Mobile security, simplified. BYOD (Bring Your Own Device) means employees can work from anywhere, on whatever device they choose. It makes life easier for them, but IT security more complicated for you. Now there’s a simple solution to BYOD complexity. With Sophos EndUser Protection you get complete mobile, endpoint, data and web security licensed by the user—not the device.
One user, multiple devices, all in one license—start your free trial today.
Call +971 4375 4332 or email salesmea@sophos.com Sophos Middle East | Alpha building - office #205 | PO box 500469 | Dubai internet city | Dubai | UAE | www.sophos.com
Technologies gain traction in SMB
T
he SMB segment’s attitude towards adoption of new Technologies seems to be more assured than in the past as they look to reap the benefits of IT as a Business enabler and they are willing to look beyond the hype, at the core benefits that these investments will bring them. In moving into the deployment phase of new Technologies such as Big Data, they would need a lot of consultation from their trusted advisors from the channel. There would be certainly many undefined areas which need to be negotiated when it comes to custom designing Big Data solutions like identifying the right data sources pertaining to the actual needs of their Business model. A Techaisle study reveals that more number of global mid-market companies are in the phase of either evaluating or even investing in Big Data investments. While 43 % of companies in the segment are in either of the two phases, nearly 18% seem to have invested in Big Data deployments already as they realize the significance of extracting the business insights that can give them the competitive edge from examining various data sources. More and more, Technology companies are turning their attention towards the SMB segment as they design solutions. The momentum will be with companies that come up with innovative solutions that are tailored for the SMB segment. And it goes without saying that there is a great advantage in coming up with an all-in-one plug and play solution that removes the hassle of intensive on site systems support. In this context, Dell’s unveiling of the PowerEdge VRTX, a converged IT solution designed specifically for remote and small office environments, with enterprise-class capabilities seems a very appropriate introduction. With servers, storage, networking and management converged into a single compact chassis, PowerEdge VRTX uses significantly fewer cables, saves time compared to installing individual taskspecific systems and also considerable space.
Content
Editorial
Cover Feature - 18
Unstoppable BYOD
While BYOD becomes a norm, BYOD programs will be a necessity for even SMB companies lest they incur Business losses due to potential data breaches.
News In Detail - 12
Microsoft and partners highlight SMB opportunities
In Focus - 14
The Inaugural Integrator Gala Awards Ceremony successfully held
Techknow - 24
Future proofing security
John Spoor, Regional Manager, WatchGuard, Middle East Africa discusses how WatchGuard is geared to tackle emerging cyber threats with the next generation firewall appliances it provides
Point2Point
An opportune pursuit - 25
Sonia Sebastian, Business Unit Head - Security Surveillance at SNB Middle East elaborates on some key trends and the company’s focus
Wifi in the air - 26
Khalid Laban, CEO, Oxygen Middle East speaks to The Integrator about the company’s focus on Wifi and BYOD solutions.
Ascending the Growth trajectory - 28
Salman AL Kaldari, CEO of Mackeen Technology discusses how the company is forging ahead
Insight - 30
How to Make Big Data Consumable
Mike Hibbert, General Manager, Infor Middle East discusses the significance of doing a pilot run before adopting a major Big Data initiative .
Regulars
R. Narayan Managing Editor
Founder & CEO: Vivek Sharma Managing Editor: R. Narayan Assistant Editor: David Ndichu Art Director: Faiz Ahmed Sr. Sales Manager: R. Subramanyan Sales Coordinator: Smitha Jithesh
News Bytes Eyetech Stats & Trends
Published by: JNS Media International MFZE
P.O. Box: 121075, Montana Building 404, Zabeel Road, Near GPO, Karama, Dubai-UAE Tel: 04-3705022 Fax: 04-3706639
Disclaimer: While the publishers have made every attempt possible to get accurate information on published content in this handbook they cannot be held liable for any errors herein.
News Bytes
Spectrami unveils Actifio CEC facility Spectrami has entered into an alliance with Actifio to offer a Customer Experience Center (CEC) facility for Actifio’sCopy Data Storage platform. The facility will help Spectrami’schannel partners and end-users in the Middle East region. The brand new facility in Dubai will work as a point of reference for companies that would like to understand the potential of Copy Data Storage technology, which will enable users to experience the unique simplicity of Actifio managing Copy Data Environments for VMWare, Oracle, SQL and Exchange. The Customer Experience Center is fully equipped with anexperienced professional team that has the requisite skills, experience and expertise to service the requirements of partners and end-users on Actifio Copy Data Storage platforms. Ash Ashutosh, CEO, Actifio said, “We have seen a huge momentum for copy data storage solutions in the Middle East region. We have chosen Spectrami as our strategic partner to establish ActifioCustomer Experience Center due to their excellent capabilities, execution and expertise.”
4 | July 2013
Prologix Opens New RF Division ‘PrologixComserve’ Prologix Distribution has announced the opening of its new division, PrologixComserve, specializing in RF communication services and solutions for telecom operators in the MENA region. PrologixComserve will extend the ongoing relationship with prominent telcos across the region by offering end-to-end solutions and support in the areas of network planning and design solutions, network optimization solutions, benchmarking, in building solutions, EMF testing, passive intermodulation testing, timing synchronization, transmission planning and professional telecom training. Realizing that telecommunications companies have started shifting their interest towards RF managed services, PrologixComserve has evolved its offerings to cater to these new requirements. The division's RF network planning and design solutions pave the way for telcos to deliver new applications such as point-of-sale, VoIP and video on demand. Aditya Sahaya, Director-Sales, Prologix LLC says the company has already started building up a healthy pipeline of projects. “PrologixComserve has already been selected by ZTE to install the solar panels in a project for a UAE telecom operator. We have also been chosen by a reputed systems integrator to conduct in-building design and validation for a regional telco. We are very happy with the response and results that we have seen in such a short time frame and can only expect that the booming telecom market will rapidly drive our business growth,” he said.
Imation's next generation Object Store Imation, a global scalable storage and data security company, has launched its next generation object store, the NexsanAssureon secure automated archive solution. By cost-effectively consolidating storage tiers, securing data and simplifying storage management, the Assureon platform transforms the way organizations deploy and manage data archiving. The Assureon solution brings advanced, secure automated archiving to mid-sized organizations and enterprises to optimize storage infrastructures and manage regulatory compliance. By deploying the Assureon solution, organizations can automate storage policies to encrypt, self-authenticate, self-manage, self-heal and self-configure storage for unstructured files and content. Unlike other competitive archiving solutions, Assureon does not require that applications be customized to use proprietary APIs in order to store their data in the archive. Users do not need to learn new processes or change how they access data. "The Assureon solution offers mid-sized organizations and enterprises a single, highly advanced, automated disk-archiving solution to secure and manage this data,” said Mike Stolz, vice president of marketing for Imation’s Nexsan storage solutions. “Administrators can deploy the Assureon solution to manage their entire data protection architecture, controlling all critical data protection functionality, while shrinking storage infrastructure and its associated costs.”
TH D I O AV
E
IT R U C SE
Y
LS L A F PIT
D O Y B OF
IT is challenged by a BYOD workplace Today’s workforce increasingly relies on personal devices, including smartphones and laptops, to get the job done. IT departments are called on to adopt and enforce a BYOD strategy to make corporate resources available and maintain security without being the Internet Police. Knowing that BYOD is here to stay, WatchGuard provides IT administrators with easy-to-use security services that businesses need in order to manage BYOD. WatchGuard enables you to: • Focus on policy to determine which devices are allowed to access the network and which devices you will support • Make sure employees understand the rules and the risks and that work life and personal life should be kept separate and IT should monitor activity. • Define acceptable use in accordance to standard security practices, as it is critical to know in advance what your security policy is with regards to access controls • Protect corporate data by limiting access using VPN • Application control strategies give more granular control, so it doesn't matter what device the user is on, or what ports the application uses WatchGuard solutions allow you to protect, and enforce policy for, your BYOD devices, while they are in your network, and gives you control over how devices are used. Learn how to effectively secure your network and BYOD ecosystem with WatchGuard. Call us today at +971 55 882 9607 or email: mea@watchguard.com.
News Bytes
Increased demand for Ipswitch File Transfer Ipswitch File Transfer, the trusted choice for managed file transfer (MFT) solutions, has seen increased demand for its secure file transfer technology in the region including Saudi Arabia. The demand is being driven by two factors: business awareness of the need to securely manage and govern data transfers and protect valuable company data; and local regulatory and compliance requirements, including new guidelines around the secure transfer of personal financial user data. Ipswitch File Transfer’s solutions are specially designed to support enterprise application integration, streamlined data workflows and managed file transfers. MOVEit is a managed file transfer system that transfers business files reliably and securely, automates file-based business workflows and provides employees with an IT-approved solution to send files. MOVEit provides visibility and control over all file transfer activity and enables organisations to confidently meet their SLAs and compliance requirements. Ipswitch File Transfer’s local partner, StarLink — headquartered in Dubai with an office in Riyadh is responsible for distributing Ipswitch File Transfer’s portfolio of secure solutions in Saudi Arabia and the Middle East.
6 | July 2013
ManageEngine delivers new version of IT360 ManageEngine, the real-time IT management company, announced the industry’s first enterprise search capability along with other major enhancements are now shipping in its integrated IT management solution, IT360. The latest version of IT360 makes big strides in little data by giving IT teams the power to search databases of any third-party IT management and business application. To push the unified IT management envelope even further, ManageEngine has reinforced IT360 with unified discovery, in-depth application monitoring, IP address management, switch-port mapping and project management features. Unrelenting change in the business landscape is pressuring IT departments to deliver an unmatched user experience to internal and external customers alike. In response, IT teams need a complete, unified view of their network assets and the health of those assets, regardless of how many IT management applications inform that view. “Now more than ever, IT departments need a single pane of glass that IT360 provides them to manage their entire IT infrastructure,” said Sridhar Iyengar, vice president of product management at ManageEngine. “The latest version of IT360 builds out our unified IT management vision with industry-leading features such as enterprise search and unified discovery and other functions that reduce operating costs while providing deeper, real-time visibility into the entire IT infrastructure from a single console.”
BRAMS appoints Prramhod Shetty as Regional Sales Director Cloud Technology experts, BRAMS has announced that it has appointed Prramhod Shetty as its Regional Sales Director, responsible for Sales and Marketing across the Middle East and (English speaking) Africa region. The announcement was made by Brahim Ben Lahmr, CEO, BRAMS, at a special presentation hosted by the company for select CIOs in Dubai. Speaking on the occasion, Brahim added, “We have only just expanded our operations to the Middle East and set up offices in Dubai. As such, we are looking for experts in cloud computing in the Middle East to join the team. Prramhod fits the bill.” Prramhod will work with the BRAMS management to help define the company’s Cloud Technology and Enterprise Search sales strategy for the new expanded operations in the Middle East and increase the BRAMS footprint across the region, including channel partnerships in key countries around the region.” Before joining BRAMS, Prramhod served as Business Unit Head for Cloud Services and Service provider business at FVC.
S15D FlexMount Camera
Original MOBOTIX images
Discreet. Flexible. Weatherproof. The Best MOBOTIX Image Quality Of All Time!
With the S15D two sensor modules are connected to a concealable camera housing via cables up to two meters long. The latest 5MP image sensor technology used in the camera improves the frame rate and the live zoom feature. The maximum QXGA sensor module resolution (over 2.5 times more detailed than full HD) can also be used in the recording without any additional network load! The camera’s improved light sensitivity allows it to deliver top-quality color images, even at dawn. A black-and-white sensor module with QXGA resolution can be used at night. • • • • •
Decentralized complete system including memory, sensors and software (IP65) State-of-the-art image sensor technology for excellent image quality both day and night Recording without network load, with maximum QXGA resolution New MxActivitySensor for camera-integrated motion analysis Remote control function via iOS device and the free-of-charge MOBOTIX App 5MP Sensor
3MP
Image
USB
MxBus
PoE
MOBOTIX
News Bytes
Supermicro appoints StorIT as distributor StorIT, a leading data storage specialist value added distributor, has signed a Distribution agreement with Supermicro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing. According to the terms of the partnership, StorIT will promote and distribute Supermicro’s complete range of high-performance computing (HPC) solutions across the Middle East and North Africa (MENA) region. “Our partnership with Supermicro will enable our reseller partners to successfully address the rapidly evolving opportunities in the areas of Big Data, Cloud Computing and Enterpise IT Systems. By leveraging our strong channel network across MENA, we plan to grow Supermicro’s business and market share across this region,” said Suren Vedantham, Group Managing Director, StorIT Distribution fzco. StorIT has plans for several road shows and training workshops for partners in different cities in the next few months.
Spectra Logic appoints Spusht Technologies as VAD Spusht Technologies has signed a value added distribution agreement with Spectra Logic, the leading innovator in data archive and backup storage solutions. As per the terms of the agreement, Spusht will promote and distribute Spectra’s entire product range through an extensive network of channel partners across the Middle East region. “Spectra Logic is a leading innovator in backup and archival solutions and a market leader in tape storage. We are happy to sign this distribution agreement with Spectra as their products complement our existing portfolio and add tremendous value to our solution offerings to our resellers. With this partnership, we can now provide our channel partners with complete cost effective and high performance data archiving and protection solutions to meet the needs of every business. Our customers can also expect great performance, cost reduction and a greener environment by creating the right balance between disk and tape for all storage configurations,” says Keith Samuel, CEO Spusht Technologies. Spectra Logic maintains a strong focus on automated tape library technologies innovation. Its highly scalable storage systems perfectly align with the movement toward increased data retention, which is driving the need for data storage systems that exceed petabyte and exabyte capacities.
Kaspersky Lab appoints Westcon to boost Enterprise Business Kaspersky Lab announced the appointment of Westcon Middle East, a leading value-add distributor of convergence, security, networking and mobility products and services, across the Middle East, Pakistan and North Africa regions , as authorized Corporate Distributor for Kaspersky Lab’s enterprise products and solutions across the GCC region. Westcon Middle East will leverage its extensive network of over 1200 resellers to further reinforce the growth of Kaspersky Lab’s enterprise business; in addition the company will also represent Kaspersky Lab by extending Kaspersky Lab’s corporate solutions directly to corporate customers with large networks. Under this partnership, Westcon Middle East will be responsible for extending Kaspersky Lab’s leading portfolio of corporate security solutions to an extensive network of channel partners in the markets of UAE, Saudi Arabia, Kuwait, Qatar, Oman, Bahrain and Yemen. In addition, Westcon Middle East will also invest in on groundpre-sales, technical and maintenance resources to effectively support both new and existing Kaspersky Lab customers in the GCC and Yemen.
8 | July 2013
News In-Detail
Lexmark named EMEA Leader in IDC report Lexmark International has recently been positioned an EMEA ‘Leader’ in the IDC MarketScapereport EMEA Managed Print Services 2012 Hardcopy Vendor Analysis. The IDC MarketScape vendor analysis model evaluated the competitive fitness of companies offering managed print services (MPS) in the region. Lexmark’s customer-focused MPS offerings provide an end-toend approach to improving the enterprise print infrastructure and optimising business processes to enable organizations to become more efficient, effective, and differentiate themselves from the competition. Lexmark claims that seventy percent of the Top Global Retailers and sixty percent of the Top 10 Global Banks are its MPS customers. “Our MPS offering is unique in that it focuses on our customer’s business and helping them to transform their business processes,” said Mike Rüschenbaum, Vice President & General Manager Lexmark EMEA “We believe IDC’s recognition confirms Lexmark’s MPS leadership, global capabilities and proven track record of providing MPS to the largest companies in EMEA and all over the world. ”
10 | July 2013
Comguard, EnGenius team up to train partners in UAE Comguard in association with EnGenius conducted a special training workshop for channel partners in UAE to educate and train on EnGenius wireless networking solutions. The workshop was held on 17th June 2013, at Four Points by Sheraton Hotel, Bur Dubai, Dubai, UAE, which is expected to be attended by 40 leading channel partners from all across the Emirates. EnGenius iprovides feature-rich, long-range and enhanced wireless communications technology for datacom. The company boosts a wide range of wireless products for home and SMB customers. Yuhan Wang, the Managing Director of EnGenius addressed the partners and made a presentation on Cost Effective Wireless principles, Project Planning and Implementation. The workshop includedhands on technical training on EnGenius products. The other key focus areas for the workshop was on training partners about system setup and configuration besides educating them about maintenance and troubleshooting. Senior executives from Comguard and EnGenius also updated channel partners on their Warranty and Support Services policies. Fayaz Ahamed, Head- Wireless Division Comguard, said, “This workshop on EnGenius products and solutions is in line with our corporate policy to educate and enable partners to drive more business and open new streams of revenue for their business. The cost effective solutions from EnGenius offers a great opportunity for channel partners to address the fast growing SOHO and SME market in the country. ”
Alcatel-Lucent to renovate Jumbo’s Data Centre & LAN Infrastructure The enterprise business of Alcatel-Lucent signed a unique deal with Jumbo Electronics to refresh and renovate their Data Centre, LAN infrastructure and Wi-Fi Services. The announcement is a significant step for Alcatel-Lucent as it provides its services to one of the leading electronics retailers in the region. The agreement will have Alcatel-Lucent upgrade and refresh Jumbo Electronics Data Centres, LAN infrastructure and add Wi-Fi services at their Dubai Headquarters. To complete this end-to-end solutions delivery, Alcatel-Lucent’s Premium business partner, Al Futtaim Technologies was chosen for deployment and maintenance of this network. The agreement is believed to be a major boost for Jumbo Electronics Data Centre, and will contribute to reduced costs, lower energy consumption and improved workflow. Alcatel-Lucent has implemented the 9702e core switch into their Data Centre, which has all the servers available, The Omniswitch 6900 has been used as the TOR Switch (Top of Rack) to which the servers are connected. In addition there are 6450 switches in the LAN to which the users are connected and a AP105 with a 6000 series Wireless LAN controller, along with an Omnivista Network Management system. Vikram Dhar, Enterprise Sales Manager, Alcatel-Lucent said, “ We are delighted to have the opportunity to work with Jumbo Electronics in the region. It gives ALUE the opportunity to showcase our innovative technologies especially in the Data Center Space. ”
News In-Detail
Microsoft and partners highlight SMB opportunities
M
icrosoft in collaboration with MAKE Business Hub hosted a panel of experts to discuss how technology innovations can support Small and Medium Businesses (SMBs) in the UAE. Microsoft joined forces with industry leaders from Dell, du and Dubai Internet City to address the way that technology supports the specific needs of the mobile worker, entrepreneurs, creative freelancers and experienced SMB owners. Speaking on the panel were Bruno Delamarre, Small and Medium Solutions and Partners Lead, Microsoft Gulf; Majed Alsuwaidi, Director Business Development Dubai Internet City and Dubai Outsource Zone; Vikram Chadha, Senior Director SME at du and Basil Ayass, Enterprise
12 | July 2013
Product Manager at Dell. The topics discussed pivoted around how an SMB can increase profitability or expand into new markets by using technology. Panelists shared examples of initiatives and programs available in the UAE to facilitate SMB setup, enhance growth and help startups to succeed in a competitive environment. Some of Microsoft’s key initiatives include the ‘Tech Makeover’ Competition, the ‘Goodbye Windows XP. Hello Windows 8.’ current campaign, which is encouraging SMBs to welcome cloud technologies like Windows 8, Office 365 and Dynamics. The ‘Keep Your Business Moving’ Program provides free mentorship, product innovation updates to its SMB members and
technology, such as Office 365 and subscription-based Office at a reduced rate. Speaking at the panel, Bruno Delamarre, Microsoft Gulf, said: “In line with the vision of transforming the UAE into one of the best countries in the world by 2021, Microsoft is dedicated to support the growth of the SMB sector here in the region. We believe that Cloud technology provides SMBs with solutions that reduce cost, enable collaboration and enhance productivity. We work closely with Dubai Internet City, Dell and du, our partners, to offer unique solutions that are accessible to startups and SMBs here in the UAE. We are grateful to our partners for their continued support and commitment to delivering
initiatives that support the development of SMBs.” Cloud technologies, which are becoming increasingly popular with SMBs, offer the best solutions available today to solve critical issues, such as managing cash flow, cutting costs and increasing sales and productivity. Office 365, Microsoft Dynamics and Windows are technology solutions that business-class productivity and collaboration for Small and Medium Business organizations. Speaking at the panel on the role that technology plays in an SME’s success, Basil Ayass, Regional Marketing Director, Dell Middle East at Dell stated, “Today, the role technology can play in the success of a business is bigger than ever. Dell’s foundation is built on a spirit of entrepreneurship. We have always believed that Technology has always been about enabling human potential. This is one of the key reasons why Dell has several programs in place and solutions on offer to enable the next generation of entrepreneurs to realize their full potential.” MAKE Business Hub offers a platform of knowledge, which provides the entrepreneurial community with the tools and opportunities to turn their ideas into businesses.
In Focus | The Integrator Awards
The Inaugural Integrator Gala Awards Ceremony successfully held
T
he inaugural Integrator Gala Awards Night ceremony hosted by VAR Magazine was held at the J.W.Marriott Marquis on the 19th of June 2013. The event witnessed winning Brands walking away with accolades and was well attended by senior level executives from winning Brands. Further, the event also provided a forum for informal Business networking on the sidelines between attending integrators, Value Add Distributors and vendors. Mr. Vivek Sharma, the CEO of VAR Magazine and Publisher of The Integrator in his keynote presentation, highlighted the ongoing extension of the company’s commitment to the value add channel segment,
14 | July 2013
complementing the company’s established leadership as a Media company in the volume channel segment. Earlier in his brief opening note, R. Narayan, the Managing Editor of VAR Magazine, mentioned the Integrator Awards applaud the deserving Brands and companies that excelled over the year in their respective domains. The Awards results were based on a combination of results received from an online poll that was run on www. varonline.com for nearly a
3 week period as well as included consensus of the Editorial think tank. Microsoft was awarded the Virtualisation vendor of the year. Microsoft has played a key role in providing customers and partners in the region to reduce costs and enhance agility through Cloud and virtualization solutions. In the category Enterprise Storage Vendor of the Year, Dell, a company that has been looking at Enterprise storage as a top priority for the company in the past several
years was declared the winner. The SMB Storage Vendor of the Year was Netgear, a company whose new storage systems exemplify the kind of affordable yet scalable platforms that SMB customers need in their virtualized environments. With a growing portfolio of SMB solutions, D-Link emerged the winner of the category SMB Networking vendor of the Year. Cisco has seen undiminished dominance within the enterprise networking marketand was the winner of the Enterprise Networking Vendor of the Year category. Avaya, the winner of the category Unified Communications Vendor of the Year, is a company that offers a full
Mobility First
Suite No 601, Fortune Executive Tower, Jumeirah Lake Towers, Dubai, UAE Phone : +971 4 454 7154 Fax : +971 4 447 3234 Email : info@oxygen-me.com www.oxygen-me.com
In Focus | Integrator Awards
suite of interoperable unified communications (UC) solutions. LifeSize Communications, a vendor which intends to make it easier for people to use their video conferencing technology at any time and on any device emerged the winner in the Video Conferencing vendor of the year category. EMC, the winner of the category Data Management & Analytics vendor of the Year is a company whose goal is to support a broad range of cloud and Big Data solutions. Symantec, the Winner of Disaster Recovery and Backup Software Vendor of the Year is a vendor that has effectively been able to offer a “no-hardware” disaster recovery and backup or an industry standard appliance based solution,designed for both virtual and physical environments Kaspersky Lab that has made strong gains in the consumer security software market is also emulating that success and growth in the Business segment, emerging with the recognition of the Client Security Software Vendor of the Year. Dell SonicWALL, the winner of the category Network Security vendor of the Year has proved able to
16 | July 2013
deliver a two-fold security approach by offering universal protection against emerging threats across platforms and perimeters in real time while enabling higher efficiencies within the network. Riverbed Technology, the winner of the category WAN Optimisation Vendor of the Year has come up with a unique WAN optimization solution able to span mobile workers, branch offices, and data centres, both physical and virtual, allowing the distributed workforce to collaborate in real time. APC by Schneider Electric, the winner of the category Power Solutions Vendor of the Year is a company that offers one of the largest portfolios of products and solutions for small, medium and large data center environments and emerged on top in this category. On the other hand, the KVM Solutions Vendor of the Year is ATEN, a provider of a comprehensive suite of KVM connectivity solutions. In Distribution categories, APTEC-an Ingram Micro Company was the winner in the category Enterprise VAD of the Year whereas Mindware Fz LLC was the winner in the category SMB
VAD of the Year. WestconGroup comprising of Westcon Middle East and Comstor, has successfully brought key vendors together ensuring a total 360 degreeintegrated solution for clients and is a deserving winner of the category Networking VAD of the Year.Offering Best of class solutions from top tier vendors that are able to withstand threats in an everchanging IT security landscape, Computerlinks was the winner of the Security VAD of the Year. StorIT Distribution FZCO, a VAD focused on storage has built up a suite of solutions & services that enable enterprises large and small to store, protect & manage business critical data, and harness the value of information was the winner of the category Storage VAD of the Year. By bringing together a broad array of communication products from Brands that are leaders in their niches, FVC has over the years built up a strong credibility as the leading VAD in the UC space and not surprisingly, FVC was the winner of the category UC Infrastructure VAD of the Year. Theatro was the winner of the AV Solutions Distributor of the Year.
The Emerging VAD of the Year was conferred on Metra, a company that is fast building a strong value add focus though alliances with leading Technology vendors. In the SI categories, eHOSTING DATAFORT was the winner in the category Managed Services Provider of the Year, boasting of world-class data centres and state-of-the-art infrastructure and with customers across the globe. Alpha Data, the winner of the Networking Integrator of the Year, is one of the largest multi-disciplined systems integrators in the region. CONDO PROTEGO, the winner of the category Storage Integrator of the Year is a company that brings a consultative approach to the fore and has alliances with the top tier Brands in storage. Intelligent Business Technologies, a young company that has swiftly grown its portfolio of services over the past few years and has customers across the region was chosen Emerging Systems Integrator the Year. Spectrami was awarded the Visionary VAD of the Year for its focus on taking some of the niche Technology Brands to the market.
UCS C24 M3 Server Description UCS C24 M3 SFF 16HDD w/ rail w/o PSU CPU mem HD PCIe 8GB DDR3-1333-MHz RDIMM/PC3-10600/2R/1.35v 300GB 6Gb SAS 10K RPM SFF HDD/hot plug/drive sled mounted MegaRAID 9240-8i RAID 0/1/10/5/50 for C22/C24 Power Cord 250VAC 10A BS1363 Plug (13 A fuse) UK 1.90 GHz E5-2420/95W 6C/15MB Cache/DDR3 1333MHz/NoHeatSink Heat Sink for UCS C22/C24 M3 Rack Server 450W power supply for C-series rack servers
The Cisco UCS C24 M3 is UCS C-Series Rack Servers designed to operate both in standalone environments and as part of Cisco UCS, all Cisco UCS C-Series servers complement and extend Cisco innovation, investment protection, and simplicity. Cisco UCS C-Series servers provide innovations such as a standards-based unified network fabric, Cisco Data Center VM-FEX virtualization support, Cisco UCS Manager software, Cisco fabric extender and fabric interconnect architectures, and Cisco Extended Memory Technology. Item
Specification
Processors
• 1 or 2 Intel Xeon processor E5-2400 product family CPUs
Memory
• 12 DIMM slots • Support for DDR3 registered DIMMs • Support for DDR3 low-voltage DIMMs • Advanced error-correcting code (ECC) • Mirroring option
PCIe slots
• Riser 1: • One x16 PCIe Gen 3 slot, x16 extended connector (Cisco CNIC), half-length, full-height, with NCSI1 and Cisco CNIC2 support. The Cisco 1225 virtual interface card requires an NCSI slot • One x4 PCIe Gen 3 slot, x8 connector, half-length, full-height, no NCSI support • Riser 2: • One x8 PCIe Gen 3 slot, x16 connector, half-length, half-height • One x8 PCIe Gen 3 slot, x8 connector, half-length, half-height • One x8 PCIe Gen 3 slot, x8 connector, half-length, half-height
RAID
• RAID 0, 1, 5, 6, 10, 50, and 60 support
Hard drives
• Up to 16 or 24 front-accessible, hot-swappable, 2.5-inch SFF (Small Form Factor) SAS or SATA drives • Up to 12 front-accessible, hot-swappable, 3.5-inch LFF (Large Form Factor) SAS or SATA drives
Cisco UCS Integrated Management Controller
• Integrated Emulex Pilot-3 Baseboard Management Controller (BMC) • IPMI 2.0 compliant for management and control • One 10/100/1000 Ethernet out-of-band management interface, or 1 Gigabit Ethernet LOM or Cisco VIC 1225 access • CLI and WebGUI management tool for automated, lights-out management • KVM, vMedia
Front-panel locator LED
Indicator to help direct administrators to specific servers in large data center environments; a front-panel controller provides status indications (LEDs) and control buttons:
Additional rear connectors
Additional interfaces including a VGA video port (DB - 15), 4 USB 2.0 ports, 1 Gigabit Ethernet dedicated management port, dual 1 Gigabit Ethernet ports, a serial port (DB-9)
Physical dimensions (H x W x D)
2RU: 3.45 x 16.93 x 26.0 in (8.76 x 43.0 x 66.05 cm)
TRACK – SAUDI ARABIA Olaya- Aqaria No.2-Office 405 P.O. Box 94609- Riyadh 11614 Tel Phone : +966 11 460 4544 Ext: 1807 Fax: +966 11 460 3533 E-mail : amirza@tdmesa.com Visit : www.tdme.ae
Cover Feature | BYOD
U
A rising number of employees are now bringing their own devices to work. And while this becomes a norm, BYOD programs will now be a necessity for even SMB companies lest they incur Business losses due to potential data breaches. 18 | July 2013
nstoppable as it looks, BYOD is a testing challenge for corporates looking to secure their networks. It looks irreversible as well and therefore organisations have to look at having a BYOD policy framework in place. Thomas Lippert, Senior Product Manager, Sophos says, “The Bring Your Own Device paradigm has rapidly moved from novelty to near inevitability.Even IT organizations with deep concerns about manageability and security are increasingly accommodating user-owned devices as employees begin to adopt and leverage their own tablets and smartphones. BYOD is here to stay, and tomorrow’s BYOD will involve even greater diversity in devices, form factors and platforms.” As organizations continue to implement bring-your-own-device (BYOD) programs, it is projected that 38 percent of companies will stop providing devices to workers by 2017, according to a global survey of chief information officers (CIOs) by IT research firm Gartner. At the same time, BYOD causes significant security concerns: the top 3 security concerns regarding BYOD loss of company data, unauthorized access to company data and malware infection. “Indeed there is a genuine need for BYOD polices to be enabled in the workspace and the biggest driver here is the goal to achieve employee satisfaction and productivity through the use of new technologies, while reducing their mobile expenses. This BYOD trend is one of the more dramatic results of the consumerization of IT, in which consumer preference, not corporate initiative, drives the adoption of Technologies in the enterprise, “says Khalid Laban, CEO, Oxygen Middle East, a value add distributor that focuses on BYOD solutions. BYOD is driven by individuals and organisations need to secure their data from possible incursions via guest devices or even employee owned devices that do not meet the requisite security guidelines. “Since BYOD arises from the customer, policies are the only path that can define
the scope of mobile usage for employees. One needs to understand that employees tend to bring certain risks with their devices that can threaten enterprise data such as malicious applications and mobile theft. In order to safeguard this data, creating a policy is the best solution and this will avoid any conflict between the employee and employer.” There is no definite answer to the employees accepting the policy without apprehensions. "The first step is to make employees aware of the policies and ensure that they fully understand them. Given an increase in the BYOD trend it is imperative for employees to accept policies created by the enterprise if they would like to access the corporate date from their personal devices,” says Mathivanan Venkatachalam, Director of Product Management at ManageEngine. While BYOD is here to stay, in the near future, there will be a proliferation of even greater diversity in devices, form factors and platforms which will only enhance the challenge to manage. Further threat levels in mobility computing are on the rise. According to Symantec’s annual Internet Security Threat Report, mobile malware increased by 58% in 2012 and 32% of all mobile threats attempted to steal information. Kenan Abou Lteif, Sales Manager, Gulf & Pakistan, Symantec says, “BYOD lends itself to more productivity and freedom for employees. However, organizations IT
departments are challenged with the need to protect and control corporate information regardless of the device it is on and without hindering the efficiency BYOD enables. Concerns are wide-ranging, from lost and stolen devices, data leakage, unauthorized access to corporate resources and the spread of malware infections from mobile devices to the company network. With mobile devices now delivering critical business processes and data, the cost of security incidents can be significant. “ He adds, “By implementing a BYOD-ready network, there should be a decrease or lack-of security incidents or data loss. A successful implementation is the balance of securing corporate information, while making it accessible to employees on mobile devices.“ Symantec’s 2013 State of Mobility Survey found that there are two different types of organizations – “Innovators” who readily embrace mobility and “Traditionals” who are reluctant to implement it. Eighty four percent of innovators are moving ahead with mobility, motivated by business drivers, and they are experiencing significant benefits. Traditional organizations are implementing mobility more slowly, largely in response to user demand, and are seeing both fewer costs and benefits.
BYOD in the SMB segment SMB segment companies are responding positively to BYOD but they must also take cognizance of
Thomas Lippert Senior Product Manager Sophos
the accompanying risks. Accordingly, they need to be aware of putting in place firm BYOD policies. “Since the most important business consideration for SMB is cost saving, BYOD can give them an advantage. But it comes with caveat, SMB have to make sure that stringent policies are applied and emphasize data protection in their priority list,” says Mathivanan. For SMBs, the small business owner is usually the first to bring in his own device and connect to the network. These owners are realising that with BYOD, employees can use their personal mobile devices for work, so the business doesn’t need to make a big investment in supplying employees with devices. Kenan says “There is adoption of BYOD in the SMB segment. Many SMEs in the
Middle East do not have the resources or the budget to supply employees with the latest mobile technologies, yet they want to partake of the benefits of an alwaysconnected workforce; making a BYOD approach appealing,“ And while more SMB companies will start encouraging BYOD in the work environments, they will have to stringently review how they can bolster their security infrastructure. “SMBs must acknowledge the data integrity implications of all the personal smartphones and tablets in the work environment. Bring Your Own Device (BYOD) is becoming the rule rather than the exception in today’s workplace. Although BYOD may be a convenience to your employees, SMBs need to examine the impact on their security models,” says Thomas. SMB companies may be July 2013 | 19
Cover Feature | BYOD
it in the same way – ideally using compatible solutions and unified policies. This creates operational efficiencies and lowers the total cost of ownership.”
Solutions offer flexibility
Mathivanan Venkatachalam Director, Product Management ManageEngine
aware but not practive when it comes to putting BYOD policies in place because the budget might be a big factor. However, they could look at affordable cloud based models that will suffice, else they risk incur losses. Oxygen’s Khalid says, “Small entrepreneurs often do not have enough money to hire large IT security departments, allowing hackers and phishers across the globe to focus their efforts on this market in the form of SMS messages and other nefarious activities usually involving Apps. However, small business owners can now access a variety of affordable and effective tools for BYOD, especially cloud-based MDM. SMB’s need to mitigate risk today, rather than remediate risk after the first attack." Symantec’s 2012 State of Mobility Survey found that the average losses associated with
20 | July 2013
mobility that SMEs experienced during 2011 was $126,000. Concerns with mobility in the workplace are device loss, data leakage, unauthorised access to corporate resources and malware infection. Kenan comments, “Across the Middle East, many SMEs are struggling to find the proper balance between enabling mobility and maintaining a secure IT infrastructure. These simple steps – taking stock of mobile devices, securing with proper tools and policies, and managing through software – are relatively simple ways to strike that balance. Many of the processes, policies, education and technologies that are leveraged for desktops and laptops are also applicable to mobile platforms. SMEs in the region should integrate the management of mobile devices into the overall IT management framework and administer
Vendors have taken different approaches to bringing to market BYOD solutions. Some have integrated BYOD in upgrades of existing products. Leading security vendors are offering a cloud version in addition to local client versions. Symantec offers the Symantec App Center which is an easy-to-use mobile application and content management solution that secures all corporate data on mobile devices. Symantec also has a unique cloud security platform, the Symantec O3, which provides single sign-on and enforces access control policies across web applications. Kenan says, “App Center enables user productivity on mobile devices, regardless of the ownership, while protecting enterprise data. The solution provides enterprise grade security on a per-app basis, without requiring any source code changes or SDK embedding. Symantec O3 helps enterprises migrate to Software as a Service (SaaS) applications while ensuring that proper risk management and compliance measures are in place to protect enterprise data and follow regulations. It enables enterprise IT to provide single sign-on and access control security for multiple cloud applications.”
Sophos claims to tackle BYOD requirements comprehensively. The vendor provides the Sophos Mobile Control for managing BYOD. Tablet and Smartphone sales are rapidly increasing, and Sophos has seen significant growth in its mobile security sales in the past year. Thomas says, “Whether you are deploying BYOD for the first time, or evolving your existing BYOD initiative, Sophos can help you every step of the way. Our global security organization is at users’ service to help solve BYOD problems today, and to prepare for future threats and opportunities, wherever they may arise. Sophos Mobile Control (SMC) secures iPhone, iPad, Android and many more—whether they are company issued or personal devices, chances are they are being used for work. Sophos protects all of these mobile devices and keeps sensitive business data on them safe. And users can choose the delivery model to suit their needs—on-premise or Software as a Service (SaaS).”
BYOD and the channel Symantec has seen the momentum grow in terms of BYOD deployments by its partners. From pilot phases that covered limited users, now there are more users and apps being covered. There are requirements coming up from verticals including Education. Kenan says, “Many of Symantec’s partners in the region are involved in BYOD projects. Initially such initiatives started within certain organizations for a limited
number of users, mostly the senior management. However, deployments have since expanded to a larger number and to a wider range of applications. Symantec has also started to see BYOD projects at a large scale, especially in the education sector, where some institutions are looking at allowing students to bring their own devices.” The channel plays an instrumental role in educating organizations that want to adopt a BYOD strategy to ensure that the convenience of BYOD does not come at the expense of data security. Mathivanan says, “While the channel can educate the prospects that they deal with, enterprises first need to understand the benefits that BYOD can bring and decide on what is it they have to protect and what policies that they should enforce.”
been to require employees to permit the company to control any functions that could affect company data, as well as reserving the right to manage the phone, applications and selectively wipe only Corporate related data and Access, should it become compromised, lost or stolen without need.” There are two approaches to BYOD management. Businesses can use mobile device management (MDM) and mobile application management (MAM) tools to help maintain an inventory of the devices connecting to company resources and also make sure employees are adhering to policies. Kenan adds, “MDM is a viable method to deliver applications to user-owned devices, secure the corporate apps and data on them, and provide the ability to push applications to managed devices. However, using MDM to address these BYOD considerations means enterprises are forced to fully manage user-owned devices. In contrast, MAM enables enterprises to avoid devicelevel management and instead implement application-level management on user-owned devices. As a result, MAM negates the issues that are associated with fully managing
Kenan AbouLteif Sales Manager, Gulf & Pakistan Symantec
user-owned devices via MDM by allowing enterprises to “wrap” each of their corporate apps and the data tied to them in their own security and management layers. This gives enterprises control of their apps and data while leaving the rest of the user-owned devices.” However Thomas opines that the extra layers of security are in fact helpful tools that give users the ability to use their own devices within the workplace, allowing further flexibility and freedom. In addition to applying passcodes and antivirus prevention to devices, one should apply a custom level of application
control to BYODs. He adds, “If applications are available to employees on the internal network, they should be able to access them offsite through a VPN or email software. A successful BYOD program allows users to be productive outside of their scheduled work hours while Finding the balance also giving them the flexibility With BYOD deployments, to do the things they like to do striking the balance between when they’re not working—like ensuring privacy and security update their status or enjoy enforcement is the key. playing an interactive game.” However, security of Business In summary, BYOD data is a paramount concern. implementation needs to Khalid says, “It all drills be undertaken without down to proper planning and hindering the individual’s user execution of BYOD and MDM experience with the device strategy, many companies he or she uses will be faced or owns in the with pulling off work environment a balancing act or remotely between protecting "The channel plays an instrumental role in but striking the company data and educating organizations that want to adopt a BYOD balance in terms ensuring BYOD strategy to ensure that the convenience of BYOD of the necessary users' privacy isn't does not come at the expense of data security." adherence to trampled. The security guidelines. early pattern has
July 2013 | 21
TechKnow | WatchGuard
John Spoor, Regional Manager, WatchGuard MEA
by alerting the network management of impending issues before they become a serious threat.
Future proofing security John Spoor, Regional Manager, WatchGuard, Middle East Africa discusses some of the threats in the emerging landscape and elaborates on how WatchGuard is geared to tackle these with the UTM appliances and next generation firewall appliances it provides Discuss the increasing number of remote workers and the threats they pose when they access corporate networks through unprotected Wi-Fi Bring your own device (BYOD) is a trend that is here to stay. The use of personal devices also used for business continues to grow as the market and demand for smartphones, tablets and other devices rises. Employees may think that their personal devices are safe from threats, and that they don’t believe they have been compromised. Businesses aren’t able to monitor the usage of employees’ personal devices outside of work hours, which websites they visit, what they download or whether they connect to unsecure Wi-Fi networks. Malware can live within systems for prolonged amounts of time without detection and feed information to multiple
22 | July 2013
locations. The threat is continuous - any time the device is in use, outside of the workplace, data breaches can occur. While a business might want to take corrective measure to salvage a data breach, they have to work within the limitation from the device provider. Users can continue to use their personal items after a breach, which may hold corrupted files and malware which can continue to spread data to a number of outlets. BYOD security should be at the forefront of business security, as it is a business trend that is only going to evolve and become more prominent. Regardless of the type of information being shared, all business data can be, and should be, classified as sensitive. Traditional security solutions won’t protect enterprises; however there are new products that support cloud and BYOD usage. They work
Is the Middle East region ready for IPv6 Security-wise? While IPv6 is an invisible system that translates web addresses into a string of numbers and enables devices to communicate intelligently with each other via the internet, the threat from hackers remains the same. IPv6 is not a tool that prevents your networks from malware, phishing, spam and other cyber threats. That’s why companies need to stay on their toes and up-to-date with their security software. According to a research conducted by Renesys, Middle Eastern IPv4 ASNs grow at a faster pace than global internet (11% vs 9%), Middle Eastern IPv6 ASNs however grow slightly slower than global internet (31% vs 37%). While the IPv4 currently carries the majority of internet traffic in comparison to IPv6, the latter is designed to eventually replace IPv4. WatchGuard’sFireware XTM (Extensible Threat Management) v11.4.1 supports a limited set of IPv6 features. The IPv6 support is implemented in XTM through several stages, these stages are aligned with adoption patterns among our customer base. Current XTM functionality allows IPv6 addressing on external-facing interfaces, allows the device to pass traffic in a mixed IPv4 and IPv6 environment, and enables firewall capabilities including basic filtering and policies, default threat connection, and DHCPv6 client. Virtual machines seem to be the latest target for malware. How can organizations in the region protect their VM infrastructure? WatchGuard’s unified threat management (UTM) solutions provide the most complete security in their class for fully integrated, multifaceted protection from network threats, including: Viruses, spam,
TechKnow | WatchGuard
blended threats and policy violations. Organizations can protect their virtual machine infrastructure with Unified Threat Management (UTM) solutions. Because the threat landscape is always changing, WatchGuard solutions are designed to be able to easily add new network defense capabilities through security subscriptions, so costly hardware upgrades are not necessary. The region has been a popular target for APTs and other targeted attacks. How can WatchGuard help protect against these sophisticated attacks? Historically, APT attacks have been created by sophisticated hackers using advanced attack techniques and blended threat malware, but it is only a matter of time before “normal” malware criminals learn from these sophisticated hacks and the evolution of the APT speeds up, making organizations of every size a target. No network security provider can block every APT attack, no matter what they claim. According to Gartner, an estimated $60 billion is invested by corporations and governments in network security systems, yet hackers are still finding ways to sneak past them. By definition, APTs often leverage new techniques, which may not even have a defense yet. However, there are defense strategies that can significantly mitigate the chance of an advanced and persistent infection. WatchGuard supports a variety of reporting and monitoring functions that provide smart and strategic defense against these blended threats. We’ve outlined a variety of best practices for mitigating risk and monitoring unusual activity across a network that may better detect or stop the next APT. These include Multiple layers of security controls (WatchGuard “defensein-depth”), Signature-less malware protection (WatchGuard Proactive Malware Detection), an evolving defense framework (WatchGuard XTM),
24 | July 2013
better manageability through visibility (WatchGuard Firebox System Manager (FSM) and HostWatch), enforcing Standards (WatchGuard Protocol Anomaly Detection (PAD) and Reputation Services (WatchGuard Reputation Enabled Defense (RED). Because APTs are continually evolving and getting more elusive by the day, no network security solution will be able to anticipate or block every attack. Our advice: Always assume that a network is already breached and then build a security vault using the tools and services noted here. We strongly suggest the utilization of more than just preventative tools – strong visibility tools will help recognize threats and ensure that IT administrators are talking all necessary action to help mitigate them. BYOD-What threats does BYOD pose and how does WatchGuard help clients face BYOD issue with confidence Unquestionably, BYOD challenges longstanding IT controls to minimize and mitigate risk. As businesses explore how to adopt BYOD and increase the productivity of employees, this also brings a whole new set of threats and challenges. The risk of data loss is a threat and challenge. Data loss can vary, and the consequences can be extreme. For example, a recent study estimated that a data breach could cost a company about $200 per compromised record, based upon a variety of factors including the cost of lost business because of an incident; legal fees; disclosure expenses related to customer contact and public response; consulting help; and remediation expenses, such as new security technology and training. There are risks associated with viruses entering corporate network via personalized devices. Many off-the-shelf, consumer mobile devices lack antivirus and/or antimalware protection. For example, Android devices are often the subject of media headlines that
tout the virus risks, such as keyloggers, trojans and other forms of malware. WatchGuard’s new AP100 and AP200 wireless access points secure enterprises’ WLAN from today’s sophisticated, blended threats. This means enterprises are able to accurately and easily apply security policies and changes to both wired and WLAN resources simultaneously, which is critical to enforcing security standards across the entire network infrastructure. Every UTM out there is being presented as a Next-Gen Firewall. How do WatchGuard’s series of Next-Gen solutions stack up against the best of the competition? Unified threat management (UTM) is an emerging trend in the network security market. UTM appliances have evolved from traditional firewall/VPN products into a solution with many additional capabilities, including spam blocking, Gateway antivirus, spyware prevention, intrusion prevention and URL filtering. These are functions that previously had been handled by multiple systems. UTM solutions also provide integrated management, monitoring, and logging capabilities to streamline deployment and maintenance. All of our WatchGuard XTM security appliances combine these capabilities for a superior UTM solution. Moreover, with WatchGuard’s UTM solutions enterprises are provided with the flexibility to add any of our powerful subscriptions, whichever is needed in key industries. The UTM solution can easily be upgraded to a higher appliance model within the line with a software lincense key and simplifies administration tasks including log file management, auditing, and compliance reporting to keep IT productivity high. While keeping their productivity high, it also allows the IT stass to have more time to focus on other areas of network administration, while also saving money on support and hardware costs.
Point2Point | SNB
An opportune pursuit Is there an increased demand for IP surveillance solutions in the region? Discuss the IP solutions you offer. Security threats are driving the growing demand in the IP Security and Surveillance Market. IP cameras in general offer the same resolution as an analog camera with a built-in video encoder to convert the analog signal into an IP address. We are distributors for Mobotix. MOBOTIX AG is known as the leading pioneer in network camera technology and its decentralized concept has made high-resolution video systems cost efficient.With Mobotix we are talking about megapixel HiRes Camera solutions which gives over 50 times more detail than images captured with conventional surveillance systems. SNB Middle East provides end-toend IP Surveillance solutions inclusive of Cameras, Video Management Software, Networking and Storage, reducing the Total Cost of Ownership of projects. Apart from different cameras, do you also provide related Data analytics software? SNB offers Axxon soft Enterprise Modular Video Management Suite for Unlimited Scalability & Integration with third party access controls, Fire Alarms, Building Management solutions (BMS), Point of Sales (POS), AMT Security, Video Wall Etc.
They even have Data base integrations for Face Recognition, People Counting and License Plate recognition. Is demand seen across commercial and residential markets? While the demand has always been strong for Security Surveillance products, in the UAE the growth in the commercial segment is presently stronger relative to the residential segment. However the residential market is also catching up. Discuss your channel strategy? Being a New generation VAD, We do have a mix of Physical and Traditional Security Integrators. Being a True Value Added Distribution company SNB Middle East FZC works directly and only with our Partners who are Integrator or Resellers. We support and strengthen them by providing technical and commercial expertise. Being committed and relably fulfilling their demands, SNB has seenfavorubale response from the channel in a relatively short time in the market. What is the growth rate you envisage for the surveillance Business? The Surveillance market share is increasing year on year and percentage wise this is in double digits. Being aligned with future proof manufacturers, our expectations of significant growth are higher.
Sonia Sebastian Business Unit Head SNB Middle East
Along with several other areas of focus, IP Surveillance is a significant growth opportunity that SNB Middle East is keenly pursuing and has a sizable array of solutions in the segment. Sonia Sebastian, Business Unit Head - Security Surveillance at the Distributor elaborates on some key trends and the company’s focus
July 2013 | 25
Point2Point | Oxygen Middle East
Wifi in the air Oxygen Middle East is a leading mobility solution provider, focusing on designing, distributing, and implementing high performing, scalable, and secures wireless solutions in the Middle East Region. Founded in 2004, Oxygen Middle East is today a leading distributor for wireless solutions that are based on best mobility products in the Market, including Enterprise wireless products, Home and Small Office wireless products, wireless end-devices and applications. Khalid Laban, CEO speaks to The Integrator about the company’s focus on Wifi and BYOD solutions.
Khalid Laban CEO Oxygen Middle East
Please elaborate on your focus as a VAD in terms of the solutions that you offer in your portfolio. Are Wireless solutions your strongest focus? Oxygen Middle East is the official distributor for several wireless vendors, including Aruba networks, the market leader for enterprise WLAN solutions. Oxygen is also having distribution agreements with active RFID tags venders, and wireless IPT venders. Oxygen is a company focused and driving the concept ofArchitecture for Voice , Video and integrated Data over a Wireless Solution. So the core of our business is
26 | July 2013
WiFi. We live, breath and work only on wifi and delivery of value added applications. We add solutions for Voice from Ascom and Vocera, Video and CCTV from Aventura , RFID tracking from Ekahau and Aeroscout and security solution to manage this new infrastructure from Redseal and Fortinet. Now with the smart devices strong drive globally, it is in our favour, as these smart devices use Wireless as the only mean of communication. Therefore Oxygen has put a very forward thinking strategy for building a Mobility first solution. Today Oxygen is the only
VAD in the region focusing on BYOD and Mobility first solution set and has got the strategy together and assembled a strong solution set that fits the mobility first solution requirement today. What is the growth of demand for wireless deployments in the region across different customer verticals? The Demand for wireless has been increasing and we are expecting a growth rate of about 30% YOY. With our portfolio, we are well placed to tap this growth opportunity. Which are your key verticals
and markets in terms of regions? The Market is strong and some key ones that are luxurious hotels use professional Wifi set up with Value added solution in order to help them maintain customer satisfaction and we give them differentiation. In the Education Sector, there is strong demand for BYOD solutions and similarly in the corporatesegment, especially finance. We are seeing growth in these segments. What are the value add services you offer to your partners? We provide them consultation
with the design of Architecture for Voice, Video and integrated Data over wireless solution. We also provides technical training in the use and maintenance of all the products we distribute and are also the exclusive ATC Authorized Training Center for Aruba Networks in the Middle East region. Our Mobility first strategy has been unveiled to enable our partners take advantage of this very important adoption of the new Technologies. We believe the world is going Mobile and we are in a very unique position to take advantage of it. We have some the best solution for BYOD: MDM, MAM and MCM solution based on MoibleIron and we have done some very successful installations to support our vision. We provide our channel comprehensive Presales and post-sales support which helps them increase and maximize their sales opportunities. We provide Oxycare Professional service support and service with Next business day delivery in all countries. We provide Door to Door delivery, extended payment plans if required as well. Discuss your focus on BYOD? OXYGEN is the only VAD in the region having end to end solution to help address the
We believe the world is going Mobile and we are in a very unique position to take advantage of it. We have some the best solutions for BYOD and we have done some very successful installations to support our vision. BYOD challenges this puts us at unique advantage of being able to claim the “BYOD Experts Title. There are unique components in our BYOD vision and strategy that helps provide a comprehensive array of solutions. What are your solutions for BYOD? An effective BYOD Expert will first start with proper Network Infrastructure planning and
here our Fluke Networks solution helps properly plan, build and manage BYOD deployments, and ensure the network is properly designed to effectively handling influx of devices. All Smartphone and Tablets are reliant on Wireless which is the core of Mobility today, and here our Enterprise Grade Secure and reliable Wi-Fi solution from Aruba Networks help serve as easily
Oxygen vision and Network Design for clients Middleware
Systems
Services
Network
Analytics
Identity MCM MAM MDM
manageable and scalable core infrastructure for BYOD enablement. A BYOD solution is incomplete without having fail safe measures to ensure they have an Enterprise Mobile Management Solution in place, here our MobileIron Solution help tackle the challenges of Data Leakage Prevention, Mobile Device Management, Mobile Application Management and Content Management and above all ensuring IT has means to distinguish Corporate data from Personal Data in case of BYOD deployments. Enterprises want to empower their employees with greater information access, increased team collaboration, improved productivity and employee engagement. Our Partnership with Acnronis helps deliver Anytime, Anywhere Access – For accessing and syncing files between their devices – laptops, desktops, smartphones and tablets with easy collaboration on files with both internal and external constituents. Finally the key challenges on how these devices are securely connected to the Enterprise infrastructure, is how we provision Device On-Boarding, Secure Access, Guest Management, Identify Management which we help deliver using Aruba Clear Pass Solution. July 2013 | 27
Point2Point | Mackeen Technology
Salman Al Kaldari, CEO, Makeen Technology
Qatar are highly qualified to assist us in this vision. As we go from market to market, we will make sure that our channel partners support and uphold our core values of Integrity, Reputation, Added Value, Trust, Respect, Excellence, and Transparency. What are the recent investments the company has initiated in the regionl? We have made substantial regional investments into infrastructure to ensure that we deliver complete and high-performing enterprise technology and system
employees are constantly motivated and provided with professional training. Quality is an integral part of our commitment to worldclass products and customer service. We thus invest heavily on a quality process that verifies and validates both existing and new solutions; researches improvements to further improve quality; actively involves employees and customers; and continuously monitors quality and management. As Qatar prepares to host the 2022 Football World Cup,
Ascending the Growth trajectory
Mackeen Technology is one the fast emerging Technology solutions companies in Qatar and is tapping into several growth segments. Salman AL Kaldari, CEO of Mackeen Technology discusses how the company is forging ahead.
Discuss your channel strategy in the region in terms of your go-to market policy Mackeen Technology aims to translate our success as one of the fastest growing technology companies in Qatar to the regional arena. Through our MENA channels we will steadily build a reputation for delivering high-quality and profitable technology solutions – developed and promoted by locals from area to area – that support long-term growth. Given the competitiveness of the regional markets we intend to ensure complete customer satisfaction for all our deliverables. We shall
28 | July 2013
do this by drawing from our excellence in finance, teamwork, and solid relations with end users and vendors. Our targets for Qatar and the region are small, medium and large companies. Our service and product thrusts revolve around IT Infrastructure, IT Services, Physical Security, Document Management, and Data and Applications Hosting. For this year in particular we would like to firmly establish our status as a top provider of monitoring solutions and services through the right team and the right sourcing of products. Our local assembly and R&D teams in
integration solutions. Most have been directed towards our core services - Security and Integration, Documents Archiving, ATM Monitoring and Management, IP Telephony and Contact Center Services, and Channel Development and Outsourcing. We continue to build up our capabilities in territories such as KSA and Sudan and we intend to reinforce our infrastructure in other ME growth markets. In terms of human capital, Mackeen understands the importance of investing in the right employees and their continuous development. We then ensure that our
are there projects that you are involved with to assist towards this? Many of Qatar’s economic sectors are gearing up to provide direct and indirect support for the approaching World Cup. Mackeen is involved in several projects with entities such as hotels, banks and health institutions that will be involved in some degree with football’s premier event. Many of our specialties such as CCTV solutions and IP telephony will play key roles during the Cup so we expect more related business to come our way as 2022 draws near. Face recognition is a
technology that is attracting great interest in the region and as a leading developer of security solutions we are looking at how we can help in the regional growth of this important segment. We also have an excellent data disaster recovery team that offers the best response option for any incident that may happen during the World Cup and across the region. What are your expansion plans outside Qatar? There are many companies in Qatar that are headquartered in other big markets. Mackeen is one of a few companies that are local to Qatar; we consider this one of our key strengths since we get to gain valuable insights into, and considerable knowledge on, the local market and environments. This gives us an edge over the competition in terms of quality and speed of project delivery. Regional operations are impacted by several factors such as the business friendliness of the local environment, which Dubai excels in, or the size of the market, which is where Saudi Arabia has a big advantage. Qatar offers the best of both worlds as it is a flexible market to work in and is receptive to mega projects due to its investment-driven vision. Our successes in nearby markets, key regional expansions and strong ties with major IT brands that have chosen us to support their growth plans will drive our
solutions in the video surveillance "Our targets for Qatar and the region are small, segment medium and large companies. Our service and The video product thrusts revolve around IT Infrastructure, IT surveillance market Services, Physical Security, Document Management, has grown by leaps and bounds and Data and Applications Hosting." over the past decades. Vast number of established partners technology improvements performance further. such as Belconn, an Italian have made video surveillance company specializing in voice, Is Cloud computing an area systems prevalent even in video and data network cabling small businesses and homes. of focus for you? and B3 Cable, the fastestWe are steadily building The uses have extended to growing cable manufacturer up our own cloud computing public monitoring and home in the world with a presence portfolio. We already have a and workplace management, in Europe, Asia and the Middle strategic partnership in place among others. East which provides cabling with Rackspace, the open Mackeen offers a number solutions for instrumentation cloud company and the world of solutions that leverage and control, railways, voice and the flexibility, efficiency, leader in hosting web-based data, and fire safety systems. IT systems, to provide local range and cost effectiveness support for Rackspace’s GCC of video surveillance. One Do you provide technology customers. We plan to jointly of these is WiEye, which is solutions to other build and operate a regional regarded as the best system subsidiaries in the group? data center that will link with for remote video surveillance Although Mackeen other Rackspace data centers and management in the world. Technology falls under the around the world. Through our WiEye can monitor, record, umbrella of Mackeen Holding, partnership with Rackspace and access any event and we operate as an independent we deliver Managed Hosting, feed information through PCs, and standalone company. To Private Cloud Hosting, and mobiles and tablets.. date we have not yet executed a host of advanced cloud We also carry products any project for Mackeen computing services under the from GKB Security Corporation Holding’s other subsidiaries. Rackspace Cloud platform. GKB’s Video Fire Detection Qatar offers a wide playing System (VFDS) uses Video field for us to explore further Discuss your infrastructure Image Detection technology to expansion so we are focusing cabling services in the detect flame and smoke at any our efforts in this market. For construction sector and the time of the day. the moment we are acting growth in this segment? The Iris on the Move (IOM) as an IT and infrastructure Infrastructure development biometric solution also forms consultant for our holding projects worth over USD 350 part of our comprehensive group which is currently billion are planned across stable of video surveillance involved in massive urban the GCC countries this year. offerings. We also offer projects in countries such as Qatar will account for USD 45 advanced high-resolution Sudan, KSA and UK. This does billion worth of projects, so the network camera technologies give us access to Mackeen construction sector presents from German company Holding developments which high-profit business prospects MOBOTIX AG and digital could later on require support for Mackeen. video surveillance solutions New buildings and building from the various brands we for professional installations represent. refurbishments require largefrom Axis Communications, scale cabling support, which the world’s leading expert in Discuss some of your Mackeen offers through a network video. July 2013 | 29
InSight | Infor Middle East
Mike Hibbert, General Manager, Infor Middle East discusses the significance of how not to be carried away by the hype but attempt to truly extract the value of information from data and applications already available and do a pilot run before adopting a major Big Data initiative .
How to Make Big Data Consumable B
ig data is a technology topic that’s getting a tremendous amount of headlines. You can hardly visit a technology website or read a publication without coming across an article on the subject. But there’s plenty of good reason for all this attention. We live in a world that is fast becoming overwhelmed by information. Ninety percent of the world’s data was created in just the last two years, and IDC estimates that by 2020,business transactions on the internet, including both business-to-business and business-to-consumer,
30 | July 2013
will reach 450 billion per day. From software applications and social media to internet search results and the ever-present email, the rate of data creation is growing exponentially with no signs of slowing. Bizarrely, companies have for years seen information as the Holy Grail of competitive differentiation – begging “if only we had more customer data, if only we knew more about market patterns, if only our equipment could tell us when it was going to fail.”In the blink of an eye, we have gone from thirsting for this information to drowning in it,
leaving us to ask the question “now what”? Many see big data as the answer – and the key to making “if only” a reality. Despite all the focus, the actual meaning of big data and its application aren’t always clearly articulated, but the concept is actually a fairly simple one. At the most basic level, big data is just as it sounds – volumes of information that are extremely large and growing. That can mean data already being generated within an organization by systems or machines, like manufacturing
Mike Hibbert General Manager Infor Middle East
output or customer buying patterns; or increasingly, data that’s available for companies to buy, provided from sources like social media vehicles or internet search providers. The issue comes when the volume gets so big that it can’t be effectively managed in a traditional “batch processing” way. If it takes many hours or even days to process large volumes of data, the information quickly loses its value. Enter big data solutions designed to turn this information tsunami into an information goldmine. Because of this potential
and all the hype, companies understandably want to make sure they don’t miss out on the big data phenomenon. Truth is, we’re far from reaching a point where more than a small percentage of businesses truly have a big data problem. Big data opportunities, on the other hand, are a zebra of a different stripe. Certainly, the possibility of making information a competitive advantage is a real one, more viable in fact than it has ever been. The question is whether big data holds the key to achieving that goal. For some, the answer will be a resounding yes. For others, however, big data could be end up being a costly and unnecessary distraction. How do you know where your company falls? Some of the best advice about how to address the big data question can probably be summed by admonitions frequently given to my children: - Set the table. The first step in any data project (big or otherwise) is to clearly establish what you’re trying to accomplish. Additionally, it can be helpful to establish a visual picture or framework of what you’re trying to accomplish that organizes the business around an end game and breaks down
"Before assuming that an expensive initiative around big data is required, determine what data you have and whether you can accomplish your goals with existing tools." the problem into consumable, achievable initiatives. With all the excitement around the big data concept, it’s easy to get pulled into an initiative with objectives that are likely to change as you go along. Defining up front what you need helps determine if big data is the answer and puts parameters around what you undertake if it is. - Eat what we already have in the pantry. Many companies have valuable data ready and waiting to be exploited with the help of business intelligence and analytical tools. Before assuming that an expensive initiative around big data is required, determine what data you have and whether you can accomplish your goals with existing tools. Incremental capabilities can also be incorporated in a non-disruptive way, giving you a big bang for your buck by providing better, more consistent visibility to data and making it more consumable. Analytic applications that surround existing information and transactional systemscan
effectively manage your data while also delivering a host of other benefits, like giving non-technical users simple dashboards that help them target specific problems and opportunities; delivering information directly and automatically to users so they head off problems and make better decisions; and making collaboration a standard part of your work processes. - Finish what’s on your plate before you ask for more. All of the new data available today can be very tempting. From Amazon to Facebook, we now have an almost dizzying array of choices that seem poised to unlock new and previously untapped opportunities. However, the data you already have can be equally as valuable, if not more so, because of its relevance and quality. At some point, there are diminishing returns on adding more insight into the mix, as too many data sources can create “analysis paralysis,” particularly for the average worker. Improving your ability to deliver a highly focused viewof the business
with targeted workflows is likely to serve you better than focusing time and energy on what can easily turn into a great deal of outside noise. The best approach is to make sure you fully understand and exploit what’s core to your business and already exists before taking on new, potentially complex and expensive data initiatives. - Take small bites. When you are ready to start delving into big data, start with a prototype and refine your processes before undertaking a major initiative. Once you have standard approaches in place that capitalize on your internal data and support consistent, streamlined business processes, take a small piece of the business and inject one or two new data sources to see if the benefits outweigh the cost and distraction. Testing the waters – and the results – will help you keep things under control and better assess the true potential return on big data for your business. Big data has the potential to deliver big value. But the size of that potential and the most effective ways to exploit it are still being explored. Companies that watch, plan, and act when the time is right will be well served. July 2013 | 31
eyetech
ANP-08AV-L – 8 Port Lite managed AVB Bridge
WD’S 5 MM 2.5-INCH HARD DRIVE Overview:
Overview The ANP-08AV-L AVB Bridge has 8 ports, each capable of accommodating non-blocking wire speed connection with other AVB ports in full-duplex mode. The ANP08AV-L delivers 10/100/1000 automatic speed sensing, full/half-duplex sensing, and Auto MDI/MDI-X to every port. This simplifies the combination of 10, 100, and 1000 Mbps devices. An intuitive web-browser interface / CLI offers straightforward administrative management for performance monitoring, port mirroring, port configuration, VLAN for traffic control, Class of Service (CoS) for traffic prioritization, port trunking for increased bandwidth, traffic filtering, and other advanced features. The ANP-08AV-L is supported by an external 12V power supply and the small form factor is highly useful in extending AVB network infrastructure in low density installations. An optional 3 x ANP-08AV-L rack mount tray is available which allows the ANP-08AV-L to be rack mounted.
Key features: • 8 Port Gigabit AVB Network Bridge • Administrative management via CLI commands and simple web-browser interface • VLAN support • Layer 2 management • Universal 100-240V AC/50-60 Hz external power supply • Rack-Mount Tray system optional to mount 3 x AVB- 08-L together in 1RU form factor
32 | July 2013
WD is shipping the world’s first ultra-slim 2.5-inch, 5 mm hard drives and solid state hybrid drives (SSHD), which are designed for integration into the slimmest devices and space-constrained computing environments. With 500 GB of storage capacity and models with high performance-enabling solid state hybrid drive technology, this slim product line helps to address the tradeoffs system designers often make between capacity, physical size and performance. WD designed the new WD Blue and WD Black 5 mm drives to enable new levels of device portability. The new drives are aimed to increase internal storage capacity while enabling it to fit into smaller device slots. In addition, the slimmer and more portable the device, the more vulnerable the hard drive is to user-induced stress. To battle this, WD has designed key enablers to the 5 mm form factor.
Key features: • This ultra-slim form factor reduces weight by up to 36 percent compared with a standard 9.5 mm drive. • The WD Blue and WD Black 5 mm drives deliver unprecedented operation and non-operation shock specifications with 400 G and 1000G, respectively. • WD designed the connector and board utilizing cell phone miniaturization technology to maximize the mechanical sway space in the hard drive and ensure shock performance. • WD Blue 5 mm hard drives also feature the first application of a new small form factor SFF-8784 edge connector. This new connector receives power from and interfaces with the host I/O bus via the SATA interface connector SFF-8784. • The motor shaft is secured at both ends to reduce system induced vibration and stabilize platters for accurate tracking during read and write operations which enables consistently higher performance.
AXIS Q1931-E Thermal Network Camera Overview: The new AXIS Q1931-E Thermal Network Camera is an affordable and solid bullet-style camera especially designed for outdoor surveillance in complete darkness and challenging conditions. The out-of-thebox outdoor-ready camera is ideal for monitoring of facilities where early detection of an intrusion attempt is critical. In addition, Axis’ unique Corridor Format allows the camera to deliver a vertical field of view, perfect for situations such as the monitoring of long fences and other perimeters.
PowerEdge VRTX Overview The PowerEdge VRTX is a shared infrastructure platform offering extensive performance and capacity with officelevel acoustics in a single, compact tower chassis. It is an ideal solution for small and midsize businesses as well as remote and branch offices of large enterprises. The simple, efficient and versatile platform can be rapidly deployed to consolidate and manage business applications in two or three virtualized servers with shared storage and integrated networking. Employing the latest PowerEdge technology and high-availability features, VRTX can help you gain fast application response times, run multiple applications that need performance or low latency, power through peak processing periods and scale for future business growth.
Key features: • Huge internal capacities that support extensive growth Office-level acoustics, much quieter than traditional aggregations of servers, storage and networking • Fresh Air validated configurations that allow you to avoid the need for special cooling or worry when you turn off the AC during non-business hours •
Standard power requirements found in most offices (100V-240V), which allows users to avoid the cost of rewiring for high-line power (typically required for servers and storage)
• Front-access KVM, USB, LCD display and optional DVD-RW• Up to four server nodes
Key features: • The robust AXIS Q1931-E is specifically designed for use in harsh environments such as desert terrain and tough climates.
• • • • •
Feature rich, 2-socket, half-height 12th Generation PowerEdge M520 and M620 blade servers that combine superb performance with exceptional flexibility Flexible server configurations that can be tailored to meet your specific needs Support for future-generation PowerEdge M-Series blades Dual SD cards for redundant hypervisors Hot-plug and swappable HDDs
• In addition to a very competitive price, the AXIS Q1931-E offers high contrast 384x288 resolution thermal images. • It is the first thermal camera offering Axis’ Corridor Format, which is especially useful for effective perimeter protection of for example industrial facilities or railroad tracks. • Intelligent video is a key component of any thermal camera, and AXIS Q1931-E provides tampering alarm, motion detection, and support for AXIS Camera ApplicationPlatform.
July 2013 | 33
Stats & Trends
Worldwide IT Spending on Pace to Reach $3.7 Trillion in 2013
W
orldwide IT spending is projected to total $3.7 trillion in 2013, a 2 percent increase from 2012 spending of $3.6 trillion, according to the latest forecast by Gartner, Inc. Last quarter, Gartner's forecast for 2013 IT spending growth in U.S. dollars was 4.1 percent. The 2.1 percentage point reduction mainly reflects the impact of recent fluctuations in U.S. dollar exchange rates; growth in constant currency is forecast at 3.5 percent for 2013, down only slightly from last quarter. The Gartner Worldwide IT Spending Forecast is the leading indicator of major technology trends across the hardware, software, IT services and telecom markets. For more than a decade, global IT and business executives have been using these highly anticipated quarterly reports to recognize market opportunities and challenges, and base their critical business decisions on proven methodologies rather than guesswork. "Exchange rate movements, and a reduction in our 2013 forecast for devices, account for the bulk of the downward revision of the 2013 growth," said Richard Gordon, managing vice president at Gartner. "Regionally, 2013 constant-currency spending growth in most regions has been lowered. Worldwide IT Spending However, Western Europe's Forecast (Billions of U.S. 2012 Dollars) constant-currency growth has Spending been inched up slightly as Devices 676 strategic IT initiatives in the Data Center Systems 140 region will continue despite a Enterprise Software 285 IT Services 906 poor economic outlook." Telecom Services 1,641 The forecast for spending Overall IT 3,648 on devices in 2013 has been Source: Gartner (July 2013)
revised down from 7.9 percent growth in Gartner's previous forecast to 2.8 percent (see Table 1). The decline in PC sales, recorded in the first quarter of 2013, continued into the second quarter with little recovery expected during the second half of 2013. While new devices are set to hit the market in the second half of 2013, they will fail to compensate for the underlying weakness of the traditional PC market. The outlook for tablet revenue for 2013 is for growth of 38.9 percent, while mobile phone revenue is projected to increase 9.3 percent this year. Enterprise software spending is on pace to grow 6.4 percent in 2013. Growth expectations for customer relationship management (CRM) have been raised to reflect expanded coverage into e-commerce, social and mobile. Expectations for digital content creation and operating systems have been reduced as software as a service (SaaS) and changing device demands impact traditional models and markets. Telecom services spending is forecast to grow 0.9 percent in 2013. Fixed broadband is showing slightly higher than anticipated growth. 2012
2013
2013
2014
2014
Growth (%)
Spending
Growth (%)
Spending
Growth (%)
10.9
695
2.8
740
6.5
1.8
143
2.1
149
4.1
4.7
304
6.4
324
6.6
2
926
2.2
968
4.6
-0.7
1,655
0.9
1,694
2.3
2.5
3,723
2
3,875
4.1
Cisco Survey highlights growing Security and Privacy Concerns
T
he increasing level of security threats has not gone unnoticed among consumers in the Middle East region. A survey conducted by Cisco in the Middle Eastrevealed that a third of consumers in the region are concerned about the vulnerability of their online information and personal data as well as the possibility of identity theft. As a result, a surprising number of users (50%) prefer that their online browsing is kept strictly private and have high expectations that websites will keep their information confidential. However, there are concerns that in today’s internet era, the age of privacy is over. Over three quarters of respondent’s fear that they are no longer in control of their data online and are worried about how much personal data is being captured and how it is stored.
34 | July 2013
The survey findings further revealed that: • 76% of respondents in the Middle East maintain 5 to 9 passwords as opposed to 29% globally • Almost half (42%) of Middle East respondents’ “online identity” differs from their “offline identity”. Globally this was 39%. • More than half of Middle East respondents have multiple online identities (55%) as opposed to 44% globally. • In the Middle East 50% do not want their online browsing to be tracked. Globally, 40% of respondents agreed with this. • Half of respondents in the Middle East trust very few sites to keep their information private and secure (51%). Global respondents were less trusting with 49% distrusting most sites security.
www.dlinkmea.com
SECURE AND SAFEGUARD YOUR BUSINESS with D-Link IP Surveillance
Providing you with the finest end-to-end IP Surveillance solutions... It’s ideal for small and medium business environments, so whether you are running a shop front, office or a warehouse, with D-Link you’ll enjoy greater peace of mind. Manage your building and premises security review your recordings remotely on the go
DCS-6010L
DCS-7010L
•
Keep customers, employees and cash holdings safe
DCS-7513
DCS-6113
•
Capture and
DNR-322L with 3TB/6TB HDD
Wireless N HD 360 Degree Fisheye Camera
Outdoor HD Day/Night Mini Bullet Network Camera
Full HD WDR Day & Night Outdoor Network Camera
Full HD Day & Night Dome Network Camera
AUTHORIZED DISTRIBUTOR Aptec - an I ngram M icro Company P. O. Box 33550 Dubai Internet City, Dubai, UAE E-Mail: sdawda@aptecme.com
Tel.: (+971 4) 3697 111 Fax: (+971 4) 3697 110 www.apteconline.com
9-Channel 2 Bay mydlink NVR