Top Banner
REVIEW THE An in-house publication by Aptec – an Ingram Micro Company Business insights for IT solution providers 06 Microsoft Customized cloud solutions for enriched customer experiences 16 Oracle Minicluster: simple, secure and efficient 25 McAfee Integrating Machine Learning into endpoint security strategies INSIDE OCTOBER 2017 Convergence of cloud and security Exploring channel opportunities
28

Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Mar 26, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

REVIEWTHE

An in-house publication by Aptec – an Ingram Micro Company Business insights for IT solution providers

06Microsoft Customized cloud solutions for enriched customer experiences

16OracleMinicluster: simple, secure and efficient

25 McAfeeIntegrating Machine Learning into endpoint security strategies

INSIDE

OCTOBER 2017

Convergence of cloud and security

Exploring channel opportunities

Page 2: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Vendors and Contact Information

Aptec - GCC

Dubai Internet CityP.O.Box 33550Tel: (+971 4) 3697111Contact: Svetlana SorokinaEmail: [email protected]

Aptec – Egypt

KM 30 Cairo, Ismailia Desert Road ,Al-Obour Investment Complex, Al-Obour City, Cairo, Egypt Tel: (+2) 24772156 / 24772157 / 24772159 Contact: Mohamed Selim Email: [email protected] Ingram Micro– Lebanon

St. Georges Square Blk A Floor 1Jal-El-Dib, Beckanaya Str., LebanonTel: (+961) 4718817Contact: Elie Abou EmaanEmail:[email protected]

Aptec – Oman

Knowledge Oasis Muscat Building 4P.O.Box 100, Rusayl, OmanTel: +968 96429250Contact: Shivanand PalaniprasadEmail: [email protected] Aptec – Saudi Arabia Office 519, Akariya Bldg. 2, Olaya Rd P.O. Box 94609, Riyadh 11614, Saudi ArabiaTel: +966 11 460 1950 Contact: Mohammed Sheikh Email: [email protected] Ingram Micro – Morocco

Lot.33, La Colline 2, Immeuble les Alizés,Bureau 302, Sidi Maarouf, Casablanca, Morocoo Tel: +212-522 786 171/+212-522 786 223Contact: Nouha DoudouhEmail: [email protected]

Ingram Micro – Pakistan

Ingram Micro Pakistan (Private) Limited,Suite# 1310, 13th Floor, Caesars Tower,Shahrah-e-Faisal, Karachi, PakistanTel: +9221 32786675/ 32783209 Email: [email protected] Ingram Micro – Turkey

Suleyman Seba Card82 / 3 Macka 34357Istanbul, TurkeyTel: (+90 212) 259 0064Contact: Hulya ErkamEmail: [email protected]

Contact Information

Published by

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 72

Page 3: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Introduction

Know more about HPE SimpliVity hyperconverged infrastructure

Dear Partners,

The advent of cloud solutions has brought the importance of security to the

forefront. We have seen the adoption of cloud gradually picking up within the

region, although lack of strong security frameworks continues to make customers

think twice before committing to the technology.

At Ingram Micro, we encourage our partners to adopt an approach that knits security

closely with all stages of cloud deployments. The channel ecosystem needs to

enhance their competencies in different areas to be able to sell these technologies

successfully. For example, they have to build their capabilities in sales and pre-sales

for solution selling, implementation, migration and project management practices. It

is imperative that partners begin looking at key technical certifications around virtual

infrastructure environments.

As a regional value-added distributor who has been taking the lead in bringing

innovative solutions to the market, our offering ranges from solutions, services and

training around best-in-breed global cloud and security vendors. These solutions

can be combined into an easy buy, implement and use approach. We are also

focusing on dedicated programs around cloud, Infrastructure-as-a-Service (IaaS) and

security to enable partners to develop their skillsets. Additionally, we ensure our

partners have access to our advanced training sessions built for cybersecurity and

end-user trainings, which can be resold by them.

Over the course of 2018, one of our objectives is to increase our focus and

investments in both, cloud and security, as the technologies become even more

sophisticated. Our partners have a definite opportunity here and we aim to work

together to address customers’ challenges in these areas. Visit us at GITEX 2017 to

have fruitful conversations around these technologies.

Ali Baghdadi

SVP & Chief Executive

Ingram Micro META

Discover Cisco CAT 9K switches to enable digital transformation

A Complete GuaranteeHPE SimpliVity hyperconverged systems

Only HPE SimpliVity hyperconverged infrastructure delivers the enterprise-class performance, protection, and resiliency that you require, with the cloud economics your business demands.As a proof point of our platform maturity and what our capabilities can do for our customers, we o�er one of the industry’s most complete guarantees including data e�iciency, protection, simplicity, management, and availability.

HyperE�icient If you use HPE SimpliVity hyperconverged infrastructure and its built-in VM-centric backup capability as outlined below, you will achieve 90% capacity savings across storage and backup combined, relative to comparable traditional solutions.

HyperSimpleUsing HPE SimpliVity user interface, which is fully integrated with VMware® vCenter™, you only need three clicks to back up, restore, move, or clone a VM, all from a single console.

HyperManageableUsing the HPE SimpliVity user interface in a central location, in less than a minute on average, you will be able to create or update backup policies for 1000s of VMs across dozens of sites.

These guarantees are available to all customers who use HPE SimpliVity 380 and are covered under the standard HPE SimpliVity 380 product warranty, which is valid for three years after delivery of the product to the customer. The warranty is described in the HPE SimpliVity 380 QuickSpecs at hpe.com/info/simplivity.

HyperProtectedIf you use HPE SimpliVity hyperconverged infrastructure and its built-in backup capability, it will take less than one minute, on average, to complete a local backup or local restore of a 1 TB VM.

HyperAvailableYou will be able to add or replace HPE SimpliVity hyperconverged systems• Without any downtime for local or remote sites.• Without any disruption to local or remote HPE SimpliVity backups.• Without any reconfiguration of HPE SimpliVity and backup policies for local

or remote sites.• Without the need to reenter any IP addresses in remote sites.

No gimmicks, no separate contracts, no additional steps

1

3

4

5

2

HPE SimpliVity

HyperGuarantee

12

26How GFI Software and Ingram Micro alliance empowers partners

10How to protect data seamlessly across all clouds with Veritas

18

Page 4: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Aptec news

VENDOR AWARDS

Global Distribution Partner

of the Year 2017

Partner of the Year 2017 META @ Microsoft

Inspire Conference

Distributor of the

Year 2016 Gulf

Largest Global Coverage

Distributor Award Year 2017

Best Distributor Partner Development

Award Year 2017 –UAE & GULF

MENA Distributor of the Year Award 2017 @

VM World Partner Awards in Barcelona

APTEC ACCOLADESMEDIA AWARDS

Value Added Distributor of the Year 2017 -

Channel Middle East Awards

Networking VAD of the Year 2017 -

The Integrator ICT Champions Award 

Cloud Distributor of the year –

Reseller ME Readers’ Choice Partner

Excellence Awards 2017

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 74

Page 5: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Aptec, an Ingram Micro company, has been

selected as a strategic distribution partner by Dell

EMC across the United Arab Emirates, Oman,

Qatar, Bahrain, Kuwait and Yemen. The expanded

relationship builds on Aptec’s current partnership

with Dell EMC and further strengthens Ingram

Micro’s relationship with the company. The Middle

East value-added distributor’s vendor solutions

offerings now provide access to Dell EMC’s full

portfolio of products, including advanced cloud IT

infrastructure, converged systems, server/storage

solutions and Client Systems.

“We are very pleased to have Ingram Micro on

board in this important market, as they are a key

player of ICT distribution who is well connected to

the partner landscape both on a global scale and

specifically in the META region,” said Mohammed

Amin, senior vice president, Middle East, Turkey and

Africa, Dell EMC.

Ingram Micro Dell EMC forum 2017 was held last

month to announce the partnership to the channel.

Centered on ‘Powering Digital Transformation’,

the forum discussed the channel strategy and

highlighted key solutions that can help partners be

profitable in the digital era.

Going forward, we will see Ingram Micro

delivering on a joint go-to-market strategy with Dell

EMC built around its key technology differentiators.

Ingram Micro has signed training partnerships with

several global vendors such as SUSE, Red Hat, Nuix,

Aruba and Kaspersky Lab over the last few months.

As part of these collaborations, Ingram Micro’s

training center in Dubai will offer instructor-led

training modules designed to help organizations

transform to digital businesses. Channel

partners will have access to vendor-authorized

certification training, which ranges from web

classes, real labs and live instructors. Partners

have an opportunity to earn considerable margins

by adding training to their end-user solutions

and reselling to their technical end clients. With

the firm’s training modules, available across

the Middle East and Africa regions, solutions

providers stand to gain significantly. Ingram Micro

Training Academy certification training prepares

partners for certification exams designed to

measure knowledge and skills related to their

field in the IT industry.

Ingram Micro aims to bring together a large

gathering of cloud and security resellers,

VARs and vendors on a single platform at

its Cloud & Security Summit. Partners can

expect to have dedicated discussions with

over 250 cloud innovators and participate in

more than 40 sales and technical educational

sessions across three days. Ingram Micro

NEW VENDOR PARTNERSHIPS

DellEMC - Middle East region

Parallels - Middle East, Turkey and

Africa (META) region

Honeywell - Middle East region

Zebra - Gulf Region

iBoardTouch - Gulf Region

GFI - Middle East region

Enterprise portfolio - Gulf Region

NCR - Gulf Region

APG Cash Drawer - Gulf Region

NEC - Gulf Region

Middle East, Turkey and Africa

(META) Region

Aptec news

DELL EMC NAMES INGRAM MICRO AS KEY ME DISTRIBUTION PARTNER

INGRAM MICRO FORGES TRAINING PARTNERSHIPS WITH REDHAT, SUSE, NUIX, ARUBA AND KASPERSKY LAB

INGRAM TO HOST CLOUD AND SECURITY SUMMIT

Mohammed Amin, Senior VP, META, Dell EMC

speakers include Renee Bergeron, SVP, Global

Cloud Channel; Rahul Bhavsar, Director -

Cloud, META and Marc Kassis, Cyber Security

Director EMEA.

In 2016, the event saw 130 plus partner

attendees, 16 cloud vendors, 14 breakout

sessions and several keynote sessions along

with panel discussions.

a e . i n g r a m m i c r o .c o m O c t o b e r 2 0 1 7 5

Page 6: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Learn Profitable, Sustainable, Proven Global Practices & Solution Selling Techniques to Own Your End-to-End Customer Relationships & Seize Every New Opportunity.

At Ingram Micro we offer customized

solutions to all our partners to empower

them for delivering an enriched

customer experience.

Parul Pathak, Product Manager Microsoft

Gulf at Ingram Micro says, “Our strategic focus

is on offering various solutions bundled with

Microsoft products to support our re-seller

community for establishing deeper engagement

with their end-customers. We are also

supporting this initiative with our Valued Added

Services, which our resellers may leverage to

increase their efficiency & gain a competitive

edge in the market.”

We are focused on driving awareness &

momentum for Microsoft Azure as a Platform

that offers multiple solutions for unique business

needs & as for solution selling we have signed up

with Parallels (Remote Application Server).

To elaborate, Microsoft Azure is an open and

flexible cloud platform which can help you build

applications using multiple languages, tools,

frameworks, & enables easy integration for your

on-premises IT environment with the public cloud.

It offers some unique use cases like building

anything from lightweight websites to multi-

tier cloud services or accelerate Mobile App

Development by using a backend hosted on

Microsoft Azure that scales up, as your traffic grows.

One can rely on geo-redundant cloud storage for

backup, archiving, and disaster recovery.

And as for Parallels Remote Application Server

(RAS) it is powered by Microsoft Azure & makes

application and desktop delivery extremely fast,

easy, & affordable on any device.

Parallels (RAS) when deployed on Microsoft

Azure provides employees with secure, fast,

and reliable access to Windows applications

and desktops at any time, on any device, from

any location & with the advanced filtering of

Parallels RAS in Azure, the solution protects

sensitive information and enhances overall

corporate data security.

To offer all round support to our partners we

have designed 3 step Partner Engagement Model

“Enable-Engage-Encourage” where our dedicated

in-house teams will be providing one on one

consultations on Solution Selling to end customers

& owning the end to end customer relationship.

Unique to reseller needs we are offering Value-

Added Services in terms of Pre-sales (trainings,

certifications, sizing opportunities), Post-sales

(implementation, deployment) & Marketing

support to rev up reseller’s digital transformation

& establish a strong differentiated brand

presence in the region.

Last year we were awarded by Channel Middle

East with “Channel Champion Award” for our

Double Treats Campaign for Gulf Partners as

the Best Channel Marketing Campaign of the

year. This year in Microsoft WPC, Ingram Micro

won Partner of the Year Award for recruiting

maximum number of cloud partners in META

region. We are ready to support each & every

partner in the region who is focused & has

potential to transform & embark on the journey

to cloud transformation.

By Parul Pathak,

Product Manager

Parallels & Microsoft

Gulf at Ingram Micro

For consultation or queries please mail us at:

[email protected]

http://tiny.cc/microsoftazure-parallels

https://www.facebook.com/imcloud.me/

EMBARK ON YOUR PATH TO PROFITABILITY WITH MICROSOFT THROUGH INGRAM MICRO

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 76

Microsoft

Page 7: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project
Page 8: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project
Page 9: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project
Page 10: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

To successfully navigate the multi-cloud, you need to manage and protect data and workloads seamlessly across all clouds.

Avoid SiloesMulti-cloud adoption has many benefits. But productivity, performance and effectiveness can be hindered when data is not integrated and scattered across clouds and date centers.

Maintain Visibility and Control of DataThe cloud may seem like a cost-effective solution for keeping all your data. But you may be driving up both your cost and exposure to risk. Instead, identify what data you have, assess whether it is worth keeping and then migrate it to the cloud.

Reduce ComplexityBacking up to multiple clouds can increase the complexity within the IT environment. Each cloud provider uses proprietary metadata, policies and protocals that do not work accross other cloud platform, or on-pemises solutions.

Veritas 360 Data Managementremoves the complexity and cost of data siloes by consolidating multiple functions into a single platform that can accommodate your new and existing landscapes.

When you scale your data management and protection across your entire environment with Veritas, the multi-cloud becomes an extension of your strategy — rathar than a standalone piece of infrastructure.

Veritas Information Mapallows enterprise to understand what data they both on-premises and in multiple clouds. These insights can inform decision about what keep, archive or delete.

Migrate your data to the cloud or even between clouds intelligently, by first gaining visibility of your entire environment.

Veritas NetBackupenables enterprise to extend their data protection platform to the cloud using the same policies as your other servers. The reslut: greater controls and visibility that ever before.

Protect physical, virtual and cloud environments through a single platform that leverages the same policies and processes no matter where your data is being backed up.

VERITAS CLOUDVERITAS 360 DATA MANAGEMENT: VERITAS MULTI-CLOUDS ONE APPROACH:

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 710

Veritas

Page 11: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

NIT an Ingram Micro Company, P.O. Box 23043, Dubai, UAE - www.nit.ae

Regional value added distributor of complete IP surveillance and security solutions for META Region

Specialized Security Distribution

Page 12: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

ONE infrastructureAn infrastructure so intelligent, it can adapt to every workload and deliver services at lightning speed

TWO operating modelsA new category of infrastructure designed to accelerate application delivery in both traditional and new IT environments.

FOUR big benefits for IT and businessReduce cost: Up to 30 percent reduction in ongoing CAPEX SavingsDeploy at cloud-like speed: Minutes to provision a workload-ready hostSimplify apps: One step to implement updatesDevelop more apps: Single line of code to stand up infrastructure

THREE design principlesFluid resource pools: Single infrastructure of disaggregated resourcesSoftware-defined intelligence: Template-driven workload composition Unified API: Infrastructure as code

FIVE elements to HPE Synergy Composer: Composes infrastructure at near instant speedsComposable frame: All resources needed to run any applicationComposable compute: Full portfolio for performance and scalabilityComposable storage: High density integrated storageComposable fabric: Rack scale multi-fabric connectivity

Learn more athpe.com/info/Synergy�

HPE SynergyThe first platform achitected for Composable Infrastructure

Page 13: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

A Complete GuaranteeHPE SimpliVity hyperconverged systems

Only HPE SimpliVity hyperconverged infrastructure delivers the enterprise-class performance, protection, and resiliency that you require, with the cloud economics your business demands.As a proof point of our platform maturity and what our capabilities can do for our customers, we o�er one of the industry’s most complete guarantees including data e�iciency, protection, simplicity, management, and availability.

HyperE�icient If you use HPE SimpliVity hyperconverged infrastructure and its built-in VM-centric backup capability as outlined below, you will achieve 90% capacity savings across storage and backup combined, relative to comparable traditional solutions.

HyperSimpleUsing HPE SimpliVity user interface, which is fully integrated with VMware® vCenter™, you only need three clicks to back up, restore, move, or clone a VM, all from a single console.

HyperManageableUsing the HPE SimpliVity user interface in a central location, in less than a minute on average, you will be able to create or update backup policies for 1000s of VMs across dozens of sites.

These guarantees are available to all customers who use HPE SimpliVity 380 and are covered under the standard HPE SimpliVity 380 product warranty, which is valid for three years after delivery of the product to the customer. The warranty is described in the HPE SimpliVity 380 QuickSpecs at hpe.com/info/simplivity.

HyperProtectedIf you use HPE SimpliVity hyperconverged infrastructure and its built-in backup capability, it will take less than one minute, on average, to complete a local backup or local restore of a 1 TB VM.

HyperAvailableYou will be able to add or replace HPE SimpliVity hyperconverged systems• Without any downtime for local or remote sites.• Without any disruption to local or remote HPE SimpliVity backups.• Without any reconfiguration of HPE SimpliVity and backup policies for local

or remote sites.• Without the need to reenter any IP addresses in remote sites.

No gimmicks, no separate contracts, no additional steps

1

3

4

5

2

HPE SimpliVity

HyperGuarantee

HPE SimpliVity HyperGuarantee

Page 14: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

CONVERGENCE OF CLOUD AND SECURITY

Editorial

Identifying that security is integral to a successful cloud deployment, Ingram Micro proposes a joint approach that includes key elements from

both technologies for partners to maintain profitability in this space.

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 714

Page 15: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

business owners. “Or, they need to give enough

confidence to these customers through reporting

of the control aspect of the business processes.

For instance, provide the information on number

of connections or non-authorized attempt to

connect, etc. All these aspects need to be part of

the proposed cloud solutions.”

As security is essential in all aspects of cloud,

from storage and data protection to network

visibility, it is imperative that partners who sell

cloud solutions also have expertise in security-

related solutions.

Marc Kassis, Cyber Security Director, Ingram

Micro EMEA says, “Ingram Micro is proposing

a joint cloud and security approach to all our

business partners. Our offering ranges from

solutions, services and training that can be

delivered to end-users. We also bundle cloud and

security vendors into an easy buy, implement and

use approach. We operate in this model to bring

ready go-to-market and fast growth.”

In such a scenario, partners should focus

on building their capabilities around sales and

pre-sales for solution selling, implementation,

migration and project management practices

and key technical certifications around virtual

infrastructure environments, he adds.

To refine partners’ skillsets in these areas

within the cloud and security space, Ingram

Micro is focusing on programs around cloud,

Infrastructure-as-a-Service (IaaS) and security.

“For instance,” Bhavsar explains, “the IaaS

program helps resellers with opportunity

generation within the IaaS space as well as one

click solutions on IaaS platforms and hybrid

cloud offerings. Other Ingram Micro initiatives

As the advantages of cloud are well-

understood by organizations, we see the

adoption levels increasing rapidly on a

global level. Benefits such as scalability, flexibility, cost-

effectiveness and pay-as-you-go models are attractive

to both enterprise as well as SME businesses.

Middle East customers didn’t immediately

warm up to the reality of cloud, although it

has picked up significantly over the last few

years. One of the main reasons for this was

that regional customers viewed cloud solutions

as insecure. While this viewpoint is gradually

diminishing, security within cloud infrastructures

continue to be a fundamental factor for

customers to adopt cloud solutions.

According to Rahul Bhavsar, Director, Cloud

Sales, Ingram Micro META, the core challenge

customers have faced in the past and continues

to do so today is around data.

He says, “Data migration and its security on the

cloud are vital aspects for any business. Over the

last few months, we have observed an increasing

appetite for migration to the cloud within regional

customers. Although the industry has paid attention

to data security, the lack of robust frameworks is

leading to hesitation among customers.”

There is no disputing that security is definitely

closely intertwined in a cloud-first business

landscape. In such an environment, what are

the elements partners must keep in mind before

deploying a related solution? The first key aspect

is to understand that when it comes to cloud

solutions for enterprises, it means a loss of direct

control on their data and processes.

This is why, says Bhavsar, cloud solution

providers must focus on offering control to the

include technical enablement programs, partner

marketing programs for opportunity generation,

fully automated Cloud Marketplace and

Professional Services.”

Ingram Micro META region has built a

comprehensive enablement training session for

cybersecurity, which is provided to all its business

partners. The distributor has also created a complete

range of end-user trainings that can be resold.

Kassis says, “We also provide Assessment

Services and Consultancy to help our channel

partners address new markets. We also deliver a

large quantity of contents through white-papers and

webinars as well as events such as the upcoming

Cloud and Security Summit to communicate, educate

and deliver the best solutions to our market.”

Over the last year, the regional value-added

distributor has experienced a strong double

digit growth in its security portfolio. The channel

opportunities will continue to develop in 2018 as

security increasingly becomes intertwined with all

technology layers deployed at an enterprise.

“We also see many new vendors emerging and

growing quickly in the domains of Investigation

and Forensic, Data Protection, Identity

Management, etc.,” adds Kassis.

Bhavsar says, “We are expecting our overall

cloud business to grow between 20 to 25 percent

as compared to last year. We are anticipating a

steeper increase in the IaaS space, considering

our focus and investments in this space.”

As the regional security and cloud markets

are set to grow even further, channel partners

must maximize the opportunities and reach out

to distribution partners such as Ingram Micro for

in-depth support to develop their offerings.

As security is essential in all aspects of cloud, from storage and data protection to network visibility, it is imperative that partners who sell cloud solutions also have expertise in security-related solutions.

Rahul Bhavsar, Director, Cloud Sales, META

Marc Kassis, Cyber Security Director, EMEA

a e . i n g r a m m i c r o .c o m O c t o b e r 2 0 1 7 15

Page 16: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

ORACLE MINICLUSTER

Oracle MiniCluster Virtual Assistant

• Dramatically simplifies and accelerates day-to-day

operation, eliminating the need for specialized

system administration skills and training

Database automation

• Provides an easy, error-free approach to

implementing Oracle Real Application Clusters

and highly available Oracle Database instances

• Support for Oracle Database Enterprise Edition

and Oracle Database Standard Edition 2

Security automation

• Activate and configure hundreds of technologies

and integrated security controls with the push of

a button

• Easily comply with DISA-STIG, PCI-DSS and CIS

equivalent security profiles

Patch automation

• Execute pretested and verified rolling, full-system

patches and updates faster with less risk

Compliance automation

• Verify security by running compliance reports

with the push of a button

Silicon Secured Memory

• Secures databases and applications from

tampering and unreliability

Cryptographic acceleration

• The industry’s most advanced wide-key

cryptographic acceleration provides end-to-end

network and data encryption with virtually no

performance cost

Data analytics accelerators

• Dramatically speed up analytics by offloading

key operations to data analytics accelerators

High-performance and high-efficiency architecture

• Reduce software and hardware footprint with

SPARC processors that deliver 50 to 100

percent better Oracle Database and Java

application performance per core than any

comparable x86 processor

Simple, Secure & Efficient

JULIE VARGHESE

ORACLE Business Unit Manager

Email: [email protected]

ABDALLA QUQAS

Oracle Technical Manager

[email protected]

TANIA THOMAS

Oracle Sales Executive

[email protected]

Oracle MiniCluster S7-2 is a simple and efficient engineered system designed to

run enterprise databases and applications with uncompromising security. Oracle

MiniCluster is integrated server, storage, networking, and software systems that

provide maximum end-to-end database and application efficiency, and security while re-

ducing complexity and delivering the lowest total cost of ownership. Oracle MiniCluster

is ideal for Oracle Database and Oracle application customers looking to maximize return

on their software investment. Listed below are the features and benefits of Minicluster:-

Oracle MiniCluster

For more information on the product, please get in touch with Oracle team at Aptec – An Ingram micro company.

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 716

Page 17: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Millions of data points. A singular vision.Data Visionaries Wanted

©2017 NetApp, Inc. All Rights Reserved. NETAPP, the NETAPP logo, and the marks listed at http://www.netapp.com/TM are trademarks of NetApp, Inc. Other company and product names may be trademarks of their respective owners.

netapp.com/datavisionary

Page 18: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Technology trends such as big data and Blockchain are beginning

to take their place on the ground, in government and business

strategies for digital transformation, and in the transformation of

industry towards the next leap; the industry 4.0.

Cisco Digital Transformation; at a glance Digital transformation is the process of re-defining the strategies, plans,

services and customer experience to create a sustainable and competitive

advantage for the organization. Cisco solutions provide the innovative

network services to keep pace with the accelerated growth in data and

digital business services.

How Cisco help organizations applying the Winning Infrastructure model for Digital Transformation Journey• Security

Cisco CAT 9K switches enable AES-256 MACsec encryption is

the IEEE 802.1AE standard for authenticating and encrypting

packets between switches. They provide segmentation and

micro-segmentation. The Encrypted Traffic Analytics (ETA)

help you detect malware and other threats on encrypted

traffic as first line of defense starting from the access layer.

The Cryptographically signed images provide assurance that

the firmware, BIOS, and other software are authentic and

unmodified. Cisco Trust Anchor module provides single-chip

solution provides hardware authenticity assurance.

A BLUEPRINT FOR DIGITAL TRANSFORMATIONCisco Catalyst 9000 Series (CAT 9K)

• IOT-ReadyThe IOT-Ready CAT9K switches delivers scalability, convergence and application-

visibility to the top-down and bottom-up approach of network design, making the

network able to offer world-class mobility services and bandwidth capacity.

• Open for Cloud and Integration CAT 9K switches are able to handle more complex workloads with the

ability to act as self-starter infrastructure. Cisco IOS® XE 16 delivers

advanced programmability across the different infrastructure resources.

They apply Software-Defined Access (SD-Access) and the Cisco Application

Policy Infrastructure Controller Enterprise Module (APIC-EM), delivering the

policy-based automation from edge to cloud.

• Able to enhance workers and end user experience.The next generation infrastructure should be able to secure, authenticate

and authorize users while delivering the highest level of innovative

collaboration services and connected mobile experience.

By Waddah Fadul, Cisco Infrastructure Consultant at Aptec –An Ingram Micro Company.

For consultation or queries:

[email protected]

https://www.facebook.com/Aptec.Ingramflyhigher.Cisco.Page/

@flyHigherME

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 718

Cisco

Page 19: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Copyright © 2017 Symantec Corporation. All rights reserved.

We Are The Cloud Generation. The Cloud Generation is everyone who lives and works in this unique era— as computing breaks the boundaries of desktops and data centers to embrace the mobile, social, global, crowd-sourced, always-on realities

of modern life. It’s a time when critical data, applications and infrastructure are shifting from “behind the firewall” to “running on the cloud.” Some of us are “all in.” Some are only 20% there. Yes, it’s liberating. And yes, it’s chaotic. Symantec is here to help.

Securing the Cloud Generation

SYMC_230x275_PrintAd_EMEA.indd 1 8/29/17 7:21 AM

Page 20: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Mohammad Sabry, Head Of Services, Gulf and Near East, Aptec - an Ingram Micro company

Ingram Micro

INGRAM MICRO ADVANCED SOLUTIONS

PROFESSIONAL AND TRAINING SERVICES

As a distributor, Ingram Micro serves a wide range of partners in the region with diverse technologies. Ingram Micro’s services role is to provide its partners with increased expertise in the skill-set and

background required to optimize full solution deployment.

The vendors in Ingram Micro’s services

portfolio are A10, Netapp, Cisco, Vmware, Veeam,

IBM, Symantec, Nexthink, Veritas, Aruba, McAfee,

Kaspersky Lab, Nuix, SUSE, Microsoft, HP.

opportunities. This in turn leads to better support

for their customers.

The Ingram Micro management team is largely

focused on delivering added value to its partner

community by offering skill development resources

regionally to all its partners in the META region.

Ingram Micro is currently a certified services

delivery partner to select vendors and it supports

these vendors by delivering their own branded

services to enterprise clients through its pool of

resources located in UAE, KSA, Egypt, Turkey and

South Africa.

Ingram Micro actively encourages its partners

to reach out and rely on its structured services

sales team to help identify opportunities and

assist in expanding services.

With the current economical market

conditions, naturally the budgets for

training and development of partners

are being allocated and spent more carefully.

The same is evident with end users such as

enterprises and government verticals. This has

led to an increased number of partners relying

on distributor implementation and deployment

of services.

Ingram Mirco offers its partners the option to

train their engineers and maintain the running

of their development plans at a reduced cost

through the Virtual Training Delivery option.

Ingram Micro runs several campaigns and

promotional offers on its services to encourage

and enable its partners to attain new business

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 720

Page 21: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project
Page 22: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project
Page 23: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project
Page 24: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project
Page 25: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

Raj Samani, Head of Strategic Intelligence, McAfee LLC

McAfee

a e . i n g r a m m i c r o .c o m O c t o b e r 2 0 1 7 25

MACHINE LEARNING – TAKING YOUR SECURITY TEAM TO THE NEXT LEVEL

valuable investigation and response data would

be available through the already-present endpoint

management console. The presence of machine-

learning technology results in significant time

savings – by a factor of 10 is not uncommon – that

can help security teams keep the business running

Elevate security teams with machine learning

People matter the most, but combining human

intelligence with machine-learning technology

creates strong security teams. With machine-

learning assistance, security teams have greater

insight into who the attacker is, the methods

being used, where the attacks are coming from

and how they are spreading, as well as which

security measures are working and which are

being defeated.

To conclude, machine learning should be a

critical component of an enterprise’s endpoint

security strategy. Given the volume and evolution

of attacks hammering away at endpoints,

security must be able to adapt without human

intervention, and must provide the visibility and

focus to enable humans to make more informed

decisions. Machine learning has come of age

with big data driving accuracy up and false

positives down. The proof of successful human

and technology teaming will be seen in the ability

to rapidly dismiss alerts and accelerate solutions

to thwart new threats. Your users deserve the

best that cybersecurity has to offer, and today

the best endpoint security products leverage

machine learning.

learning into endpoint security is the amount of

relevant data consumed by the algorithms.

Machine learning manifests itself in multiple ways

in helping save security teams’ time and energy:

User experience is optimized - Machine-

learning algorithms feed information to the

endpoint about file attributes that indicate the

presence of malware. These attributes may be

related to type, size and source, as well as header

anomalies and detected sequences of operating

system calls. A quick scan before execution

allows security to perform its preliminary triage

without souring the user experience.

Suspicious behaviour flagged automatically -

Once the program is running, machine learning

on the endpoint monitors behaviour for signs

of an attack. This runtime detection is keyed by

information on attack tactics again uncovered by

machine-learning analysis of malware samples

in the datacentre. While pre-execution checks

file attributes to make a malware decision,

runtime execution requires knowledge of specific

actions attackers are likely to use. For example,

ransomware can render your files useless in

less than a minute. Machine-learning analysis

of ransomware attacks may uncover timing and

access patterns of file shares that would indicate

an attack is underway – allowing endpoint security

to stop the threat before all files are encrypted.

Highly valuable investigation and response

data available automatically - Helping security

teams respond to an incident, machine learning

can identify suspicious connects and create

alerts based on equations. In this case, security

analysts need precise information on the threat

such as files touched, registry changes, server

connections, etc. Because machine learning

looks across multiple dimensions, much of the

data that incident response teams require is

already available, but has traditionally required

extensive manual correlation. Ideally, highly

In relation to cybersecurity, machine learning

has been changing the game as a means of

managing the massive amounts of data within

corporate environments. However, machine

learning lacks the innately human ability to

creatively solve problems and intellectually

analyse events. It has been said time and again

that people are a company’s greatest asset.

Machine learning makes security teams better,

and vice versa. Human-machine teams deliver

the best of both worlds.

Machine learning allows endpoint security to

continually evolve to stop new attack tactics

The dark web is driven by intelligent bad actors

who are often financially motivated to create

new threats with new attack techniques. Security

becomes personal when considering the people

behind the attacks, making the human-machine

team the best sustaining defence. While machine

learning can detect patterns hidden in the data at

rapid speeds, the less obvious value of machine

learning is providing enough automation to allow

humans the time and focus to initiate creative

responses when responses are less obvious.

By using a filter for optimization across the best

advantages of human and machine elements, it’s

easier to evaluate the relationship between them.

Machine learning adds critical capability to

security strategies

The process of security researchers analysing

malware to develop signatures is still important,

but only as a capability to address the large

volume of known malware because it cannot

be expected to evolve quickly enough to meet

the rapid pace of malware being introduced to

the wild. Machine learning becomes the fastest

way to identify new attacks and to push that

information out to endpoint security platforms.

The key differentiator in incorporating machine

Page 26: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

SELLING NETWORK SECURITY AND COMMUNICATIONS

SOLUTIONS JUST GOT EASIERThanks to the GFI

Software and Ingram Micro partnership

Finding the right technology vendor to partner with can be a daunting task. IT resellers and

cloud service providers need a vendor that will support their business, providing the right

tools and products to fulfill the needs of their customers and enable future growth. For

partners based in META (Middle East, Turkey and Africa), the wait to find the right one is over!

Earlier this year, GFI Software and Ingram Micro announced their expanded partnership. The

agreement means that channel partners in 16 additional countries, including Afghanistan, Algeria,

Bahrain, Egypt, Iraq, Jordan, Lebanon, Kuwait, Morocco, Oman, Pakistan, Qatar, Saudi Arabia,

Tunisia, United Arab Emirates and Yemen, have access to GFI’s full range of award-winning

network security and communications solutions and a great network of support from a distributor

that is 100% committed to the channel.

Together, the two companies are on an exciting growth journey. Earlier this year, GFI released

two new products to the market; GFI OneConnect, a cloud-based email security and continuity

platform, and GFI OneGuard, an IT management platform which centralizes, simplifies and

automates the process of managing the security status of machines, network resources and

users. Not only that, GFI acquired two companies, Kerio Technologies and Exinda. With the

product portfolio continuing to grow, partners are all set to have their pick of the best technology

to better serve small and medium-sized businesses (SMBs).

To find out more about the partnership and what it means for partners in the META (Middle East,

Turkey and Africa) region visit http://meta.ingrammicro.com.

a e . i n g r a m m i c r o .c o mO c t o b e r 2 0 1 726

GFI

Page 27: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

The Ingram Micro Cyber Security Business Unit offers an expansive suite of Technical, Consultancy and Managed Security Services. We have developed a wide range of Cyber Security services by building key and exclusive relationships with our vendors. As a result, we are able to help maximize our Business Partners’ revenue potential and grow our vendors in the META region.

Our Partners

IM Cyber Security Trainings► Fundamentals of Information Security

► CyberSAFE: Security Assets for the End User

► Cyber Security First Responder (CFR)

► CompTIA Network Plus (N+)

► CompTIA Security Plus (S+)

► CompTIA Advanced Security Practitioner

► Certified Information Systems Security

Professional (CISSP)► PCI DSS & Payment Card Security

► ISO 27001

► Fundamentals of a Formal Information

Security Risk Assesment► Information Security Risk Assessment as

per NIST SP 800-30, OCTAVE & ISO 27005

INGRAM MICRO CYBER SECURITY DIVISION CONTACTS

Web: http://security.ingrammicro.comEmail: [email protected]

OFFICE ADDRESS

Ingram Micro, P.O.Box: 33550, Dubai Internet City – UAETel: +971 4 369 7111 | Fax: +971 4 369 7110

For our latest Cyber Security Webinar Recordings, please visit the link http://security.ingrammicro.com/News/Events-Webinars.aspx

Public Discovery Report (PDR)

Vulnerability Assessment (VA)

Web Malware Detection Scanning

Web Application Scanning (WAS)

Penetration Testing

Blackbox Testing (PT)S

PCI DSS ASV Scan

IM Cyber Security Assessment Services

Cyber Security Governance

Policies & Procedures Review

Security & Operations Review

Risk Assessment

Physical Security Assessment

Incident Management

Access Control Review

Compliance Assessment

IM Cyber Security Consultancy Services

Unlocking Cyber Security Potential

Page 28: Convergence of cloud and security - Ingram Microae.ingrammicro.com/ae/media/Review-Magazines/TheReview_Aptec_Oct17.pdf · for solution selling, implementation, migration and project

McAfee and the McAfee logo are trademarks or registered trademarks of McAfee, LLC or its subsidiaries in the US and other countries. Copyright © 2017 McAfee, LLC

Learn more about dynamic endpoint threat defense, pervasive data protection, data center and cloud defense, and intelligent security operations at www.mcafee.com/us/solutions.

Your securityproducts workingas one. That’s orchestration.Together is power.