Top Banner
D-Link has been participating at GITEX since it first opened a branch office in the UAE in 1997. More than 14 years later, the company continues to believe in the investment it makes in the region’s largest technology exhibition. “The exhibition continues to grow year after year, attracting a larger Staying relevant is staying true 60 Mins Show dates: 14-18 October 2012, Dubai World Trade Centre | AT GITEX TECHNOLOGY WEEK | Exhibition hours: 11am -7pm PICTURE OF THE HOUR FOLLOW US Strategic ICT Partner @computernewsme Technology Partners Powering IT ahead that includes the ‘Mydlink Cloud’ services that allow users to access, view, share and control their various D-Link network devices. Customers can use the services to access and control their routers, network storage devices in addition to surveillance cameras. According to Albert, the services are targeted at both SMBs and consumers looking to secure their homes or store and share files on the go. D- Link is also showcasing its portfolio of LTE based mobility solutions that are a dedicated telco offering in addition to fibre- to-home and fibre-to-building cabling solutions. “We invest a considerable amount of time and resources in understanding the various market trends and the unique needs of consumers today and create products and solutions that remain true to our core competencies and focus areas. We do this to ensure we provide our customers and partners the very best in class products and services that fits their requirements. Mobility and being able to access information on- the-go is the big draw at GITEX this year and we are sticking to the theme,” he concluded. audience and even bigger names and innovation to its grounds. This is why we are here; to showcase the innovations we are bringing to the market after considerable study and effort,” said Harrison Albert, Director, MEA at D-Link. The company is showcasing its fast growing product portfolio Harrison Albert, Director, MEA at D-Link
8

60 Mins - Day 4 - 11AM

Mar 22, 2016

Download

Documents

CPI GITEX

60 Minutes is the only publication offering up to date news on what is happening across GITEX and updating visitors on the latest happenings. It will be distributed across all the show halls via CPI stands and distribution points as well as via partner stands within the halls themselves. Covering all the show elements GITEX Business solutions, Gulf Comms, Consumer Technology & Infocomm each with their own section you can ensure you promote your stand location to the correct audience. Interviews with your key personnel will be carried both in the print edition as well as being uploaded on to our supporting website www.cpiatgitex.com.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 60 Mins - Day 4 - 11AM

D-Link has been participating at GITEX since it first opened a branch office in the UAE in 1997. More than 14 years later, the company continues to believe in the investment it makes in the region’s largest technology exhibition. “The exhibition continues to grow year after year, attracting a larger

Staying relevant is staying true

60 MinsShow dates: 14-18 October 2012, Dubai World Trade Centre | AT GITEX TECHNOLOGY WEEK | Exhibition hours: 11am -7pm

PICTURE OF THE HOUR

FOLLOW US

Strategic ICT Partner

@computernewsme

Technology Partners

Pow e r i n g I T a h e a d

that includes the ‘Mydlink Cloud’ services that allow users to access, view, share and control their various D-Link network devices. Customers can use the services to access and control their routers, network storage devices in addition to surveillance cameras. According to Albert, the services are targeted at both SMBs and consumers looking to secure their homes or store and share files on the go.

D- Link is also showcasing its portfolio of LTE based mobility solutions that are a dedicated telco offering in addition to fibre-to-home and fibre-to-building cabling solutions.

“We invest a considerable amount of time and resources in understanding the various market trends and the unique needs of consumers today and create products and solutions that remain true to our core competencies and focus areas. We do this to ensure we provide our customers and partners the very best in class products and services that fits their requirements. Mobility and being able to access information on-the-go is the big draw at GITEX this year and we are sticking to the theme,” he concluded.

audience and even bigger names and innovation to its grounds. This is why we are here; to showcase the innovations we are bringing to the market after considerable study and effort,” said Harrison Albert, Director, MEA at D-Link.

The company is showcasing its fast growing product portfolio

Harrison Albert, Director, MEA at D-Link

Page 2: 60 Mins - Day 4 - 11AM
Page 3: 60 Mins - Day 4 - 11AM

11:00 am4

Diab claims that by 2015, there will be over 50 billion mobile devices in the market, suggesting that every person will own more than one device, either for work or personal use. This results in each individual being susceptible to multiple threats.

“The risks are huge now and will continue to grow. You need to have a vigilant approach to security,” he said.

McAfee stated that GITEX is a major event for companies in the Middle East and that the opportunity to build on customer relations, especially in regards to such topics, is invaluable.

P3

With huge growth comes huge threats, says McAfeeMcAfee has sent a warning out to businesses stating that with the growth of data and cloud computing, security risks are likely to increase a huge amount over the coming years.

The security giant, exhibiting at GITEX, believes that with the advent of mobility, content driven data will continue to grow and everyone will be moving to the cloud in order to store and control their vast amounts of information.

However, Hamed Diab, Regional Manaher, MENA, McAfee, has said that the evolution of technology has made security a bigger issue than ever.

“You’re as weak as your weakest link,” he said.

“Businesses need to be educated to what the threats are and what the key solutions are in order to avoid becoming vulnerable to newer, more

“The advent of mobility, content driven data will continue to grow and everyone will be moving to the cloud in order to store and control their vast amounts of information.”

@computernewsme

sophisticated attacks. Risk is coming in multiple ways and forms, attacks can be broken down into different phases. Sometimes you won’t even know

Printed with GIT cartridges

Hamed Diab, Regional Manaher, MENA, McAfee

that you’re being attacked. Your appliances and data centre are all at risk, you need to identify your most important assets and get covered.”

Page 4: 60 Mins - Day 4 - 11AM

11:00 Am4

P4 @computernewsme

GITEX TECHNOLOGY WEEK 2012 HIGHLIGHTS

Page 5: 60 Mins - Day 4 - 11AM

11:00 am4

P5

Digital Forensic Investigations of Any Kind

Incident Response & Remediation

Training and Services

Geoff BrooksRegional Sales Manager - Middle East, India & Africa

PO BOX 211364, Dubai UAEMobile No : +971 506 527659

[email protected] www.accessdata.com

@computernewsmePrinted with GIT cartridges

Page 6: 60 Mins - Day 4 - 11AM

11:00 Am4

Bradford unveils BYOD strategy

Red Hat exhibits with Dell

mobile device coverage, and out-of-band architecture, Network Sentry 6.0 can support existing corporate network equipment and enables companies to quickly

Publisher Dominic De Sousa, COO Nadeem Hood, Managing Director Richard Judd, Commercial Director Rajashree R Kumar, Group Editor Jeevan Thankappan Editors Pallavi Sharma, Ben Rossi Sub-editor Joe Lipscombe Circulation Manager Rajeesh M, Production Manager James Tharian, Design Director Ruth Sheehy, Senior Designers Analou Balbero, Froilan Cosgafa IV, Glenn Roxas, Digital Services Manager Tristan Troy Magma

Web Developers Erik Briones, Jefferson De Joya Photographer and Social Media Co-ordinator Jay Colina

P6 @computernewsme

Bradford Networks has launched the latest version of its Network Sentry 6.0 solution at GITEX 2012. The Network Access Control (NAC) solution, Network Sentry 6.0, provides organisations with a foundation for a strong and secure bring-your-own-device (BYOD) strategy with new key features that focus on automation, enhanced platform coverage, and integration with leading security solutions.

“Implementing BYOD is now gaining popularity in the Middle East as it enables companies achieve greater productivity. The first step to a secure BYOD policy needs to be visibility and control over who and what is accessing corporate networks at all times,” said Ahmad Elkhatib, Managing

Partner, Shifra, Bradford Networks’ channel partner in the Middle East and North Africa (MENA) region. “With its automated workflows, broad network infrastructure and

Red Hat and Dell are working to enhance business collaboration in the Middle East through their participation at GITEX. The two companies will be showcasing how their joint solutions can help customers adopt virtualisation technologies that cut hardware costs, reduce energy and cooling requirements, save valuable floor space and improve worker productivity.

George DeBono, General Manager Middle East & Africa at Red Hat says, “We are looking to engage in discussions with

and easily create a granular set of BYOD policies that are tailored to specific roles within any organisation.”

Allowing BYOD in the workplace is a relatively new concept for enterprises in the Middle East, but employers are quickly warming up to the idea. The latest surveys about BYOD adoption in the Middle East say as much as 80% of companies in the region allowed some form of access to staff through their personal devices.

Network Sentry 6.0 is generally available. It can be deployed on a dedicated hardware appliance, virtual appliance or via a SaaS offering, Bradford.cloud. The same functionality is delivered in all deployment models ensuring that Network Sentry can adapt to the unique needs of any network environment and business.

potential customers at Gitex and educate them about how they can leverage Red Hat Enterprise Virtualization to get the best out of their Dell servers. Dell’s alliance with Red Hat delivers robust open source solutions that lower the total cost of ownership and provide a more flexible, scalable IT infrastructure for enterprises.”

Dell offers customers flexibility and choice with Red Hat Enterprise Virtualization, which can be purchased as an option when configuring a Dell server. The primary benefits include an open

system that offers customers a choice over proprietary solutions, an enterprise-ready environment where customers can integrate Red Hat Enterprise Virtualization into their ecosystem, cross-platform functionality as Red Hat Enterprise Virtualization works with Linux and Microsoft Windows. Besides its high-performance capabilities, Red Hat Enterprise Virtualization is also an affordable option as compared to similar virtualization solutions, offering cost savings and compelling scalability, security and agility.

Red Hat will be exhibiting from the Dell stand number CLD-22, located in Hall 7 at DWTC.

George DeBono, General Manager Middle East & Africa at Red Hat

Page 7: 60 Mins - Day 4 - 11AM

11:00 am4

Saudi tops region’s highest spam-relaying country

Security is now an enabler: Dell Sonicwall

IT security and data protection firm Sophos has published its latest ‘Dirty Dozen’ report of spam-relaying countries for the third quarter of 2012, where Saudi Arabia tops as the Middle East region’s highest spam-relaying country. Since the previous quarter, India has grown its lead at the top of the hall of shame, and now relays 16.1% of all spam captured in SophosLabs’s global network of spam traps.

The US, which was once a permanent fixture as the leading superpower in the spam stakes and last topped the table in the same period a year ago, has risen one place since last quarter and now relays one in 15 of all spam emails.

Dell Sonicwall believes that due to mobility and data growth, security as a definition has changed, becoming an enabler for businesses which can allow them to take advantage of certain industry areas that they couldn’t before.

“The consumerisation of IT is happening now and by getting on board with it, and being secure from all angles, you will have the opportunity to take advantage of social media, YouTube, Twitter, Facebook, etc,” said Florien Malecki, EMEA Enterprise Product Marketing Manager, Dell Sonicwall.

“These things are now part of business, we can gain so much knowledge from them and tap into so much unstructured data, but we have to take the proper security precautions.”

Malecki claims that IT is moving from a closed and controlled environment, into the “wild, wild west”.

“Businesses used to be so comfortable and secured, in a closed and safe environment and then suddenly people turned up and starting saying ‘I want to use my smartphone, my tablet, can I borrow your laptop to access my emails,’ etc. Users wanting access from anywhere, anytime, causes such problems for organisations.”

The new breed of employee, from the 80’s onwards, Malecki believes, is insistent on employing consumer applications and devices in the world place because of their generation. He says that this trend will continue to evolve with each passing generation.

P7@computernewsmePrinted with GIT cartridges

(having last appeared in April - June 2011) makes a return to the list, in twelfth place.

Saudi Arabia is the top new entry this quarter, relaying a significant 5.1% of spam for the period. This is likely caused by the Festi botnet which successfully infected many computers there in August and then used the computers to swamp the rest of the world with large quantities of spam. Other new entries since last quarter are Turkey and Germany, while Pakistan, Russia, Poland and Thailand have all dropped out of the table.

“Spam emails arrive in your inbox via other people’s infected computers,” said Graham Cluley, senior technology consultant at Sophos. “The latest Dirty

Dozen report suggests that a not insignificant number of PCs in India are harbouring malware infections that turn PCs into spam-spitting zombie slaves, controlled by the cybercriminals who make money by punting junk emails to promote questionable goods, or simply use malicious spam to infect more computers. The authorities in India need to make IT security education a priority. One would be safe to assume that, if computer users in the country are being targeted in order to relay spam, they are likely victims of other online threats such as fraud.”

Sophos recommends that organisations and ISPs implement technology and follow best practice to ensure that malicious emails are not reaching inboxes. Taking a global view, Asia is still the worst offending continent, responsible for almost half of the world’s spam, followed by Europe and South America.

“They want to use these tools to communicate with their clients, customers, friends and family, and they will be clinical, quick and professional with them. So enterprises can’t then say ‘we’re going to block IM’ or ‘we’re going to block social media’, because those days are gone.”

With a properly secured infrastructure, businesses will be able to extract data and information, safely from resources which haven’t previously been available, Malecki said.

“However, if you don’t control the data which is downloaded onto your device and you lose that device, all of that data is at risk, which exposes your company. If IT didn’t have any protections for the data on these devices, the

problems would be very clear. It shouldn’t take an attack to force people to act on security,” he concluded.

Graham Cluley, senior technology consultant at Sophos

Florien Malecki, EMEA Enterprise Product Marketing Manager, Dell Sonicwall

The UK, which has managed to remain out of the top twelve spam-relaying countries for the last four consecutive quarters

Page 8: 60 Mins - Day 4 - 11AM