to promote innovation in trade and trade finance, establish a smart logistics hub and create greater inclusivity for businesses in Yiwu. “Alibaba and Yiwu both have a long history of enabling small businesses to participate in global trade. While Yiwu brings together buyers from around the world, Alibaba’s platforms also bring together millions of merchants and hundreds of millions of consumers. The synergy of the two ecosystems will create value for our communities of users,” said Daniel Zhang, CEO of Alibaba Group.


Video


SNIPPETS

SITA CELEBRATES 70th Anniversary record with US$1.7 billion revenues More than 100 of the world’s airlines and airports gathered in Belgium this week as SITA, the air transport IT provider, celebrated its 70th anniversary. The organization, which has been at the heart of the airline industry since 1949, marked the occasion by announcing record revenues of US$1.7 billion in 2018. As SITA recorded a significant turning point in its business, it also showcased its commitment to continuous and collaborative innovation. At the company’s Annual General Assembly, SITA’s CEO, Barbara Dalibard outlined its path of growth noting how SITA has remained a vital part of the industry over the past 70 years by continually evolving. Along

with the highest ever revenues, 2018 also marked a turning point for the company as its application-led business overtook its connectivity business. Barbara Dalibard, SITA CEO, said, “We had a very successful 2018 with record revenues of US$1.7 billion and for the first time in our 70-year history, our application business now represents more than 50% of our revenues. This is an important milestone because while connectivity remains a vital part of our business, application growth is a fundamental element of our long-term strategy.”

Ericsson Claims The Highest Data Usage Per Smartphone Lies In India According to the Ericsson Mobility Report, India region has the highest average usage per smartphone, reaching 9.8 gigabytes (GB) per month at the end of 2018. Increased numbers of LTE subscriptions, attractive data plans being offered by service providers, and young people’s changing video viewing habits have driven monthly usage growth. The report also predicts that the total mobile data traffic per month in India is expected to increase at a CAGR of 23 % from 4.6 exabytes (EB) in 2018 to 16 EB by 2024. The total smartphone subscriptions in the region will reach 1.1 billion by 2024 growing at 11 percent CAGR, whereas the total mobile broadband subscriptions in India are expected to grow at CAGR of 13 percent from about 610 million in 2018 to 1.25 billion in 2024. Mobile broadband technologies now make up more than 50 % of subscriptions. As the evolution towards more advanced technologies continues in India, LTE is forecast to represent 82 percent of mobile subscriptions by the end of 2024 compared to 38 percent in 2018.

8

SME CHANNELS JULY 2019

Radware Awarded as ‘WAF and Anti DDoS Vendor of the Year’ at Frost & Sullivan’s 2019 Radware named ‘WAF and Anti DDoS Vendor of the Year’ at Frost & Sullivan’s 2019 India ICT Awards held in New Delhi. Currently in its 17th year, the awards banquet witnessed the participation of leading personalities and companies from the ICT sector and honored companies that created breakthrough business models and strategies through the innovative use of transformative technologies. This year, 41 awards were presented across four categories: Enterprise Infrastructure, Emerging Services, Enterprise Telecom Services and Mobile and Wireless. Congratulating Radware on the award, Benoy CS, Vice President, Digital Transformation Practice, Frost & Sullivan, said, “While most enterprises are talking about strengthening their online presence and investing in next-gen technologies like cloud, digital services, and mobile apps, the risk of a web attack has increased multifold. In today’s environment, where the threat landscape has changed drastically, the need to have a best-in-class WAF (Web Application Firewall) and an Anti DDoS (Distributed Denial of Service) solution cannot be ignored.

MY POINT

“THE FIRST RULE OF ANY TECHNOLOGY USED IN A BUSINESS IS THAT AUTOMATION APPLIED TO AN EFFICIENT OPERATION WILL MAGNIFY THE EFFICIENCY. THE SECOND IS THAT AUTOMATION APPLIED TO AN INEFFICIENT OPERATION WILL MAGNIFY THE INEFFICIENCY.” BILL GATES, CO-FOUNDER OF MICROSOFT CORPORATION

Nutanix Appoints AWS Veteran As MD SalesKNutanix takes onboard veteran IT leader Balakrishnan Anantharaman as its new VP and MD of Sales for India. The announcement is a clear signal of intent from the enterprise cloud OS leader and reaffirms its continued commitment to the country and increasing focus on India’s top tier enterprises. With more than 25 years of IT industry management experience, Balakrishnan is suitably placed to help drive the enterprise cloud OS leader’s growth and ambitions in India and his appointment reaffirms Nutanix’s leadership credentials in the county. His knowledge and insight of the market, enterprise landscape and personalities, as well as a track record for rapidly growing business make him ideally placed to redefine Nutanix’s business in India and drive the enterprise cloud leader’s efforts as it expands its focus to India’s larger enterprises. Speaking on his appointment, Balakrishnan said, “I am delighted to be joining Nutanix at such an exciting time for the company and the industry. When you have built a career on generating growth and then get asked to take a rapidly growing industry leader to an even higher level – you don’t need to stop to think.



SNIPPETS

Time-Attendance Management for Tata Institute of Social Sciences (TISS) Offered By Matrix

Cloud Journey Extended By Global Organizations With VMware At 2019 VMware Cloud Briefing, Vmware highlighted customers Bossa Studios, Rosendin Electric, Stagecoach, Trend Micro, and Zipwhip and how they are addressing their hybrid cloud, multi-cloud and modern apps strategies with VMware Cloud on AWS, CloudHealth by VMware, VMware Secure State, and Wavefront by VMware.

Tata Institute of Social Sciences manages time-attendance of more than 2,000 students and 300 employees at their Mumbai location. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records for the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of students and staff. They needed biometric hardware solution with battery backup along with software compatibility. They wanted a solution that would mark in punch and out punch of students in every lecture and an automated system that would send data to the server. Additionally, TISS also wanted a solution, which can be integrated with third party payroll system for timely salary payment of their staff. Matrix offered a comprehensive Time-Attendance solution for students and staff members. Matrix has installed 54 fingerprint plus RFID Card based terminals with battery backup (COSEC VEGA BBU) at the Mumbai campus. All these devices are connected via LAN with the COSEC CENTRA server installed at TISS, Mumbai.

These companies have seen massive adoption of cloud to power applications during the last decade. Customers are building an architectural approach for technology investments built around cloud factoring in major new developments, including: Hybrid Cloud, Multi-Cloud, Modern Apps. “Our customers are bringing together the worlds of hybrid and native public cloud into a single, comprehensive strategy,” said Kit Colbert, CTO of VMware Cloud, VMware. He also added,“Today, VMware has one of the most proven, most widely deployed portfolios and playing a leading role in driving the next generation of the cloud. We have the unique opportunity to accelerate customers’ cloud journeys by delivering the hybrid cloud, unifying the multi-cloud and building a foundation for modern apps.”

Average Number of Al or ML Projects Deployed Estimated Number of Projects Deployed (Mean) ORGANIZATIONS FORESEE SUBSTANTIAL ACCELERATION IN THEIR ADOPTION OF ARTIFICIAL INTELLIGENCE POWERED APPLICATIONS.

EXECUTIVE MOVEMENT Devendra Kamtekar hired as CEO by DIGISOL Systems.

40

35

Nutanix appoints Balakrishnan Anantharaman as MD Sales.

20 20

Michael McLaughlin joins FICO as Chief Financial Office.

10 4 0 2019

2020

2021

2022

n=57-63 Research Circle Members with Al or ML projects deployed/in use today; excluding ‘unsure’ responses Q. How many projects are deployed/in use today? How many projets do you estimate in... 0-12 months, 12-24 months, 24-36 months? Source: Gartner Al and ML Development Strategies Survey

10 SME CHANNELS JULY 2019

Shayne Higdon appointed as Chief Operating Officer by Forcepoint.



SNIPPETS

Aten Expands To Deeper Markets In India With RP TECH ATEN has announced the appointment of its second national distributor – RP tech India. This appointment comes as part of the expansion plans of ATEN, where they plan to penetrate deeper into the Indian markets with their world class products and solutions. ATEN observes that India is a huge country and they wanted to focus on their customers in every region. RP Tech is a renowned name and has a vast network of partners across all the regions. Their customers will be able to access latest ATEN products and services quicker than earlier. ATEN is looking forward to further strengthen its customer and partner support network through both the national distributors. As part of the plan, ATEN would be periodically training the partners on the latest technologies and solutions to keep them equipped with knowledge and ahead of competition. With this new arrangement with RP tech, ATEN would expand into 750+ towns/cities.

Athenta Technologies Drives Datacenters for an Improved Integrated Infrastructure Management Athenta Technologies, with the motto of “Continued Innovation”, has strived to make significant changes in a few Infrastructures. It has enabled its esteemed customers to control and administer their respective infrastructures with ease and confidence. Following the legacy of the “Make in India” theme, Athenta has produced a product line which is a boon to the Indian Infrastructure. Besides this, Athenta has successfully ventured its operations, internationally. The company has efficiently managed a large Datacenter of an International Airlines for half a decade now. It has conceptualized the best practice by creating “Standard Operating Environments” for various solutions that helps in bringing the costs down, while offering a higher TCO. Athenta DCEYE is a solution which was developed to manage a running Datacenter. It is the only DCIM tool in the world, which helps Datacentres to manage operations, administration and management @ 360°. It starts with assets inventorying, which were stranded in different islands in a large Datacentre, limiting their usability and value. It is a tool that can compute the computational power and electrical power simultaneously to finally address the issue of PUE.

SHARP Hosts Customer Meet in New Delhi

SHARP, a wholly-owned Indian subsidiary of SHARP Corporation, Japan known worldwide for its unique technology products and solutions hosted Customer meet in New Delhi at The Grand Vasant Kunj. During the event, SHARP showcased its latest series of Multi-Functional Printers and 4K Ultra-HD Resolution Commercial LCD Display Line. The main agenda of the Customer Meet was to have a hands-on experience of the product lineup at SHARP Experience Zone and how SHARP can add value based on the customer needs. More than 200 customers were a part of this exclusive meet. Representing SHARP were, Shinji Minatogawa, Managing Director, and Manu Paliwal, President – Business Solution Group, who addressed the attendees about the diversity of the products.

IceWarp Launches New Version of Its Collaboration Suite in India IceWarp, a global messaging and collaboration solutions provider, announced the release of IceWarp 12.2. The new version brings a plethora of enhanced features aimed at further streamlining teamwork. As a highlight, this release includes TeamChat Mobile App, a companion to the proven TeamChat on the web and desktop enabling in-context collaboration in teams. On the instant messaging front, the enhancements in IceWarp 12.2 include more reliable chat sync across multiple users’ devices through the implementation of XMPP Carbons protocol. This ensures that the user always sees exactly the same chat histories on all of their screens, both in the desktop IceWarp and in the mobile IceChat. To optimize email handling, IceWarp 12.2 supports email delegation, both in its web-based interface and in Microsoft Outlook 365 through the updated Outlook Sync. “At IceWarp, we strive to push our boundaries with up-to-date solutions. With the launch of IceWarp 12.2, we aim to provide our customers with the latest cutting-edge technology especially the latest TeamChat Mobile with its email and chat integration will prove to be a much capable alternative to competing collaboration solutions for many of them,” commented Pramod Sharda, CEO - IceWarp India & Middle East.

12 SME CHANNELS JULY 2019

SATATYA MIDR20FL36CWP: Audio enabled compact IP Camera Launched By Matrix Ideal for low light conditions, Matrix Professional series Audio enabled compact IP Cameras are built using superior components such as Sony STARVIS sensor to offer unmatched image quality. This 2MP IR Dome Camera with 3.6mm Lens is Powered by True WDR to offer consistent image quality with built in intelligent analytics including Intrusion Detection, Trip Wire, etc. to ensure real-time security. Additionally, it also provides features like H.265 compression technique and Automatic Motion based Frame Rate Reduction to save bandwidth and storage up to 50%. The model consists of a Dark Observer – Sony STARVIS Series Sensor. It has a Crystal Clear Night Vision, Color Images at 0.08lux. It enables High Efficiency Video Coding – H.265 Compression Technology that saves up to 50% Of Storage Space. The exclusive model is Vision Adaptive, True WDR 120db consisting of best image quality even in Varying Light Conditions. It Captures 90o Horizontal Field of View. The Versatile camera provides Adaptive Streaming.



SNIPPETS

iVALUE Achieves A Milestone – Got Into USD 100 Million Club iValue InfoSolutions has got into the USD 100 Million Club. iValue crossed its net worth over USD 100 million recording YoY growth of 53% CAGR. The key contributors for this growth have been Government, BFSI, ITeS, Telecom and Manufacturing verticals. iValue has been recording its growth at 3X times the market growth rates, gaining market share for the 10th consecutive year. This tremendous growth is being attributed to iValue’s distinctive go-to-market strategy as well as their strong OEM-focused solution approach which entails a singular robust vertical-focused design. The major contributors for this growth include leadingedge technologies like Data Protection and Management solutions, Application and Network performance and optimization solutions, threat protection and Prevention solutions, and Web/email protection solutions including Data Leak Prevention.

Juniper Networks Named as a Leader in Data Center Networking by Gartner

Seagate Technology has announced an exciting extension of its portfolio in India with several new models, including new solid state drive offerings. Seagate offers the data storage solutions that empower users to live their best digital lives in today’s fast-changing data-heavy landscape. According to a recent IDC whitepaper sponsored by Seagate, five billion consumers are currently interacting with data every single day. Seagate’s newest lineup of storage solutions helps consumers level up and manage their data storage needs. They include the Storage Style Icon, Seagate’s premium LaCie brand continues to deliver iconic storage solutions for all design aficionados and creative professional go-getters; Storage for Favorite Memories, Seagate’s Backup Plus is a family of portable external hard drives to help the everyday consumer balance life and provide peace of mind and the World’s First Purpose-Built SSD for NAS.

JULY 2019

Subex announced a partnership with the Town of Florence, Arizona to establish an IoT security lab in Florence. The lab is an extension of the ongoing work that Subex is undertaking in securing the critical public infrastructure of the Town of Florence. The lab will serve to raise awareness on cybersecurity issues for citizens of Florence, lawmakers, businesses and other stakeholders. The lab is comprised of physical and virtual devices, connected networks and systems, and subsystems that raise awareness of various aspects of cybersecurity. It will also enable decision makers, students and city officials to get first-hand experience in these matters and help them use that learning and awareness to promote cybersecurity. The lab will evolve to reflect changes in the threat environment, security practices and strategies, device architecture and network changes and more to stay relevant to all stakeholders.

“It is a time of significant change in our industry, and our focus at Juniper has been helping our enterprise customers navigate the transition to multicloud and beyond. For us, to once again be recognized by Gartner as a leader in the data center space reinforces what we’re already hearing from our customers and partners – that Juniper is the best choice for enterprises looking to simplify multicloud operations. Our vision, coupled with our commitment to engineering simplicity, is the foundation of our work and what sets us apart from our competitors,” said Manoj Leelanivas, Chief Product Officer at Juniper Networks. In April, Juniper also received customer recognition and was designated as a 2019 Gartner Peer Insights Customers’ Choice vendor for Data Center Networking and/or Software Solutions. Based on real feedback from 250 ratings, Juniper earned a 4.7 out of 5 average rating for that market, as of 17 July 2019.

Data Creation Boosted Up By Seagate With Storage Solutions To Fit Any Digital Life

14 SME CHANNELS

IOT Security Lab Set Up By Town Of Florence And Subex In Collaboration

Blackberry Upgraded Its Features To Share Organizational Frameworks BlackBerry announced new features and capabilities for its BlackBerry Enterprise Mobility Suite that provides the trust and interoperability organizations need to share and secure data beyond the boundaries of their enterprise. The latest updates to BlackBerry Enterprise Mobility Suite will help to securely connect both business and consumer applications, allowing employees to instantly collaborate with peers and customers for improved productivity and competitive success. The aim is to extend the modern desktop and creating seamless workflows and content sharing.


SNIPPETS

Research Shows that Connected Devices are now Prevalent in Nearly 40% Households Across the Globe Avast in collaboration with Stanford University, has uncovered that about 40 % of households across the globe now contain at least one IoT device. In North America, that number is almost double, at 66 percent, bringing with it an associated growth in cybersecurity risks. The findings were published in the research paper, “All Things Considered: An Analysis of IoT Devices on Home Networks” presented at the Usenix Security Conference 2019 Avast scanned 83 million IoT devices in 16 million homes worldwide to understand the distribution and security profile of IoT devices by type and manufacturer. “The security community has long discussed the problems associated with emerging IoT devices,” said Zakir Durumeric, Assistant Professor of Computer Science at Stanford.“Unfortunately, these devices have remained hidden behind home routers and we’ve had little large-scale data on the types of devices deployed in actual homes. This data helps us shed light on the global emergence of IoT and types of the security problems present in the devices real users own.”

HP unveils the All New Ultra-Slim and Stylish ProBook 445 G6 Notebook

HP India introduced the powerful and stylish HP ProBook 445 G6 Notebook in India. The new power-packed entrant in the HP commercial portfolio is a lightweight ultra-slim Notebook, powered by latest AMD Ryzen™ processors and built to enhance the productivity of modern businesses. Designed for the modern SMB workforce and other growing businesses, the HP ProBook 445 G6 is best suited to those who are passionate about their business and leveraging technology to save time, seek durability and provide value. The HP ProBook 445 G6 has an ultra-slim chassis with crisp lines, clean edges, and a refined natural silver, anodized aluminum finish which holds the near borderless display. It opens with a 180-degree hinge, a first on the ProBook 400 series, allowing for more ways to collaborate in various work environments through the ‘Lay-Flat’ design.

A Strategic Alliance Announced By Microsoft and ServiceNow GMicrosoft and ServiceNow announced a broader strategic partnership intended to significantly enhance the integration and optimization of the companies’ products, platform and cloud capabilities. Through this expanded partnership, the companies will enable enterprise customers in certain highly regulated industries as well as government customers, to accelerate their digital transformation and drive new levels of insights and innovation. Also, for the first time, ServiceNow will house its full SaaS experience on Azure in addition to its own private cloud. The expanded partnership will elevate ServiceNow to one of Microsoft’s strategic partners in its Global ISV Strategic Alliance Portfolio. The expanded agreement builds on a partnership announced last fall by Microsoft and ServiceNow. As leading enterprise technology platforms, Microsoft and ServiceNow make it easier for customers to integrate and optimize across the two companies’ products and platforms.

SUSE Provides Platform for Cloud-Native, Containerized Applications As businesses are transforming their IT landscapes to support present and future demands, SUSE is providing the foundation for both their traditional and growing containerized workloads with the release of SUSE Linux Enterprise 15 Service Pack 1. Today’s enterprises have multimodal IT infrastructures that run multimodal workloads, and SUSE Linux Enterprise is a bridge between traditional and cloud – the world’s first multimodal operating system that enables enterprises to continually innovate, compete and grow. “SUSE Linux Enterprise is a modern and modular OS that helps simplify multimodal IT, making traditional IT infrastructure efficient and providing an engaging platform for developers,” said Thomas Di Giacomo, SUSE president of Engineering, Product and Innovation.

DIGEST INDIA SERVER MARKET REVENUE DETERIORATES YOY BY 16.2% TO REACH $298 MILLION IN Q1 2019, REPORTS IDC INDIA THE OVERALL SERVER MARKET IN INDIA WITNESSED A YEAR-OVER-YEAR (YOY) DECLINE OF 16.2 PERCENT IN TERMS OF REVENUE TO REACH $298.0 MILLION IN Q1 2019 VERSUS $355.8 MILLION IN Q1 2018, ACCORDING TO THE LATEST IDC ASIA/PACIFIC QUARTERLY SERVER TRACKER, Q1 2019. THE X86 SERVER MARKET ACCOUNTS FOR 88.9 PERCENT OF THE OVERALL SERVER MARKET IN TERMS OF REVENUE. THE CONTRIBUTION TO X86 SERVER MARKET MOSTLY CAME FROM THE PROFESSIONAL SERVICES VERTICAL FOLLOWED BY MANUFACTURING, BANKING, GOVERNMENT AND TELCOS.

MSME CREDIT SHOWS A HEALTHY GROWTH SIGNALLING RAPID REVIVAL 12.4% YOY THE SIXTH EDITION OF TRANSUNION CIBIL- SIDBI MSME PULSE REPORT SHOWS CONTINUED GROWTH AT 12.4% YEAR-ON-YEAR (YOY) IN THE QUARTER ENDING MAR’19. TOTAL DEBT IN INDIA HAS INCREASED AT A CAGR OF 13.3% TO REACH THE LEVEL OF INR 253 TRILLION IN A FIVE YEAR PERIOD FROM MAR’15 TO MAR’19. TOTAL DEBT INCLUDES GOVERNMENT DEBT, DEBT OF CORPORATE ENTITIES AND INDIVIDUAL BORROWERS. THE GROWTH IN AGGREGATE DEBT IN THE PAST FOUR YEARS IS POWERED BY A 22% CAGR GROWTH ON LENDING TO INDIVIDUALS (INCLUDING CONSUMER LOAN, BUSINESS LOAN TO INDIVIDUALS AND OTHER LOANS), 13.4% CAGR OF LENDING TO COMMERCIAL ENTITIES (INCLUDING MSME AND CORPORATE ENTITIES) AND A 10.6% OF GOVERNMENT DEBT. THE COMPARATIVELY HIGHER RATE OF INDIVIDUAL LENDING HAS TRANSLATED INTO A MAJOR SHIFT IN THE COMPOSITION OF THE LENDING INDUSTRY IN FAVOUR OF INDIVIDUALS.

VIAVI SERVICES CHINA MOBILE, ACCELERATING 5G COMMERCIALIZATION VIAVI SOLUTIONS ANNOUNCED THAT THE COMPANY HAS PROVIDED INDUSTRY-LEADING 5G WIRELESS AND OPTICAL TEST SOLUTIONS TO CHINA MOBILE, THE WORLD’S LARGEST MOBILE OPERATOR. AS A PREFERRED VENDOR, VIAVI HAS WORKED CLOSELY WITH THE OPERATOR SINCE EARLY 2018 TO TEST THE PERFORMANCE AND CAPABILITY OF NEXT-GENERATION INFRASTRUCTURE TO FURTHER THE COMMERCIAL ADOPTION OF 5G TECHNOLOGY. DURING R&D TEST OF WIRELESS NETWORK EQUIPMENT IN THE 5G PHASE I PROJECT LAUNCHED BY CHINA MOBILE RECENTLY, VIAVI SUPPORTED CHINA MOBILE RESEARCH INSTITUTE (CMRI) IN VALIDATING 5G BASE STATION PERFORMANCE USING THEVIAVI TM500 NETWORK TESTER. THE TM500 IS USED BY NETWORK EQUIPMENT MANUFACTURERS AND SERVICE PROVIDERS WORLDWIDE FOR TESTING COMPLICATED LAB CASES.

SME CHANNELS 15 JULY 2019


SNIPPETS

Fortinet Recomended again in SD-WAN Group Test Report Fortinet announced that for the second year in a row Fortinet received a “Recommended” rating in NSS Labs’ Software-Defined Wide Area Networking (SD-WAN) group test report. Fortinet’s FortiGate Secure SD-WAN was assessed by NSS Labs and was recognized for the strengths like Lowest total cost of ownership (TCO): Reliable high quality of experience for unified communication; Resilient high availability for better user experience and High WAN performance for cloud applications. Rajesh Maurya, Regional VP, India & SAARC, Fortinet said, “Fortinet has uniquely combined bestof-breed SD-WAN and security in one integrated solution for WAN Edge transformation. Similar to last year, this year’s report gives Fortinet a ‘Recommended’ rating in the SD-WAN group test, highlighting that it has the lowest cost of total ownership along with significantly quick zero-touch provisioning for

Citrix Strengthens Channel Presence Citrix announced its expanded presence across the channel ecosystem in India, through the appointment of its third distributor in the region, Savex Technologies. Designed to drive deeper levels of reseller engagement across the region, the expanded distribution network aims to provide better partner access to secure workplaces, networking and cloud solutions, for their businesses and our mutual customers. Commenting on the appointment, Raghuram Krishnan, Director-Partner, Citrix India, said “Citrix is glad to welcome Savex Technologies on board and we are confident that our strategic partnership will enhance our presence in the region and help us reach new markets. Savex Technologies’ expertise makes them a natural fit to offer value-added Citrix solutions and services to our India reseller ecosystem. We look forward to a great partnership with them.” Anil Jagasia – Founder and Chairman, Savex Technologies Pvt Ltd said; “We are pleased to collaborate with a leading technology solutions provider like Citrix and showcase Citrix’s solutions and services to our reseller base. The Citrix portfolio greatly compliments ours, this strategic partnership will enable us to further deliver Citrix technologies into the channel, ultimately supporting our mutual customers and helping to ensure success in this fast-growing market.”

Array Networks: The Leading Player in Aviation Sector in India Array Networks has emerged as the strongest player in Aviation sector in India. Almost 12 percent of Array’s revenue generated is attributed from aviation sector. The other major contributors for Array’s growth this year have been Government, BFSI, Education, Media and Transportation verticals. Array’s hyper converged networking platform AVX has been a game changer in bringing in newer aviation accounts. Due to its versatility Array was able to address critical business needs and use AVX platform for scenarios beyond functions such as next-gen firewalls, application delivery controllers, WAFs, IDS/IPS, DDoS and more. The aviation focused solutions consisted of Hyper converged Networking platform AVX with ADC & WAF. Array’s ADC solution, bridges the gap between enterprise requirements and budgets to cost-effectively improve the performance availability and security especially in the aviation sector where performance agility has utmost importance.

LG Launched Its New innovation as the part of W-Series LG Electronics launched its opulent W-Series smartphone range – W10, W30 and W30Pro in India. Designed and developed, keeping in mind the Indian consumers’ desires and affordability, the series stands apart, offering best-in-class Cameras, Display, Battery, and other features at an unbelievable price. Redefining the standard of smart photography, the W30 and W30Pro boasts an AI triple camera, waterdrop notch display along with a powerful 4000 mAh battery. The W10, W30 and W30Pro will be available on Amazon.in on flash sales starting 3rd July with W10 Priced at INR 8999/-, & W30 at INR 9999/- respectively. The new series flaunts a minimalistic and elegant symmetric design with thin bezels. Powered by a powerful processor, the smartphones are paired with 3/4 GB RAM and 32GB or 64GB of internal storage to run even the most demanding tasks and apps with ease.

16 SME CHANNELS JULY 2019

Reason To Upgrade to the Next Generation of Wi-Fi Router – Wi-Fi 6 Routers A recent report revealed that there are around 3.48 billion Internet users around the world. It indicates that over 41 % of the world’s population is interconnected through via Internet. Installations of Wi-Fi hotspots & increasing usage of smartphones in rural & remote areas have greatly contributed in bridging the gap of connectivity. The existing infrastructure is receiving backlash due to limited Wi-Fi speeds and to boost up the existing speed, an idea is introduced for a much better and faster wireless Internet through Wi-Fi 6. The Wi-Fi 6 delivers super-fast speed along with better coverage and more importantly, has the power and capacity to handle the dozens of devices in the typical congested smart home. Marthesh Nagendra, Country Manager, India & SAARC, NETGEAR comments, “Today, the existing infrastructure is bottlenecked with limited Wi-Fi speeds and to boost up the existing speed, we are introduced to the idea of a much better and faster wireless internet through Wi-Fi 6. The next generation of Wi-Fi technology isn’t just about a simple boost in speed and secure transmission. Its impact will be more nuanced, and we are likely to see its benefits more and more over time.”


SNIPPETS

Avaya: The Winner of 2019 Contact Center Vendor of the Year Avaya Holdings was honored with the 2019 Contact Center Vendor of the Year Award at the Frost & Sullivan 2019 India ICT Awards. The recognition affirms Avaya’s proven expertise and leadership in Contact Center solutions across public, private and hybrid cloud deployments. Avaya’s award comes in no small part off the back of the trust it has garnered among the leading business process outsourcing companies (BPO), running some of the largest contact centers, across the region. “Our relationship with the BPO community is very valuable to us and this award validates our continued commitment and focus to bringing innovative products and experiences to market. Contact centers must evolve to meet constantly changing customer demands. With a team of passionate and dedicated employees and a dynamic network of partners, Avaya will continue to deliver the best in omnichannel customer experience solutions for businesses of all sizes,” said Vishal Agrawal, Managing Director, India and SAARC, Avaya.

HP Neverstop Laser: World’s First Laser Tank Printer Launched By HP HP launches the high-capacity printer, HP Neverstop Laser which is designed to reinvent smart printing technology for businesses in India.The HP Neverstop Laser printer is an entirely new, rapidreload laser printer that enables SMBs to save critical time and cost of business operation, thereby, increasing their productivity. With the advantage of replacing the toner in 15 seconds and reducing common printing interruptions through innovations and digital integration, HP Neverstop Laser gives businesses a competitive edge. It has a printing speed of 20 ppm (A4). Single and dual Laser Toner Reload Kits are also available at competitive pricing, which the customers can use as per their requirements ensuring business continuity. The cost per page starting at 29 paise per page (with the dual laser Toner Reload Kit) offers customers the opportunity to print with a mess free self reload experience. It has been fashioned in an eco-friendly manner with more than 25 % recycled plastic by weight while the toner reload kit is made of 75 % recycled plastic by weight. Key features include its Robust Performance, printing up to 5,000 pages without interruptions, Reload mess-free toner in seconds, Original HP quality and unbelievable savings and Easy mobile scanning, WiFi Direct and printing with HP Smart App.

Quick Heal Technologies Granted US Patent for Anti-Ransomware Technology Quick Heal Technologies has been granted a patent for its ground-breaking Anti-Ransomware Technology by the US Patent and Trademark Office (USPTO). Post the patent approval, Quick Heal has become the first Indian company to indigenously develop and be awarded a patent for anti-ransomware technology. The US patent grant adds to Quick Heal’s 25-year legacy of designing future-ready solutions aimed at providing best-in-class protection against sophisticated cyber-threats to individual users, enterprises and governments. Designed and developed by Quick Heal’s state-of-the-art R&D and innovation center in Pune, the AI-powered Anti-Ransomware Technology further underlines its commitment to delivering the most advanced and innovative security solutions.

Matrix Gains the India Design Mark Award 2019 Matrix bagged the award for it’s new-age access control controller – Matrix COSEC ARGOMatrix recently bagged the prestigious India Design Mark by the India Design Council for it’s new-age access control controller – Matrix COSEC ARGO. The award is given in recognition for excellence in product innovation and design. India Design Mark symbolizes product excellence in form, function, quality, safety, sustainability and innovation and communicates that the product is usable, durable, aesthetically appealing and socially responsible.The India Design Council is affiliated with India’s Ministry of Commerce Industry and is made up of eminent people in academia, design and industry organizations. India Design Mark is initiated in cooperation with Good Design Award, Japan. Through India Design Mark, the India Design Council seeks to inspire Indian manufactures to design remarkable products that enrich the lives of people in India. “This award is a validation of Matrix’s world-class innovation and design capabilities. I thank all our customers and channel partners for their trust in Matrix and congratulate the entire Matrix team for this outstanding achievement. Such recognition would encourage us to work harder towards building world-class technologies and products”, said Ganesh Jivani, MD, Matrix.

Honeywell, Quantum Networks & Schneider Electric on Techday The monthly Techday hosted by Association of System Integrators and Retailersin Technology (ASIRT) offered its Members a diversified flavour of personal wellbeing, innovative business opportunities and a mentorship session on cultivating a positive business growth attitude. The event saw reputed companies like Honeywell, Quantum Networks & Schneider Electric as Co-Sponsors. The first Sponsor session was hosted by Mr. Rakesh Patel, Country Manager – Channel Sales, Solution Business for APC by Schneider Electric, who highlighted the Easy UPS 3S and 3M solutions from their Secure Power Division. The second session was presented by Mr. Sameer Ansari – Channel Sales Manager, and Mr. Kaustubh Mahakal – Solution Architect, West India both of Safety & Productivity Solutions – Honeywell International (I) Pvt. Ltd, who showcased hand-held computers which can operate across iOS, Windows and Android OS. The next presentation for the evening was by Mr. Abhijit Potdar, National Head of Sales, Quantum Networks. Mr. Potdar spoke about their Smart Network Operating System which offers reliability, manageability, security and scalability, creating a strong foundation for the next generation cloud-managed networking.

SME CHANNELS 17 JULY 2019


SME CHAT

AMIT MEHTA DIRECTOR – MODERN DATA CENTRE, DELL TECHNOLOGIES.

DELL EMERGES AS A LEADER IN THE DATA STORAGE MARKET The idea of digital transformation starts with IT transformation, which requires customers to modernize their data centers with infrastructure designed to simplify their data landscape, optimize workloads at any scale and secure an organization’s most valuable asset – data.

What are the various Data Storage Solutions offered by Dell Technologies? To aid businesses in their journey of IT transformation, Dell Technologies offers cutting-edge storage portfolio. At Dell Technologies World 2019, Dell revealed new, modern infrastructure solutions for the IT landscape – from the edge to core data centers to public and private clouds. These latest technologies can deliver the foundation customers need to create, process, transport, store, protect and consume data – wherever it lives. Some of the new storage solutions launched were: • Dell Technologies Cloud- A new set of cloud infrastructure solutions to make hybrid cloud environments simpler to deploy and manage. It combines the power of VMware and Dell EMC infrastructure, removing the cloud complexity by offering consistent infrastructure and operations for IT resources, across public and private clouds and the edge, regardless of location • Dell EMC Unity XT- The next generation of Dell EMC Unity Midrange storage solution which offers up to 2X faster than its predecessor and 67% faster than its closest competitor. In addition, Dell EMC Unity can be a building block for the Dell Technologies Cloud as part of a validated design • Dell EMC Isilon OneFS 8.2- A solution for customers to keep pace with the data deluge in AI use cases. It provides massive scalability, enhanced

18 SME CHANNELS JULY 2019

cloud integration and security to support the most demanding file workloads • Dell EMC Cloud Storage Services: It is an expansion of cloud-enabled infrastructure solutions, which aids enterprises of all sizes to extend their on-premises infrastructure to public cloud for a variety of use cases, including disaster recovery (DR), analytics etc.

leave infrastructure management, troubleshooting and maintenance to VMware, and instead focus on differentiating their business by building innovative applications. They also can take advantage of enterprise-grade data services, security and resiliency, built into the solution, and provision add-on services such as backup, disaster-recovery and bursting capabilities.

Can you brief us about the new Cloud Infrastructure Solutions that Dell Technologies is offering in association with VMware? VMware Cloud on Dell EMC combines Dell EMC VxRail with core technology from VMware, previewed as Project Dimension at VMworld 2018 US. This Dell Technologies Cloud offering enables organizations to consume infrastructure, like a public cloud service, in data center and edge environments. This allows IT organizations to eliminate the need for basic tasks, such as infrastructure management and maintenance, with subscription-based pricing. VMware Cloud on Dell EMC also offers a bi-directional connection to public clouds for application and data portability via a hybrid cloud control plane. Delivered in a Data Center-as-a-Service model for their on-premises environments, VMware Cloud on Dell EMC is co-engineered and delivered by Dell Technologies with the ongoing service fully managed by VMware. This means organizations can

Remember VMware is “First & Best” when deployed with Dell Technologies.. What are the USPs of these solutions? How does it differ from those offered by your competitors? Organizations deploying Dell Technologies Cloud can: • Increase agility – Employ familiar VMware tools to provision, govern, automate and orchestrate applications across multiple cloud deployment options. This gives organizations workload placement flexibility through a single operational hub across public, private and edge clouds, backed by a broad, global network of cloud service providers. • Accelerate innovation – Adopt the simple and quick path to deploy hybrid cloud. With VMware Cloud Foundation now available natively on Dell EMC VxRail, Dell Technologies Cloud Platforms offer the industry’s first jointly engineered, hybrid cloud infrastructure stack


SME CHAT

“THIS DELL TECHNOLOGIES CLOUD OFFERING ENABLES ORGANIZATIONS TO CONSUME INFRASTRUCTURE, LIKE A PUBLIC CLOUD SERVICE, IN DATA CENTER AND EDGE ENVIRONMENTS. THIS ALLOWS IT ORGANIZATIONS TO ELIMINATE THE NEED FOR BASIC TASKS, SUCH AS INFRASTRUCTURE MANAGEMENT AND MAINTENANCE, WITH SUBSCRIPTIONBASED PRICING.” vice levels and deliver on business requirements.

tightly integrated with VMware’s flexible, full stack HCI architecture. Customers also can opt to extend the cloud experience on-premises by deploying Dell EMC VxBlock 1000 converged infrastructure and Dell Technologies validated storage, compute and networking options. • Improve cloud economics – Manage applications seamlessly across various clouds while saving time and cost by eliminating unnecessary application re-platforming. Organizations also can align how they pay for IT with how they do business through a range of options to buy, rent

or consume IT as a service through Dell Financial Services.6 IDC research found that Dell Technologies Cloud can reduce total cost of ownership by up to 47% compared to native public cloud.1 • Help reduce business risk – Enhance confidence in operations through the delivery of IT services backed by built-in security and automated lifecycle management from the cloud vendor enterprises trust with their most critical workloads. Organizations benefit from the experience and trusted solutions of the industry’s top cloud IT infrastructure provider to improve ser-

What market share does Dell Technologies occupy in the Cloud market? According to IDC, Dell EMC ranked #1 with a 27.4% industry share in 2018. In the external storage market, Dell Inc. ranked No.1 in all quarters in 2018, with 24.7% industry share by vendor revenue in Q4. Dell EMC maintained its undisputed leadership in India’s external storage industry by vendor revenue, i.e. nearly 1.5x the nearest competitor. The Indian cloud computing market currently stands at $2.2 billion and is expected to grow to $4 billion by 2020 with an annual growth rate of more than 30% . What are the challenges that you are facing with relation to the Data Centres? A section of our large enterprise customers are in the process of revamping their Data Center strategies and Consolidation is a big part of that. Consolidating from multiple sites to 2 to 3 sites, To read the complete article, log on to www.smechannels.com

SME CHANNELS 19 JULY 2019


COVER STORY

IBM PARTNER PROGRAMME REDEFINES THE SECURITY LANDSCAPE In its journey in the Cybersecurity market, IBM is building up its Partner Programme to stand out from its competitors. The strength of the IBM Partner Programme is resulting in a consistent increase in partner participation for IBM

C

ybercrime is 21st century’s organized crime. 80% of cyberattacks are driven by highly organized crime rings in which data, tools and expertise are widely shared. It is estimated that cybercrime will cost the global economy more than $2 trillion by 2021 and represents what could be the greatest threat

20 SME CHANNELS JULY 2019

to every company in the world. The recently released IBM-Ponemon Institute study reveals that nearly 79 per cent of Indian firms do not have a computer security incident response plan (CSIRP) in place that is applied consistently across operations. The threat scenario shows a significant rise in both the number and sophis-

tication of breaches in this year’s report, which is alarming as it continues to rise in India. The leaders at IBM realize that the market is maturing very fast and the needs are multiplying and good opportunities are available in the plenty. IBM already possesses the technology and the expertise required to have an impact in the


COVER STORY

VAIDYANATHAN IYER, SECURITY SOFTWARE LEADER, IBM INDIA SOUTH/ASIA.

“IBM IS LEADING THE JOURNEY TOWARDS AI AND INTELLIGENT AUTOMATION IN CYBERSECURITY. WE FORESEE BOTH BEING A KEY PRIORITY FOR NOT JUST CISOS BUT THE ENTIRE C-SUITE IN 2019. ENTERPRISES ARE LOOKING AT DRIVING SERVICE AGILITY AND RESILIENCE IN THEIR DIGITAL BUSINESS ALONG WITH DATA-DRIVEN SECURITY INTELLIGENCE WHICH CAN HELP THEM BE PREPARED FOR ANY UNFORESEEN THREATS.”

market. They believe that their partners will play a crucial role in executing the same. “Our plans include expanding and providing additional outcome driven solutions to our large clients, help in adoption of cybersecurity for the startups help move the information security paradigm to the next level in mid-level organizations to support their business strategy. We have simplified our portfolio to help clients in three

strategic areas, strategy and risk, Threat Management/Intelligence and Digital Trust. Further, we are focused on top security needs we hear from our customers around advanced threats, cloud security, mobile and IoT, compliance mandates and addressing the skills shortage in the security space. We are already the largest security provider to the enterprises in India, and we aim to strengthen this position as we drive our security

strategy in 2019,” says VaidyanathanIyer, Security Software Leader, IBM India South/Asia. If one were to take a look at IBM’s partner data for the last year, one would find that IBM’s partners have doubled their number of Specialist and Expert Competencies in IBM technology, and many have embraced new ways of doing business by going to market through third-party marketplaces, embedded solutions, and software-

IBM Partner Programmes • IBM Business Partner Connect is a first of its kind Watson AI-powered engine designed to help partners tap into our global ecosystem to collaborate on client opportunities, develop new business and bring innovative solutions to market. It uses Watson to enable partners with complementary capabilities to find each other, get to market faster and sell more together. • My PartnerWorldis designed to offer a personalizedonboarding and enablement experience, allowing Business Partners to manage their PartnerWorld tools and shortcuts in one place, including My Sales Activity (MySA), the PartnerWorld Console, Co-Marketing Center and Business Partner Connect platform. • New Software Deal Registration gives Business Partners priority access to special bid pricing and is designed to reduce conflict between partners while improving financial outcomes. This is part of IBM’s ongoing transformation efforts started in January 2018 to improve partners’ experience and profitability, including projects around channel pricing, incentives and streamlined resale authorization. • IBM continues to support its partners’transformation journey with enhancements around new routes to market and business models. For partners embedding IBM’s technology into their solutions, IBM has launched an ESA Co-Marketing offering. • A new Managed Services Security Provider program (MSSP) will help the partners build Security practices and deliver solutions in either an embedded or reseller model. IBM has also introduced a Know Your IBM Security Sales Incentive which provides reloadable IBM Rewards debit cards to partners who sell new Security licenses and SaaS.

SME CHANNELS 21 JULY 2019


COVER STORY

as-a-service models. In addition to that, IBM has seen significant momentum in the number of partners building their skills and selling solutions in strategic areas like IBM Security, Cloud, IoT and Watson AI. Perhaps, it is the fact that IBM makes it a point to regularly invest in skilling for their partners, that it has partners choose to approach IBM over

its competitors. IBM’s partner programs like IBM Business Partner Connect, My PartnerWorld, Software Deal Registration, Managed Services Security Provider program are some examples of IBM’s strategies to make the development of their partners a priority. When asked about what kind of partners IBM is looking for, Iyer said, “We are recruiting security

partners across our various security portfolios. We are looking for partners who have reach and scalability. They should have different practice, different service offerings, etc. Further, the focus will be on growth markets specifically Tier 2 cities for the regional partners. Every key tier 2 city will have regional focus partners.”

ANAND V, CEO OF RAKSHA TECHNOLOGIES.

“IBM SECURITY SOLUTIONS PLACE ITSELF ABOVE THE REST. “ As a partner what is your opinion about IBM Security? Unlike the general understanding about IBM being considered as a security organization, we clearly understand that IBM is a leading enterprise security player. IBM security solutions place itself above the rest to take actionable intelligence while handling any security incidents. IBM Security helps clients to create a security immune system to mitigate the modern security threats. What are the USPs of IBM Security? According to us, we think the Brand IBM has a very big advantage which translates Trust. Trust is the key element when it comes to Security. Also, IBM X-Force Exchange which is backed by a big team of experts is a key element of success. The ability to address security threats and create immune system across Mobile, Network, Cloud Infra and having abilities to provide Advance

22 SME CHANNELS JULY 2019

Fraud Detection, Data Protection, Identity & Access Management and Threat Intelligence are the key components. How do you integrate IBM Security solutions within your products? Since Raksha has a legacy of providing security solutions to the Enterprises for the past 19 years and an authorized solution providers for various security brands, we understand only a connected approach to security will help mitigate threats and achieve compliance requirements. We find IBM Security and QRadar has extensive capabilities to connect with various log sources spanning across all the platforms, backed by IBM X- Force for Threat Feeds and Watson empowering security analysts to drive consistent, context-rich investigations with increased analyst efficiency helps our clients with improved security posture.

“IBM CHANNEL PROGRAM IS HIGHLY REWARDING IN COMPARISON WITH THE OTHER INDUSTRY PLAYERS. IT IS VERY HIGHLY PROCESS DRIVEN AND HIGHLY COMPLIANCE ORIENTED. THIS UNBIASED PROCESS DRIVEN APPROACH GIVES A COMFORT OF TIMELY DISBURSEMENTS OF REBATES.”


COVER STORY

ALOK GUPTA, FOUNDER & CEO, PYRAMID CYBER SECURITY & FORENSIC (P) LTD.

“IBM HAS PIONEERED THE USE OF AI AND DEEP LEARNING IN CYBER SECURITY.“ “IBM CHANNEL PROGRAM IS A WELL THOUGHT OUT PROGRAM THAT ENABLES VARIETY OF CHANNEL PARTNERS WITH DIVERSE SKILLS TO GO OUT TO CUSTOMERS AND SELL SOLUTIONS. THE PROGRAM NOT ONLY HELPS ENABLE PARTNER’S TECHNICAL AND SALES TEAMS VIA TRAINING & CERTIFICATIONS IN ARTICULATING THE VALUE PROPOSITION TO THE PROSPECTS AND CLIENTS EFFECTIVELY WHILE PROVIDING MARKETING SUPPORT IN THE FORM OF JOINT EVENTS, EDM, DIGITAL MARKETING AND THEME BASED WORKSHOPS ETC.” As a partner what is your opinion about IBM Security? IBM Security has a comprehensive suite of cyber security products that range from end point protection right up to the cloud security. IBM Security solutions have been designed keeping proactive and predictive protection in mind with strong emphasis on analytics. IBM security is a leading security brand that offers a holistic solution suite which can effectively deal with modern threats and attack vectors which ultimately provides assurance and peace of mind to a CIO/CISO.As a partner we are excited to take IBM Security Solution offerings to our prospects and customers.

What are the USPs of IBM Security? There are several USP’s of IBM Security. First and foremost the products and solutions are designed to address not only today’s threats, issues and problems but making an organisation ready to deal with threats of tomorrow. IBM has pioneered the use AI and deep learning in Cyber Security and their cognitive vision helps them deliver cutting edge solutions to the clients. The products are robust, highly scalable and intuitive for easy adoption and that’s the reason they are in the top of the leadership quadrants and come out winners in several tech reviews and applauded by customer in their testimonials.

How do you integrate IBM Security solutions within your products? Both Pyramid products (Valid8Pro MFA and Qvach SOC) are built on modern architecture and uses latest software technologies & techniques which integrates seamlessly with IBM Qradar, Resilient, i2 and Trusteer etc. using API’s, connectors and scripts. This integration enables log sources, data flows and interfaces to be available to the users in a unified manner without shuffling between islands of applications.

SME CHANNELS 23 JULY 2019


SME CHAT

RAKESH SONI CEO & CO-FOUNDER, LOGINRADIUS

LOGINRADIUS SIMPLIFIES CUSTOMER IDENTITY MANAGEMENT Today, with the increasing market size of Customer Identity management, the number of players in the CIAM has also grown exponentially. CIAM market provides mature data management solutions with standard and deluxe features to support millions of users across every industrial sector.

DEEPAK GUPTA CTO & CO-FOUNDER, LOGINRADIUS What is LoginRadius’ position in the CIAM market space in India and overseas? Customer identity startup, LoginRadius is an industry leader in the CIAM space. The company has been highly recognized by organizations like Gartner, Forrester, KuppingerCole and Computer Weekly. Today, with the increasing market size of Customer Identity management, the number of players in the CIAM has also grown exponentially. CIAM market provides mature data management solutions with standard and deluxe features to support millions of users across every industrial sector. LoginRadius, a world-leading platform in this space serves more than 3,000 businesses with a monthly reach of 1.17 billion users worldwide and over 7.6 billion API calls per month. To mention a few esteemed clients working on their platform are Conde Nast, Viacom, Vogue India, Canadian Broadcasting Corp (CBC), Weather Network, 21st Century Fox, Hydro Ottawa and more. The company has a strong presence in the US and Europe with multiple data support centres. What are the key CIAM solutions and products that LoginRadius offers? How do they set you apart from the competitors? LoginRadius’ key platform features are registration services, adaptive security, integration with

24 SME CHANNELS JULY 2019

“THE LOGINRADIUS CIAM PLATFORM IS DESIGNED WITH SECURITY AS THE HIGHEST PRIORITY, ENSURING THAT CUSTOMER DATA AND IDENTITY ARE PROTECTED WITHOUT SACRIFICING PERFORMANCE, AVAILABILITY, OR SCALABILITY.” third-party applications and customer insights. LoginRadius supports OIDC and thus allows social logins from any conformant provider. Other authentication mechanisms support includes Google Authenticator, mobile apps, mobile biometrics, mobile push, and SMS OTP. LoginRadius features IoT device linking through a REST API, which allows user-to-device permission mapping. The service also supports OAuth2 Device Flow.

LoginRadius’ target customers are in industries with low authentication assurance requirements. Supporting additional authentication methods would make the service stronger. LoginRadius’ service is highly scalable. Overall, the LoginRadius offering is up-and-coming in the CIAM market and deserves evaluation in CIAM RFPs, particularly for those organizations without highsecurity requirements, such as apparel, fashion, retail, and media.


SME CHAT

“AS A PROVIDER OF A FULLY MANAGED CLOUD CIAM SOLUTION, LOGINRADIUS PRIORITIZES GUARANTEED SYSTEM PERFORMANCE. MOST OF OUR CLIENTS ARE GROWING, ESPECIALLY THOSE IN THE MEDIA AND PUBLICATIONS, RETAIL AND CONSUMER, AND TRAVEL AND HOSPITALITY SECTORS, AND LOGINRADIUS RECOGNIZES THE NEED FOR A HIGHLY SCALABLE AND ADAPTABLE PLATFORM THAT CAN GROW WITH THEM.” how it is used, and how it is protected. LoginRadius’s CIAM solution currently hosts and approves all of the most commonly used compliance. Our CIAM platform has built-in security features that protect end-user data, accounts, and digital identities. These security features include encryption in transit, encryption at rest, brute force prevention, multi-factor authentication, risk-based authentication, fraud prevention, and threat detection.

How does LoginRadius deal with the Storage and Security concerns of CIOs? Cybersecurity is no longer just a technical issue, but an existential threat, and organizations want CIOs to manage this major category of business risk. Today, as global cyberattacks increase, Indian companies are aware of the damage that a data breach can do. But India still has a long way to go, especially as it is at the forefront of digital transformation. The challenge is to better inform and balance long-term security and current long-term investments. As digital transformation rapidly transforms the business landscape, customers demand a more personalized experience without increasing the security risks to personal information. This requires more transparency in the data collected,

What are your plans to expand LoginRadius’ market presence in India? LoginRadius has planned to set up its India operations by hiring over 200 technocrats for their Jaipur office by 2020 to capture a $20 billion global market opportunity. Having an ambitious long-term vision to secure the identity of every person on the internet, which is 4.2 billion users and counting, with increasing cybersecurity threats and the need to deliver a modern customer experience, the demand for a cloud-based customer identity platform is growing, to keep up with that growth the brand plan to double headcount in the next 12 months. What challenges has LoginRadius faced in the market as a young startup? Rakesh Soni describes his initial days of the startup as “just an idea and a couple of guys”. LoginRadius soon became a full-fledged Indian project based out of Canada “Once we realized that login is a big problem on the internet we needed to develop a proper product. We developed it, coded and went through multiple rounds of testing which included family and friends as subjects”. In the initial time period, it was very hard for the company to get to consumers because it required massive amounts of trust since it was,

in the end, a security management company. They started off by developing plugins for content management systems like Joomla and WordPress. These micro websites are where they started getting onto businesses. Once 7 to 8 thousand micro websites had started using the LoginRadius service they decided to directly approach consumers. This is when they knew that their idea was going to be something with massive potential. How did LoginRadius overcome those challenges? Today, with an increase in cyber-attacks globally, Indian enterprises have become aware of the damages data leaks can cause. But India still has a long way to go, especially as the country is on the cusp of digital transformation. The challenge lies in making customers more aware and balancing long term security with present term investment. There is immense potential and LoginRadius is keen to be a part of the journey. With the advanced tools and mechanisms, we are ensuring that we are always on the top of our competitions. As a provider of a fully managed cloud CIAM solution, LoginRadius prioritizes guaranteed system performance. Most of our clients are growing, especially those in the media and publications, retail and consumer, and travel and hospitality sectors, and LoginRadius recognizes the need for a highly scalable and adaptable platform that can grow with them. The LoginRadius CIAM platform is designed with security as the highest priority, ensuring that customer data and identity are protected without sacrificing performance, availability, or scalability. With digital transformation rapidly changing the business landscape, customers are demanding more personalized experiences To read the complete article, log on to www.smechannels.com

SME CHANNELS 25 JULY 2019


GUEST TALK

ROLE OF ARTIFICIAL INTELLIGENCE & MACHINE LEARNING IN CYBER SECURITY

SUDIPTA BISWAS, CORE COMMITTEE MEMBER OF INFOSEC.

PROFILE A Graduate Engineer with 32 years industry experience in the domain of Information Technology & Information Security. His past assignments were in Companies like GEC & BHEL. He is an expert in Information System Security Domain with Deep Exposure in Governance, Compliance, and Procedures & Strategies. His Knowledge Covers a wide spectrum with a holistic view on people, process and technology, focusing on Information security, data protection, privacy, incident management and audits. He is certified ISO 27001 Lead Auditor, Ethical Hacker, CIISA & CISP, an active member of DSCI, Kolkata Chapter & NASSCOM & Core Committee member of Infosec Foundatio.

26 SME CHANNELS JULY 2019

Artificial intelligence(AI) and Machine learning(ML) are changing the natural order of things—right from how we work and how the economy runs, to the nature of today’s warfare, communications, privacy protection norms, etc. Classic example of AI is Driver-less Car. While their long-term impact remains uncertain, these technologies are a huge help to cyber security experts as they can be used to quickly identify and analyse possible attacks. Artificial intelligence (AI) is the ability of a computer program or a machine to think, learn and act like a human being. It is also a field of study that tries to make computers smart. The main goal of AI is to enable the development of computer systems that are able to do the things that humans do. AI involves the study of different methods for making computers behave as intelligently as people. It is the concept of making machines capable of performing tasks without human intervention, such as building smart machines. Machine learning (ML) is a subset of AI and is based on the idea of writing computer algorithms that automatically upgrade themselves by discovering patterns in existing data, without being explicitly programmed. It is also used to automatically analyse the way interconnected systems work in order to detect cyber-attacks and limit their damage. The entire processing of ML tools depends on data. The more data an algorithm obtains, the more accurate it becomes and thus, the more effective the results it delivers. The role of machines in cyber security Machine learning and artificial intelligence (AI) are being applied more broadly across industries and applications than ever before, as computing power, data collection and storage capabilities increase. From the cyber security perspective, this means new exploits and weaknesses can quickly be identified and analysed to help mitigate further attacks. The perfect fit Machines are much better and more cost-efficient

than humans when it comes to handling huge amounts of data and performing routine tasks. This is exactly what the cyber security industry needs at the moment, especially with the large number of new threats appearing every day. Most of these new threats can easily be classified under existing families or familiar types of threats. In most cases, spending time looking at each new threat in detail would, in all probability, be a waste of time for a researcher or reverse engineer. Human classification, especially in bulk, will be error-prone due to boredom and distractions. Machines, however, do not mind going through the same routine, over and over, and they perform routine, repetitive tasks much faster and more efficiently than people do. But that doesn’t mean they always get it right. Even with AI, it is necessary to keep an eye on the work to check whether the algorithms are still working within the desired parameters. AI and ML without human interference might drift from the set path. But working in partnership with AI, researchers are relieved of the burden of menial work. The impact of AI and ML The past five years have seen a tremendous rise in the use of AI and ML technologies for enterprises. Most applications can be attributed to advancements in computing power and the evolution of paradigms like distributed computing, Big Data and cloud computing. Early commercial applications of ML were pioneered by technology giants like Google, Amazon and Facebook. These businesses managed to build a store of valuable behavioural data from millions of users. In order to effectively collect, cleanse, organise and analyse their consumer data, these companies built scalable Big Data frameworks and applications which were then open sourced to the world. This helped these frameworks to improve fast and allowed businesses to derive more value from their data. Organisations are already beginning to use AI to bolster cyber security and offer more protection against sophisticated hackers. AI helps


GUEST ARTICLE

by automating complex processes for detecting attacks and reacting to breaches. Machine learning and artificial intelligence (AI) are being applied more broadly across industries and applications than ever before, as computing power, data collection and storage capabilities increase. From the cyber security perspective, this means new exploits and weaknesses can quickly be identified and analysed to help mitigate further attacks. How is Artificial Intelligence being used? In order to detect unusual behaviour on a network, there are newer security technologies that are using Artificial Intelligence programs. AI uses machine learning to detect similarities and differences within a data set and report any anomalies. Machine learning is a part of AI that can help to recognize patterns in data and predict effects based on past experience and data. AI systems, in most of the cases, use machine learning technology to generate results that replicate human functioning. As per an article published in Forbes titled Separating Fact From Fiction: The Role Of Artificial Intelligence In Cybersecurity, ML, coupled with application isolation, prevents the downside of malware execution — isolation eliminates the breach, ensures no data is compromised and that malware does not move laterally onto the network. Another way that cyber-attacks are changing are in terms of speed. Humans are not able to detect the abnormalities at the speed that the attacks happen. AI, however, can assess a huge amount of data generated on a network to identify what doesn’t belong there. AI solutions can work effectively if there are powerful input data, so organizations can start to capture their log data and consolidate into a common data repository so that the broad set of AI-enabled tools and analytics can become effective. There should also be a complete visibility to all aspects of the network, which includes internal network communication, server logs, etc. Security experts are hoping to use predictive analytics to frame new ways to deal with cyber threats. These are insight driven solution enabled with the help of AI. Machine learning can help in anti-malware, performing dynamic risk analysis and detecting anomaly. AI techniques can be made to learn to remove the noise or unwanted data, and facilitate security experts to understand cyber environment for detection of any anomalous activity. AI can also benefit cyber security with automated techniques to generate cyber courses of action (COAs) whenever cyber threats are detected.

It is believed that now is the time to seriously contemplate artificial intelligence for cybersecurity for any business. If you wish to protect your business data against cyber-attacks How AI and machine learning can help prevent cyber attacks AI systems and deep learning algorithms are already helping cybersecurity professionals develop effective solutions to fight against cybercrime. If it weren’t for artificial intelligence and machine learning, the cybersecurity landscape would be very different than it is right now. As cyber threats evolve, and the attacks become more complex and widespread, conventional defense tools are often not enough to detect and stop them on time. Therefore, security solutions that are powered by machine learning are the next big thing in cybersecurity. Thanks to their ability to learn and adapt over time, such tools can promptly eliminate well-known threats, as well as respond to new emerging risks before they do any harm, by recalling and processing data from prior attacks. Another benefit of artificial intelligence is the ability to perform specific tasks on its own, this way saving time and reducing the risk of human error. Unlike people, AI systems don’t make mistakes as they handle threats according to a standardized playbook, this way responding to each threat in the most effective way. With the AI systems on their side, security experts can spend less time performing routine tasks and focus on building a stronger defense that would allow stopping sophisticated cyber-attacks before they even occur. Therefore, implementing machine learning and AI systems is crucial to stay one step ahead of cybercriminals. And yet, no technology is a silver bullet, and AI is just a tool, which can only do what criminals or security experts command it to do. AI and ML may become new paradigms for automation in cybersecurity. They enable predictive analytics to draw statistical inferences to mitigate threats with fewer resources. ... Applications for automated network security include self-encrypting and self-healing drives to protect data and applications. In the current world of data del¬uge, it is nearly impossible for humans alone to analyze the billions of logs generated from the existing infrastruc¬ture components. Integrating AI into the existing systems including Security Monitoring Solutions, SIEM, Intru¬sion Detection Systems, Cryptograph¬ic technologies and Video vigilance systems can help in addressing many of these challenges to a larger extent. Application of

AI based technologies into the existing systems will bring in much enhanced systems that help in better decision making. Some of the key areas where in the functionalities of AI makes a difference are: • Data Mining • Pattern Recognition • Fraud Detection • Analytics • Fuzzy Logic • Development of expert Systems Within the Cyber security sector, these attributes of AI can bring in tre¬mendous benefits, out of which some of them are already in place and there are huge opportunities yet to explore. Machine learning based antivirus sys¬tems and tools can help in quickly and accurately identifying malware like Polymorphic virus based on its con¬tinuous learning capabilities. Such sys¬tems can detect suspicious files based on the behavioural or structural analysis and it helps in detecting threats at an early stage. It can easily determine the likelihood of a malicious virus attack by analysing and breaking down the DNA of each file. Along with AI and ML, another aspect of security which CISOs are concerned about is compliance. Every organization needs to be compliant with numerous regulations and noncompliant to any of these can lead to heavy fines. For example, General Data Protection Regulation (GDPR) which will be a reality in few months can cost €20m or 4% of annual global turnover if the organization is found non-compliant. AI and ML with sup¬port of cognitive computing is ena¬bling the enterprises to keep a track of their compliance status to avoid any legal issues. As the digital world is moving fast, we can expect completely automated Cyber-attacks orchestrated by intelli¬gent machines. These expert systems will have the potential to analyse the DNA of past attack models, strategies and utilize its acquired knowledge for organizing new attack models attacks that have higher success rates and larg¬er impact. As human resources alone won’t be enough to combat this, the need of the hour for global organiza¬tions, Government and defence agen¬cies is to suit up their existing Cyber security and defence environment with AI and its underlying technologies.

To read the complete article, log on to www.smechannels.com

SME CHANNELS 27 JULY 2019


GUEST TALK

RAJESH MAURYA Regional Vice President, India & SAARC, Fortinet.

PROFILE Rajesh Maurya has a rich experience of 24 Years in Information Technology and has held positions in Business Planning, Sales, Marketing, Channel Management as well as Team Management with organizations in Information Security, Network Management & IT Consulting. Rajesh Maurya, has been with Fortinet since 2004 and is has been heading the SAARC region as Regional Vice President since 2014. He has driven Fortinet’s aggressive growth plan in the region, through market penetration and expansion of customer base across verticals and regions. Before joining Fortinet he has worked with Sify Technologies and Microland. Rajesh Holds a MCS & Graduation in Economic & Financial Accounting.

28 SME CHANNELS JULY 2019

FOUR ESSENTIAL CONCEPTS TO SECURE YOUR CLOUD The most important attribute of the cloud is that critical business applications, can be deployed, managed, and distributed faster and easier than by any other method, giving employees and customers real-time access to critical information—wherever they are located and on whatever device they are using. This requires nimble resources that can scale and move, and applications that are simple and intuitive to use, have access to realtime data, and can be quickly updated to meet constantly evolving trends. Likewise, internal workflows across devices—and different clouds—need to be highly available, flexible, and responsive in order to support critical functions and complete transactions. Security is just as critical a component of any cloud environment— especially as cybercriminals look to

exploit the rapidly expanding attack surface. But to be effective, it needs to be as agile and dynamic as the cloud infrastructure being protected. And, it is just as impossible to protect a cloud environment using legacy security solutions as it is to build a cloud using legacy network components and traditional application development strategies. Effective security not only needs to protect connections between data and users, but also secure literally every connection to every physical or virtual device across the distributed infrastructure. Even those that are constantly moving across—and even between—multi-cloud installations. In such an environment, complexities arise from the use of different security solutions, as deploying security solutions that are only available


GUEST ARTICLE

on a single cloud platform may not be available on others, and may have functional limitations. Such deployments have actually imposed limits on the true potential of the cloud. Too many organizations have failed to address this security challenge holistically, often overwhelmed by the scope and scale of the challenge. Four Essential Cloud Security Concepts To address these challenges, organizations need to incorporate the following four security concepts into their cloud development strategies: 1. Security-led cloud development: Security breaches tend to be the result of a determined cybercriminal exploiting the weakest link in an organization’s attack surface. And for many organizations, the adoption of the cloud has expanded their attack surface exponentially. Eliminating those weak links requires security to be enforced consistently everywhere, even when the infrastructure is in a state of constant flux. Because infrastructures are expanding and changing so rapidly, it is essential that an overall security plan become the foundational requirement for any network changes. Mandating that proper security tools, policies, and procedures are in place before any new resources are spun up allows security to adapt in sync with infrastructure and application changes. This requires selecting security with infrastructure and application changes. This requires selecting security tools that understand the infrastructure in which they have been placed, and that can also operate consistently across all environments—including multicloud—to enforce policies and ensure visibility that enables secure applications and connectivity from data center to cloud. Even minor variations in adaptability and enforcement can create security gaps that cybercriminals are all too willing and able to exploit. 2. Cloud-native security: Since data and workflows will need to move throughout the infrastructure and to the cloud, security needs to function consistently. Selecting a cloud firewall from the same vendor that is protecting the organizations physical assets will not necessarily solve that problem. There is a need for these solutions to interact seamlessly with cloud services and subscribe themselves to these services as well as identify cloud based resources in the same logical

way that they identify other resources. That said, the underlying technology used for protecting networks is very different from the tech used for protecting cloud based resources, but the practice of managing security needs to remain similar. That is why native integration into the cloud infrastructure is critical. Compounding this problem is that cloud environments also operate very differently from each other and organizations can often end up with a heterogeneous set of technologies in use, with disparate security controls in various cloud environments. This can create additional challenges for coordinating and enforcing security. In addition to cloud native integration, security tools also need to be able to translate policies on the fly so they are enforced consistently across environments. That requires selecting a vendor with solutions that are natively integrated into as many cloud platforms as possible to ensure consistent security and connectivity from data center to cloud, no matter the cloud infrastructure. 3. Multiple form factors: Consistent security enforcement depends on the same security solutions being deployed across as many platforms and in as many different form factors as possible. Applications, for example, should be able to make calls to a cloud-based security solution to identify and protect specific data and transactions. Container-based applications should have access to containerized security tools in order to easily integrate security functionality into the application chain. And ideally, these tools should be the operated in the exact same way as solutions deployed everywhere across your distributed infrastructure, including at branch offices and edge devices. However, don’t fall into the trap of thinking that a virtual version of your network firewall will be adequate for your cloud or container deployment. As stated previously, each form factor of a solution needs to integrate natively into the environment in which it is placed if you want consistency in enforcement combined with the ability to address the unique challenges of individual ecosystems. 4. Central management: One of the biggest complaints from network administrators is that they cannot see and manage their entire network through a single console that extends visibility across physical and virtual networks. A management solution that can see and close the gates against an attack in one area of the network but

not in another is likely lead to a compromised infrastructure. To eliminate gaps in security enforcement, organizations need a single pane of glass to gain visibility and define consistent security policies throughout the entire infrastructure to effectively manage risk. Security solutions need to share and correlate threat intelligence, receive and implement centrally orchestrated policy and configuration changes, and coordinate all resources to respond to detected threats. Rethink Your Security Traditional security models where devices are placed at a network gateway to monitor predictable traffic and devices are obsolete. Today, security needs to span your distributed infrastructure, dynamically scale when application resources grow, and automatically adapt as the infrastructure continuously adjusts to changing demands. And just as important, it also needs to ensure consistent functionality and policy enforcement regardless of its form factor or where it is deployed. Achieving that may require you to rethink your current security infrastructure. If the cloud is going to play a significant role in the future of your organization, you may be better off finding a single vendor that supports your overall application lifecycle and infrastructure roadmaps and expansion plans—especially a solution that provides consistent protection and functionality across multiple public and private cloud domains, even if that means replacing the traditional security hardware you have deployed on-premise. By leveraging native integration capabilities of a broad protection toolset – which can all be automated and centrally managed are the security foundations necessary to enable uniform policy enforcement, collaborative threat sharing, centralized management and orchestration, and a single view across your entire distributed infrastructure and powers your organization with the confidence to deploy any application on any cloud infrastructure. Without a powerful, integrated, and automated security framework designed to span, grow, and adapt to your entire network, you are flying blind, and today’s aggressive cybercriminals are all too willing and able to exploit that weakness.

SME CHANNELS 29 JULY 2019


GUEST TALK

SUSHOBHAN MUKHERJEE

Chairman- Infosec Foundation & Co-founder and CEO of Prime Infoserv LLP.

PROFILE Sushobhan Mukherjee has 20 years of experience in IT consulting, Technology, process and corporate relationship. He is a cyber-security practitioner and design architect since his stint with all major telecom /IT operators like Tata, Airtel, Sify in India. For last eight years, he has been an entrepreneur and institution builder. He is the Co-founder and CEO of Prime Infoserv LLP, one of the leading Technology Integrator and Infosec consulting Company from eastern India, working with Indian and global brands. Besides he is the chairman for Infosec Foundation, a nonprofit initiative to build cyber security eco system across the globe through community built-up exercise.

30 SME CHANNELS JULY 2019

ZERO TRUST SECURITY – THE EVOLVING CYBER FRAMEWORK Preface Zero trust security is a new buzz word in the cyber space. Initially the model for The Zero Trust Network, or Zero Trust Architecture, was crafted by John Kindervag, a principal analyst at Forrester Research Inc. way back in 2010. Now, in present times, with the increase of data volumes and soposticated cyber-attacks, the pressure of implementing Zero Trust as the technologies is gaining momentum. Zero trust security is an IT security model that requires strict identity verification for every person and device trying to access resources on a private network, regardless sitting inside or outside of the network perimeter. It is a holistic approach for network security that incorporates several different principles and technologies. Traditional IT network security, it is

difficult to gain access from outside the network, whereas everyone inside the network is trusted by default. In effect, once an attacker gains access to the network, they have free reign over everything inside. However, with present trends, enterprises no longer have their data in just one place; rather it is often spread across cloud. This makes the situation more difficult to have a single security control for an entire network. Zero trust security means that no one is trusted by default from inside or outside the network and verification is required from everyone trying to gain access to resources on the network. With the rise of attack sophistication and insider threats, new security measures need to be adopted in order to restrict them from spreading once inside. Traditional security models were meant to


GUEST ARTICLE

protect the perimeter, threats that get inside the network are left invisible, uninspected and free to morph and move wherever they choose to successfully extract sensitive, valuable business data. Zero Trust, rooted in the principle of “never trust, always verify,” is designed to address lateral threat movement within the network by leveraging micro-segmentation and granular perimeters enforcement, based on user, data and location. Lateral movement defines different techniques that attackers use to move through a network in search of valuable assets and data. With traditional perimeter-based security, businesses can define sub-perimeters within their organization networks using a specific set of rules for each using context around user, application traffic direction, etc. These sub-perimeters are designed to identify the spread of an attack within an organization and stop the unrestricted lateral movement throughout the network. Core principles and technologies Zero Trust works on the principle that nothing should be trusted and should always be verified. Within this framework, several technologies and best practices make up a Zero Trust architecture. Here are a few of the main principles: • No Trust, a philosophy behind a zero trust network assumes that there are attackers both within and outside of the network and in effect, no one should be automatically trusted. • Least-privilege access, which means only allowing access to the information someone needs. This reduces pathways typically used by

malware and attackers and reduces the chances of internal data exfiltration. • Micro-segmentation divides a network into separate segments with different access credentials. This increases the means of protection and keeps bad actors from running rampant through the network even if one segment is breached. • Multi-Factor Authentication (MFA) requires two or more ways to prove someone is who they say they are. Using an MFA tool provides reliable identity verification that is necessary for any Zero Trust model. MFA simply means requiring more than one piece of evidence to authenticate a user; just entering a password is not enough to gain access. • Risk-adaptive security controls are necessary in order to analyze human and entity behavior and identify potentially risky activities in near-real time. Gartner calls this Continuous Adaptive Risk and Trust Assessment (CARTA). • Access Control: In addition to controls on user access, zero trust also requires strict controls on device access. Zero trust systems need to monitor how many different devices are trying to access their network and ensure that every device is authorized. This further minimizes the attack surface of the network. The objective • Data Protection: Ensuring all data and resources are accessed securely, based on user and location. The traffic and data flow need to be identified so that it can map the business flows, and in order to have the visibility to the application, users

and flows. Understanding who the users are, what applications they are using and the appropriate connection method is the only way to determine and enforce policy that ensures secure access to your data. • Access Control: Adoption of a least-privileged access strategy and strictly enforce access control. By doing this, businesses can significantly reduce the pathways for attackers and malware. • Introspection: Always all traffics are to be logged and inspected. Effectiveness of the same lies in identification of the appropriate junctions for inspection and build in the inspection points. Security rules, based on business policies, should be used to identify and allow or deny the traffic and activity to move through the “inspection points” gating your sub perimeters. This enables the segmentation of sensitive resources and establishes trust boundaries to help prevent the exfiltration of sensitive data. • More authentication methods to add to counter credential based attacks. • Never trust, always keep adding context and keep your roles up-to-date. The model: Forrester has outlined a roadmap for a successful zero trust implementation. Here is Forrester’s fivestep model, paraphrased: o Identify your sensitive data at rest and in motion g Perform data discovery and classification g Segment and zone the network based on data classification o Map the acceptable routes for sensitive data

SME CHANNELS 31 JULY 2019


GUEST TALK

access and egress g Classify all resources involved in the electronic exchange of sensitive data g Evaluate the workflow of data and redesign, if necessary g Verify the existing workflows, like PCI architectures, and verify designs o Architect zero trust micro perimeters g Define micro perimeters, zones, and segmentation around sensitive data g Enforce segmentation using physical and virtual security controls g Establish access based on these controls and the micro perimeter designs g Automate rule and access policy baselines g Audit and log all access and change control o Monitor the zero trust environment, in detail, with security analytics g Leverage and identify existing security analytics solutions already existing within the organization g Determine the logical architecture and best placement for your security analytics tools g If a new solution is needed, identify a vendor that is moving in the same security direction as your organization and that can provide analytics

and response g Correlate policies and procedures with security analytics automation and determine what can be lifted from manual processes. g Verify the security and implementation of automation within your environment and current solutions

for your other security solutions o Embrace security automation and adaptive response g Translate business process into technology automation g Document, assess, and test security operation center policies and procedures for effectiveness

ment along with Security Orchestration and Automation o Data Loss Prevention (DLP) and User Behavior Analysis (UBA) o Cloud Application Security

32 SME CHANNELS JULY 2019

Implementation Roadmap There can be multiple approaches to the model but there are a few considerations most everyone will need to include in order to implement an efficient Zero Trust architecture: • Consider the technologies you will need to add to your current stack such as: o Next Generation Firewall o Risk-Adaptive Security Tools o Multi-Factor Authentication o Secure Web and Email Gateways o Threat Isolation and Network Sandboxing o Network Forensics and Encrypted Traffic Management o Privileged Access Management or Identity Management o Vulnerability Management o Security information and event manage-

• Adopt Zero Trust Security Best Practices

o Add prioritized cloud technologies to replace unauthenticated legacy services and systems. o Design zero trust architecture based on how data moves across the network, and how users and apps access sensitive information. o Extend identity controls to the endpoint to recognize and validate all devices. Just verifying users is not enough. o Organize users by group/role to support device policies. For more insight on implementing Privileged Identity Management (PIM), read our article here. o Leverage automatic de-provisioning, along with the capacity to wipe, lock and un-enroll stolen or lost devices. o Educate and coach end users to be part of the solution in the new zero trust environment. Otherwise, they will be part of the problem. o Regularly update end user rights based on changes to roles/jobs, as well as changes to prevailing security policies and compliance requirements. • Understand Access Needs – decide who needs access to what in your organization. Remember to grant the least privilege that someone needs and nothing extra.

• Consider Your Culture – at the macro level and at the granular security level a company’s culture will dictate the efficacy of any security model. In the case of Zero Trust where you understand the threats come from outside and within, a supportive and educated workforce is key.


CASE STUDY

MATRIX SIMPLIFIES TIME-ATTENDANCE MANAGEMENT FOR TATA INSTITUTE OF SOCIAL SCIENCES (TISS) location. Initially, they were using traditional methods for attendance marking. As a result, they were facing many problems in maintaining records for the same. Hence, they required an efficient system for maintaining and recording accurate attendance data of students and staff. They needed biometric hardware solution with battery backup along with software compatibility. They wanted a solution that would mark in punch and out punch of students in every lecture and an automated system that would send data to the server. Additionally, TISS also wanted a solution, which can be integrated with third party payroll system for timely salary payment of their staff.

Matrix Offered Solution Project Highlights: Application: Time-Attendance and Employee Self Service Users: 2,300+ Locations: Mumbai Readers: Fingerprint (with Optical Sensor) Industry: Education

After having a detailed discussion with the TISS team, Matrix offered a comprehensive Time-Attendance solution for students and staff members. Matrix has installed 54 fingerprint plus RFID Card based terminals with battery backup (COSEC VEGA BBU) at the Mumbai campus. All these devices are connected via LAN with the COSEC CENTRA server installed at TISS, Mumbai. HR/Admin can track attendance of all the employees and generate different reports for timely salary payment. Similarly, all the faculty members can generate monthly and semester-wise attendance reports of the students.

Results •

Institute Profile The Tata Institute of Social Sciences (TISS) was established in 1936, as the Sir Dorabji Tata Graduate School of Social Work in Mumbai. It is the first graduate school of social work in India. It has subsequently influenced the direction of social work, education and social research in

• • India. Later in 1944, it was renamed as the Tata Institute of Social Sciences.

Business Challenge Tata Institute of Social Sciences wanted to manage time-attendance of more than 2,000 students and 300 employees at their Mumbai

• • • •

Efficient Time-Attendance Management Fraudulent Time Keeping Eliminated Accurate Time-Attendance Data of Students SMS Notification to Parents Timely and Accurate Salary of Employees Increased Productivity Customized Reports as per Requiremet

SME CHANNELS 33 JULY 2019


SECURITY CORNER

YOGENDRA RAJPUT, DIRECTOR, MAPLECLOUD TECH SERVICES

“WHILE THE WHOLE CONCEPT OF GDPR STARTS WITH THE PREMISE THAT THE OWNERSHIP OF DATA MUST BELONG TO THE DATA SUBJECT, THE INDIAN BILL DOES NOT EVEN PROVIDE THAT. THE INDIAN BILL IS A DILUTED VERSION OF GDPR, WITH LESSER POWER FOR THE CITIZENS.”

A COMPLETE GUIDE TO GDPR Everything you need to know about GDPR and what it means for India.

W

HAT AT IS GDPR: General Data Protection Regulation (GDPR) is legislation that will update and unify data privacy laws across the European Union. GDPR was approved by the EU Parliament on April 14, 2016 and goes into effect on May 25, 2018. GDPR replaces the EU Data Protection Directive of 1995. The new directive focuses on keeping businesses more transparent and expanding the privacy rights of data subjects. When a serious data breach has been detected, the company is required by the General Data Protection Regulation to notify all affected people and the supervising authority within 72 hours. Mandates in the General Data Protection Regulation apply

34 SME CHANNELS JULY 2019

to all data produced by EU citizens, whether or not the company collecting the data in question is located within the EU, as well as all people whose data is stored within the EU, whether or not they are actually EU citizens. Under GDPR, companies may not legally process any person’s personally identifiable information without meeting at least one of six conditions. • Express consent of the data subject. • Processing is necessary for the performance of a contract with the data subject or to take steps to enter into a contract. • Processing is necessary for compliance with a legal obligation. • Processing is necessary to protect the vital interests of a data subject or another person.

• Processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in the controller. • Processing is necessary for the purposes of legitimate interests pursued by the controller or a third party, except where such interests are overridden by the interests, rights or freedoms of the data subject. GDPR REQUIREMENTS: Legal & Compliance The GPDR introduces new requirements and challenges for legal and compliance functions. Many organisations will require a Data Protection


SECURITY CORNER

Officer (DPO) who will have a key role in ensuring compliance. If the GDPR is not complied with, organisations will face the heaviest fines yet –up to 4% of global turnover. A renewed emphasis on organisational accountability will require proactive, robust privacy governance, requiring organisations to review how they write privacy policies, to make these easier to understand. Fines of up to 4% of annual global turnover Serious non-compliance could result in fines of up to 4% of annual global turnover, or €20 million –whichever is higher. Enforcement action will extend to countries outside of the EU, where analysis on EU citizens is performed. Data Protection Officers Organisations processing personal data on a large scale will now be required to appoint an independent, adequately qualified Data Protection Officer. This will present a challenge for many medium to large organisations, as individuals with soughtafter skills and experience are currently in short supply. Organisations will also be challenged to demonstrate an independent reporting line, which could cause issues with incumbent positions. Accountability The current requirement to provide annual notifications of processing activities to local regulators will be replaced by significant new requirements around maintenance of audit trails and data journeys. The focus is on organisations having a more proactive, comprehensive view of their data and being able to demonstrate they are compliant with the GDPR requirements. Privacy Notices and Consent Organisations will now consider carefully how they construct their public-facing privacy policies to provide more detailed information. However, it will no longer be good enough to hide behind pages of legalese. In addition, there is a significant shift in the role of consent, with organisations required to obtain ‘freely given, specific, informed and unambiguous’ consent, while being able to demonstrate these criteria have been met. Technology New GDPR requirements will mean changes to the ways in which technologies are designed and managed. Documented privacy risk assessments will be required to deploy major new systems and technologies. Security breaches will have to be notified to regulators within 72 hours, meaning implementation of new or enhanced incident response procedures. The concept of ‘Privacy By

Design has now become enshrined in law, with the Privacy Impact Assessment expected to become commonplace across organisations over the next few years. And organisations will be expected to look more into data masking, pseudo-anonymisation and encryption. Breach Reporting • Breach reporting within 72 hours of detection. Significant data breaches will now have to be reported to regulators and in some circumstances also to the individuals impacted. This means organisations will have to urgently revise their incident management procedures and consider processes for regularly testing, assessing and evaluating their end to end incident management processes. Encryption • The GDPR formally recognises the privacy benefits of encryption, including an exemption from notifying individuals of data breaches when data is encrypted. However, this does not mean that organisations can afford to be complacent, and the exemption may not apply when weak encryption has been used. Given the potential fines, organisations will have to further increase their focus on a robust information and cyber security regime. Online Profiling • Individuals will have new rights to opt out of and object to online profiling and tracking, significantly impacting direct-to-consumer businesses who rely on such techniques to better understand their customers. This applies not just to websites, but also to other digital assets, such as mobile apps, wearable devices, and emerging technologies. Privacy-by-Design The concept of Privacy By Design (PbD) is nothing new, but now it is enshrined in the GDPR. Organisations need to build a mind set that has privacy at the forefront of the design, build and deployment of new technologies. One manifestation of PbDis Data Protection Impact Assessments (DPIA), which are now required to be undertaken for new uses of personal data where the risk to individuals is high. DATA • Individuals and teams tasked with information management will be challenged to provide clearer oversight on data storage, journeys, and lineage. Having a better grasp of what data is collected and where it is stored will make it easier

to comply with new data subject rights –rights to have data deleted and to have it ported to other organisations.

Data Inventories • Organisations will have to take steps to demonstrate they know what data they hold, where it is stored, and who it is shared with, by creating and maintaining an inventory of data processing activities. Data leads will have to work closely with privacy colleagues to ensure all necessary bases are covered. A thorough system for maintaining inventories needs to be implemented. Right to be Forgotten • A new ‘right to be forgotten’ is further evidence of the consumer being in the driving set when it comes to use of their data. Depending on regulatory interpretation, organisations may need to perform wholesale reviews of processes, system architecture, and third party data access controls. In addition, archive media may also need to be reviewed and data deleted. Right to Data Portability • A new right to ‘data portability’ means that individuals are entitled to request copies of their data in a readable and standardised format. The interpretation of this requirement is debatable, but taken broadly the challenges could be numerous – • amongst them achieving clarity on which data needs to be provided, extracting data efficiently, and providing data in an industry-standardised form. New Definitions of Data • The GDPR recognises the concept of pseudoanonymous data and at the same time expands the definition of personal data, placing an greater emphasis on data classification and governance. But it remains unclear if and when certain data, for example IP addresses, will be classed as personal data and subject to requirements. DATA PROTECTION BILL 2018 In year 2017, the Government of India constituted a committee of experts under the chairmanship of former Supreme Court Justice Shri B N Srikrishna to study various issues relating to data protection in India and make specific suggestions on principles to be considered for data protection in India and suggest a draft Data Protection Bill. The committee, formed with the idea to create a powerful data protection law in India, has submitted its draft bill to the Ministry of Electronics and

SME CHANNELS 35 JULY 2019


SECURITY CORNER

Information Technology (MeitY) on 27 July 2018. This submission comes after a year of consultations with various stakeholders. The bill lays down penalties, ranging from five crore rupees or 2% of total global turnover to fifteen crore rupees or 4% of the total global turnover*. It is thus changing the way privacy is perceived and practiced within Indian business. The proposed bill applies to both government and private entities. The applicability of the law will extend to data controllers/fiduciaries or data processors not present within the territory of India, if they carry out processing of personal data in connection with: • Any business carried in India • Systematic offering of good and services to data principles (also generally referred to as data subject) in India • Any activity which involves profiling of data principals within the territory of India. KEY HIGHLIGHTS FOR A DATA FIDUCIARY Grounds for processing personal data include consent, functions of state, compliance with law or order of court/ tribunal, for prompt action in case of emergencies, purposes related to employment or reasonable purposes of the data fiduciary Grounds for processing sensitive personal data include explicit consent, functions of state, compliance with law or order of court/tribunal, for prompt action in case of emergencies for passwords, health data, financial data, official identifiers, genetic data and biometric data Age verification and parental consent is required for processing personal and sensitive personal information of children Transparency and accountability principles such as privacy by design, record keeping, data protection impact assessment and data audits should be undertaken by organizations Organizations will have to appoint a data protection officer as per their processing activities Data breaches have to be reported by data fiduciaries to the authority and based on the gravity of the incident the same has to be notified to the data principal Adequate security controls should be in place: de-identification, encryption, prevention of unauthorized access, misuse, disclosure or destruction Restrictions have been imposed on transfer of personal data outside India for sensitive critical personal data. For other personal data one local copy (mirroring provisions) has to be maintained in India only Organizations will have to build capability to

36 SME CHANNELS JULY 2019

complete data principal rights What should organizations do? Accountability of data protection: Data fiduciaries need to maintain accountability for the personal data they own and assert the responsibility to comply with the personal Data Protection Bill. Organizations need to be transparent and fair in terms of : Privacy governance , Provide a fair and transparent notice , Update the digital presence, Refresh consents, Consent for children , Review data processing activities, Accuracy Data localization and mirroring: Data fiduciaries will need to store at least a copy of the personal data acquired by data principals in India. Additionally, the central government may describe categories of “critical data” which has to be stored only in India. This would require organizations to perform an assessment their data storage practices and maintain servers/ data centres in India, if needed, to fulfil the obligation. Contractual agreements approved by the authority need to be in place for transferring personal data outside India Privacy by design and default:The draft bill proposes that data fiduciaries be obligated to take necessary measures and implement policies to ensure that privacy is embedded in all the systems, applications and architecture at each stage- collection, processing, usage, transmission, storage and disposal. Additionally, it requires data fiduciaries to implement appropriate safeguards to ensure security of the personal data. Data principal rights The personal data protection bill intends to confer controlling power in the hands of the data principles and hence provides them with the right to access and correction, the right to data portability and right to be forgotten. It attempts to provide its citizens with comprehensive data protection rights and create a trust based relationship between the data principal and the data fiduciary Data breach management:The draft bill requires data fiduciaries to inform the data protection authority any personal data breach that is likely to cause harm to any data principal. Failure to notify a breach will make the organization liable to a penalty under the provisions of this bill. Data storage limitations Data fiduciaries need to identify the retention periods for personal data and conduct regular reviews to ascertain the need to retain the personal data.

Enhance security of personal data Every data fiduciary and data processor shall undertake a review of its security safeguards periodically and take appropriate measures accordingly to ensure security of personal data Additional ask for significant data fiduciary The Draft Bill lays down certain additional obligations that apply to a specific class of data fiduciaries conducting high risk processing known as Significant Data Fiduciary. To identify if an organization qualifies to be categorized as a Significant Data Fiduciary, the authority would consider the parameters given in the adjacent figure. Identify if the organization comes under the category of Significant Data Fiduciary according to the parameters defined by the data protection bill, If yes, consider the following: • Register with the data protection authority • Undertake data protection impact assessments (DPIA) for high risk processing • Appoint a data protection officer • Get the privacy policies and the conduct of processing of personal data audited annually by an independent data auditor 8 DIFFERENCES BETWEEN INDIAN DATA PROTECTION BILL AND GDPR! 1. Unlike in GDPR, Indian draft legislation does not require the data fiduciary to share the names and categories of other recipients of the personal data with the data principal. 2. There is no obligation on data fiduciary to share with the data principal for how long the data will be stored while collecting or at any time, as GDPR mandates 3. The data fiduciary does not need to share the source of the personal data to the data principal in case the data has not been collected from him/ her which is an explicit requirement in GDPR 4. Unlike GDPR, there is no requirement that the data fiduciary share with the data principal the existence of automated decision making, including profiling 5. GDPR requires that the data subject (data principal) is provided with a copy of data undergoing processing. The Indian legislation mandates a summary of that data to be shared, with no definition of what that summary is. 6. One of the biggest differences is that in India, a citizen has not been given the right

To read the complete article, log on to www.smechannels.com


REVIEW

PRODUCT

DIGISOL GIGABIT ETHERNET SMART MANAGED POE SWITCH

Designed with SMEs in mind, the DGGS1510PL PoE switch offers the power, flexibility, and stability required to keep complex networks running smoothly. With the increase in usage of IP applications like VoIP phones

DOOR CONTROLLER WITH MULTISPECTRAL FINGERPRINT SENSOR

and IP cameras and WiFi by SMEs, there is a need for an intelligent switch that provides reliable connectivity, high bandwidth and simplifies the network infrastructure. DG-GS1510PL is a next generation Ethernet intelligent access switch with 20Gbps switching capacity. It comes with 8 10/100/ 1000 Base-TX ports and 2 1000 Base-X SFP ports for high speed uplinks to servers or backbones with PoE. The DG-GS1510PL Switch offers 8×10/100/ 1000 Mbps Gigabit Ethernet ports with Power

BY MANAS RANJAN

over Ethernet ports and 2 Uplink SFP ports.

info@smechannels.com

IN THE FAST-PACED EVOLUTION OF TECHNOLOGY, organizations have started adapting the biometric application systems for access control and timeattendance. Compared to the traditional biometric readers scanning a single layer of skin, multispectral biometric attendance system employs multi-layered reading. Matrix COSEC DOOR FMX is a high performance door controller with multispectral sensor technology. It reads surface as well as the subsurface of a finger producing more accurate image even when the finger surface features are distorted or difficult to read due to dirt, usage, age or environment. Powered by a high-speed processor, DOOR FMX is specifically engineered for high security applications including Defense, Airports, R&D Labs, Banks and industries such as Education, Mining, Construction and Heavy Manufacturing for their Access Control and TimeAttendance needs.

These PoE ports are IEEE 802.3af / IEEE

FEATURES

802.3at** compliant and can supply PoE

n Multispectral Sensor with

Power to PoE devices (Max PoE Budget is

Fingerprint Detection

75 Watts). The existing Ethernet cables can

n Supports Fingerprint, RFID Card

be used to power up IEEE 802.3af & IEEE

and PIN n Interactive GUI with 4.3’’ TFT

Capacitive Touch Screen n 5,00,000 Transactions and 50,000 Users

802.3at compliant network devices. This eliminates the need of an external power source and power cabling for such devices. The switch provides flexibility to users for

n PoE, Ethernet, Wi-Fi, 3G/4G

connecting a PoE or non PoE device.

n Seamless Integration with Third

IEEE 802.1w Rapid Spanning Tree Protocol

Party Devices

provides a loop-free network and redundant links to the core network with rapid convergence, to ensure faster recovery from failed

n Price: On request, Warranty: On request, Contact: Call - +91 1800-258-7747

links, enhancing overall network stability and reliability.

n Price: On Request, Warranty: On Request, Contact: 1800 – 209 – 3444

E-Mail: inquiry@matrixcomsec.com / Website: www. MatrixAccessControl.com

SME CHANNELS 37 JULY 2019


PRODUCT

LG HP

HP OMEN X 2S: WORLD’S FIRST DUAL-SCREEN GAMING ‘HP ‘S POWERFUL LINEUP OF OMEN X 2S is the world’s first dual-screen gaming laptop – provides extraordinary power and multitasking capabilities, the OMEN 15 laptops bring exceptional power in their thinnest forms yet, and HP Pavilion Gaming 15 laptop offers outstanding versatility and mobility for gamers and creatives alike. In addition, with enhancements to OMEN Command Center software and new OMEN and HP Pavilion Gaming displays and accessories, HP has engineered an industry-leading gaming ecosystem that delivers everything gamers need to progress and achieve their goals. The inspiration behind the OMEN X 2S 15 was derived from insights and feedback from the OMEN gaming communities.

n Price: On Request, Warranty: On request, Contact: https://ssl. www8.hp.com

LG’S NEW W-SERIES PHONE LG Electronics’, opulent W-Series smartphone range – W10, W30 and W30Pro - is designed and developed, keeping in mind the Indian consumers’ desires and affordability, the series stands apart, offering best-in-class Cameras, Display, Battery, and other features at an unbelievable price. Redefining the standard of smart photography, the W30 and W30Pro boasts an AI triple camera, waterdrop notch display along with a powerful 4000 mAh battery. The new series flaunts a minimalistic and elegant symmetric design with thin bezels. Powered by a powerful processor, the smartphones are paired with 3/4 GB RAM and 32GB or 64GB of internal storage to run even the most demanding tasks and apps with ease. n Price: The W10, W30 and W30Pro INR 8999/-, & INR 9999/respectively., Warranty: On request, Contact: www.Amazon. com

SEAGATE

SEAGATE’S IRONWOLF 110 SATA SEAGATE’S IRONWOLF 110 SATA SSD is the world’s first purpose-built NAS SSD. It is designed with enterprise-class endurance and reliability, has a 24/7 always-on work ethic, and offers capacities of up to 3.84TB. ideal for PC gamers, the FireCuda 510 M.2 PCIe NVMe SSD delivers blazing performance with intense read and write speeds for the ultimate gaming experience. Available in various capacities I.e. 240GB, 480GB, 960GB, 1.9TB, and 3.8TB, these flash drives feature a 6Gb/s SATA interface, so they aren’t going to outpace many M.2 cache drives when it comes to sheer speed. But they can be used for either NAS caching or in all-SSD arrays to improve performance. Each drive comes with a five-year warranty and a two-year Rescue Data Recovery service. (I always wonder a bit about NAS products with drive data recovery, since hopefully systems are set up so that a drive failure won’t lose data, but clearly, there is a need or vendors wouldn’t offer it.) The drives feature Seagate’s new DuraWrite technology for optimizing data layout and write performance, as well as Seagate’s AgileArray firmware. Seagate says the drives will also support its IronWolf Health Management system soon.

38 SME CHANNELS JULY 2019

n Price: On Request, Warranty: On request, Contact:https://www.extremetech. com/computing/



RNI NO: DEL ENG/ 2010/ 31962 Postal Reg. No.: DL-SW-1/4145/16-18 Licensed to Post without pre-payment U(SW)/19/2017-18

Date of Publication: 13 of Every Month Date of Posting: 15 & 16 of Every Month

Experience capabilities beyond SD-WAN with

ARUBA SD-BRANCH Aruba Software Defined Branch (SD-Branch) combines best-in-class wired and wireless branch infrastructure with remote management orchestration, analytics-driven security framework and state of the art SD-WAN capabilities Learn more at: www.arubanetworks.com/in-sd-branch For more details contact: +91 9606811117 | shipras@hpe.com Copyright Š 2019. Aruba, a Hewlett Packard Enterprise company. All right reserved.


Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.