Top Banner
value plus the QUARTERLY 06 HP Enterprise 08 Gigamon 11 Trend Micro 13 EMC 15 Barracuda 18 Oracle 21 Dell Software July 2015 presents A SPECIAL PUBLICATION FROM REDINGTON GULF VALUE DIVISION Redington Value carves innovative prospects in software-defined IT REDEFINING IT LANDSCAPE
24

ValuePlus July 2015

Jul 22, 2016

Download

Documents

ValuePlus Quarterly is a special publication from Redington Gulf Value Division
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: ValuePlus July 2015

valueplustheQ U A R T E R LY

06 HP Enterprise08 Gigamon11 Trend Micro13 EMC15 Barracuda18 Oracle21 Dell Software

July 2015presents

A SPECIAL PUBLICATION FROM REDINGTON GULF VALUE DIVISION

TM

Redington Value carves innovative prospects in software-defined ITREDEFINING IT LANDSCAPE

Page 2: ValuePlus July 2015

For more information or to place an order on Barracuda,please write to [email protected]

Barracuda Advantages include:

• Industry-leading deduplication to reduce backup windows and storage requirements

• Seamless integration with Microsoft and VMware

• Instant recovery with LiveBoot™ for VMware

• No per-server or per-application fees

• Award-winning customer service

Complete data protection for physical and virtual servers, including:

Barracuda Backup reduces complexity and saves time by integratingsoftware, storage and cloud technology in an all-in-one solution.

Simple and Affordable Backup and Recovery forVirtual and Physical Servers.

Barracuda Backup

www.barracuda.com | Office 202, Building 12, Dubai Internet City, PO Box 500444, Dubai, UAET: +971 4 4534 664 | E: [email protected]

Page 3: ValuePlus July 2015

right time without hesitation. Every opportunity comes with risk, however with detailed research and understanding of the market, partners can ride the growth wave.

The first quarter has been a good one for us as a company, and I take this opportunity to thank all our partners for their untiring efforts. As we enter the summer months, we hope your business grows successfully and profitably.

Yours sincerely,

Raj Shankar,Managing Director, Redington Gulf

06 HP Enterprise: Scale up

08 Gigamon: New partnership with Redington Value

11 Trend Micro: Safeguarding assets

13 EMC: Empowering businesses

15 Barracuda: Next-gen defense

18 Oracle: Exceptional experiences

20 Redington Value Events

21 Dell Software: Boost performance

CONTENTS06 11

21

Dear Partners,

Developments in the technology sphere have resulted in enabling organizations to enhance

its operations in the most optimized manner possible. Today we hear a lot more about software-defined IT, where the infrastructure of a business can be completely virtualized to gain competitive advantages.

Virtualization has been the background trend fueling the growth of many emerging trends in the last few years. Today the entire technology stack of an organization, right from compute, network to storage and

FROM THE DIRECTOR:security can be software-defined, allowing for cost savings and enhanced productivity.

Partners must seize the opportunities present in this space and look at upskilling in order to sustain a profitable business. Customers expect reseller partners to be in a position to advise them on emerging solutions and how it can be customized to suit their requirements. Partners need to be ‘proactive’ and not wait for vendors’ mandate. This is necessary for partners to grow faster and stay ahead of the technology curve. The challenge for partners is to identify and dive into the right opportunity at the

Scale up Safeguarding assets

Boost performance

Barracuda Advantages include:

• Industry-leading deduplication to reduce backup windows and storage requirements

• Seamless integration with Microsoft and VMware

• Instant recovery with LiveBoot™ for VMware

• No per-server or per-application fees

• Award-winning customer service

Complete data protection for physical and virtual servers, including:

Barracuda Backup reduces complexity and saves time by integratingsoftware, storage and cloud technology in an all-in-one solution.

Simple and Affordable Backup and Recovery forVirtual and Physical Servers.

Barracuda Backup

www.barracuda.com | Office 202, Building 12, Dubai Internet City, PO Box 500444, Dubai, UAET: +971 4 4534 664 | E: [email protected]

July 2015 The ValuePlus Quarterly 3

For more information, please write to [email protected]

Page 4: ValuePlus July 2015

VIEWPOINT BY RAMKUMAR

Dear Partners,

Over the last quarter, we have been conversing about a number of emerging technologies that are set to revolutionize business. Software-defined IT has been gaining prominence as regional organisations are looking

to technologies that can cut down their costs and boost their productivity.

This is a disruption in the market as it is transforming the way customers look at networks. Early adopters of software-defined IT technologies such as SDN, cloud networking, Network Functions Virtualization (NFV) are acquiring incredible benefits. And it will only be a matter of time before businesses begin to deploy these solutions as a norm.

Keeping in line with the recent market trends, Redington Value has been leading the space attempting to drive our directive of being a solutions distributor. In an era where almost all functions of a business can be virtualized, organizations now also need to be wary of security threats that can arise in such an environment. In the last quarter, GISEC was a great event for us, where we had the chance to meet up with existing partners and also create new relationships. We have signed up new partnerships with security vendors – Shavlik, Fidelis and Niksun – at GISEC 2015, and have also signed a strategic deal with Gigamon, which further strengthens our security portfolio.

Partners need to watch out for technologies that are interrelated and identify the best ways to optimize the opportunities present in all the areas. Often, when approaching a customer, a partner might be able to suggest an add-on solution, after understanding the technology and the requirements from the customer. It is not enough to simply implement what is expected but to walk that extra mile to lock in lucrative deals. To sustain a continued growth, this is an important factor.

We wish you a great quarter ahead and look forward to carrying out our conversations with you. Regards, Ramkumar BPresident, Redington GulfValue Division

Going the extra mile

4 The ValuePlus Quarterly July 2015

For more information, please write to [email protected]

Page 5: ValuePlus July 2015

Protect your information against targeted attacks

• Protection of physical and virtual assets, data, information, communication and intellectual property

• Address issue of targeted attacks given pressures to do more with less

• Ensure seamless integration with existing infrastructure, applications, environments and process

Deep Discovery detects and identifi es evasive threats in real time

It also provides the in-depth analysis and actionable threat intelligence that drives the Custom Defense solution. Advanced threat detection and targeted integration with other security products allows you to adapt and respond to your attackers at multiple points with comprehensive cyber security. Custom signatures and custom-defi ned sandboxes stop your attackers from taking your valuable information.

DEEP DISCOVERYTrend Micro

Targeted attack detection, in-depth analysis, and rapid response

FLO001815 - 4 x A4 Advert | new size 2015.indd 2 2015/05/26 11:46 AM

For more information or to place an order on Trend Micro,please write to [email protected]

Page 6: ValuePlus July 2015

Cloud computing is increasingly attractive to businesses because of the agility, cost savings, and

efficiency it provides. However, these same businesses are finding

Scale upLearn more about HP’s Virtual Cloud Networking SDN application, which helps build a robust multi-tenant networking infrastructure.

Orchestrating a robust networkThe HP Virtual Cloud Networking (VCN) SDN application can help you do just that. The HP VCN SDN application is the enhanced networking module of HP Helion OpenStack, delivering network virtualization enabled by Software-defined Networking (SDN) and orchestrating the entire datacenter infrastructure.

The VCN SDN application helps cloud providers and enterprises build a robust multitenant networking infrastructure that is able to

themselves limited by the complexity and disjointed architecture of legacy networks: not only are legacy networks complex, they are also slow to provision new services and are

labor intensive. They do not have the agility to meet the challenges of “The New Style of IT”, characterized by the interrelated trends of cloud, security, mobility and Big Data.

In order to meet the constantly evolving needs of your customers, you need a network infrastructure that works with you, not against you—one that not only is agile enough to deliver robust and scalable services, but also simple enough to lower costs and limit complexity.

FOCUS | HP ENTERPRISE

6 The ValuePlus Quarterly July 2015

For more information, please write to [email protected]

Page 7: ValuePlus July 2015

deliver ready-to-use compute, storage, and networking. It provides:

• Scalable, secure, and hardened enterprise cloud networking

• Automated delivery of secure isolated networks in minutes

• Unified physical and virtual control and visibility

• Complete access to an open SDN ecosystem that includes HP and third-party SDN applications

HP VCN SDN applicationThe HP VCN SDN application integrates with the HP Virtual Application Networks (VAN) SDN controller and leverages OpenFlow to create a unified control for the deployment of dynamic policy on both the virtual (Open vSwitch) and physical (HP and third-party) networks. VCN provides a multitenant network virtualization service for KVM and VMware ESX multi-hypervisor data center

applications, offering organizations both open source as well as proprietary solutions. Multitenant isolation is provided by centrally orchestrated VLAN or VXLAN-based virtual networks, operating over standard L2 or L3 data center fabrics.

Bare-metal (non-virtualized) servers and appliances can be supported in a VXLAN environment, with the addition of HP 5930 switches, to provide the hardware tunnel end-point function. In a fully virtualized deployment, the existing data center switching infrastructure can be retained without the need for costly upgrades. OpenFlow 1.3-enabled devices are recommended to realize the full benefit of SDN-based data center applications.

HP Intelligent Management Center—supporting networking virtualizationThe HP Intelligent Management Center (IMC) manages the traditional

networking fabric in HP and heterogeneous environments, and has added support for networking virtualization. IMC offers single-pane-of-glass management, allowing you to provision and monitor both physical and virtual networks, essential for non-cloud (OpenStack) deployments. For cloud deployments, IMC serves as the assurance monitoring solution for the network and applications in a VCN deployment.

Use the network to innovateOpen APIs enable HP and third-party developers to create innovative solutions for the management, provisioning, and orchestration of an OpenStack cloud. VCN maintains full API compatibility with the current OpenStack Icehouse release while implementing changes that dramatically enhance the performance, scalability, and stability of cloud network deployments.

VCN helps you to monetize applications quickly and drive bottom-line value, as well as to improve the end-user application experience. The HP open SDN ecosystem and HP SDN App Store drive innovation and deliver the agility that you increasingly need to stay competitive.

The HP VCN SDN framework provides a common view of the virtual/physical, overlay/underlay, tenant/provider network within the Helion OpenStack cloud, allowing you to transform data center operations.

HP Helion OpenStack—a complete cloud platformHP Helion OpenStack, built upon OpenStack, is an open and extensible scale-out cloud platform for building and consuming hybrid clouds. This solution is a hardened and curated commercial-grade product designed to deliver open-source cloud computing technology in a resilient, maintainable, and easy to install solution.

HP VCN provides several enhancements to Neutron which are listed in the table

July 2015 The ValuePlus Quarterly 7

For more information, please write to [email protected]

Fact sheet

HP Virtual Cloud Networking SDN application

Orchestrating a robust network

The HP Virtual Cloud Networking (VCN) SDN application can help you do just that. The HP VCN SDN application is the enhanced networking module of HP Helion OpenStack, delivering network virtualization enabled by Software‑defined Networking (SDN) and orchestrating the entire datacenter infrastructure.

The VCN SDN application helps cloud providers and enterprises build a robust multitenant networking infrastructure that is able to deliver ready-to-use compute, storage, and networking. It provides:

• Scalable, secure, and hardened enterprise cloud networking

• Automated delivery of secure isolated networks in minutes

• Unified physical and virtual control and visibility

• Complete access to an open SDN ecosystem that includes HP and third-party SDN applications

HP VCN SDN application

The HP VCN SDN application integrates with the HP Virtual Application Networks (VAN) SDN controller and leverages OpenFlow to create a unified control for the deployment of dynamic policy on both the virtual (Open vSwitch) and physical (HP and third-party) networks.

VCN provides a multitenant network virtualization service for KVM and VMware ESX multi‑hypervisor data center applications, offering organizations both open source as well as proprietary solutions. Multitenant isolation is provided by centrally orchestrated VLAN or VXLAN-based virtual networks, operating over standard L2 or L3 data center fabrics.

The need for network agility

Cloud computing is increasingly attractive to businesses because of the agility, cost savings, and efficiency it provides. However, these same businesses are finding themselves limited by the complexity and disjointed architecture of legacy networks: not only are legacy networks complex, they are also slow to provision new services and are labor intensive. They do not have the agility to meet the challenges of “The New Style of IT”, characterized by the interrelated trends of cloud, security, mobility and Big Data.

In order to meet the constantly evolving needs of your customers, you need a network infrastructure that works with you, not against you—one that not only is agile enough to deliver robust and scalable services, but also simple enough to lower costs and limit complexity.

SDN

arc

hite

ctur

e

Inte

llig

ent

Man

agem

ent

Cent

er

Application

Control

Infrastructure

Compute Storage NetworkingHP VCN

SDN App

HP Helion OpenStack Other orchestration

tools3rd-party SDN Apps

HP VAN SDN Controller

VM

VM

VM

Unified overlay and underlay

Resilient Fabric

New New HP SDN Apps

Figure 1. HP Virtual Cloud Networking SDN application

Page 8: ValuePlus July 2015

Redington Value signs strategic new partnership with Gigamon

Redington Value, the value-added distribution division of Redington Gulf, a leading IT

distributor in the Middle East and Africa, has forged a strategic distribution agreement with Gigamon, leading IT security vendor that provides an intelligent Visibility Fabric architecture for enterprises, data centers and service providers around the globe. The partnership falls in line with

infrastructure architects, managers and operators with pervasive and dynamic intelligent visibility of traffic across both physical and virtual environments without affecting the performance or stability of the production network.

Paul Sherry, Senior Regional Sales Director, MEA, Gigamon, said, “Globally, we are a channel oriented organization. Our focus is on value-added resellers, those partners who have the right profiling of products. We want to work with Redington Value to build our channel network across the whole GCC.”

Redington Value is the Value Added Distribution division of Redington Gulf, the largest distributor of IT products in Middle East and Africa. Redington Value helps its partners in the channel deliver the most optimal IT solution to their customers in Middle East and Africa. These solutions span across technology domains such as Networking, Voice, Servers, Storage, Software, Security and Infrastructure. Over 34 vendor relationships in various parts of Middle East and Africa ensure that all the requirements of the channel are met under one-roof. This is supported by in-house pre-sales expertise to support partners, regular sales/technical training and programs to benefit partners do more business.

NEWS | GIGAMON

“Globally, we are a channel oriented organization. Our focus is on value-added resellers, those partners who have the right profiling of products. We want to work with Redington Value to build our channel network across the whole GCC.”

Redington Value’s efforts to offer world-class, fully efficient and reliable security solutions for today’s enterprises in order to protect their businesses.

“Our new partnership agreement with Gigamon

comes at the most opportune and strategic time as today’s businesses need to become more vigilant in maintaining and securing information that deals with management, governance, enablement and execution,” said Hishamul Hasheel, Category Head, Security & Software, Redington Value. “Working closely with Gigamon, which is known for its security solutions for enterprises, data centers and global service providers, will allow us to help these businesses in keeping their data secure – giving our customers the confidence and security that their data and information is free from any cyber-attack.”

Gigamon is a leading IT security solutions provider that offers an intelligent Visibility Fabric architecture for enterprises, data centers and service providers around the globe-empowering

PAUL SHERRY, SENIOR REGIONAL SALES DIRECTOR, MEA, GIGAMON

8 The ValuePlus Quarterly July 2015

For more information, please write to [email protected]

Page 9: ValuePlus July 2015

Can you see into even the darkest corners of your network infrastructure?

Are you sure? Because right now, as you’re reading this, someone is probably trying to find out. Learn how Gigamon and our extensive partner ecosystem can make sure your confidence isn’t misplaced, shining a light across your whole network: • Physical • Virtual • SDN/NFV Environments • Private & Public Clouds

The Gigamon Visibility Fabric Architecture delivers simple, automated Pervasive Visibility that allows pro-active security and real-time decision making.

SEE MORE. SECURE MORE.

For more information or to place an order on Gigamon,please write to [email protected]

Page 10: ValuePlus July 2015

For more information or to place an order on Oracle,please write to [email protected]

Page 11: ValuePlus July 2015

At the outset it is important to compare and contrast the nature of the battle between

those that target your organization, and the infrastructure and resources at your disposal. The general aim of attackers is to breach your networks, steal your data, intellectual property, monitor your communications, damage your brand or other nefarious objectives.

Safeguarding assets Trend Micro elaborates how organizations can design a secure business environment with its innovative capabilities.

All of these actions are the result of research, purpose built design, testing and execution to circumvent existing security measures, exploit software, system and employee vulnerabilities. These activities are influenced by factors such as ensuring a low probability of detection and a high probability of success.

In short, attackers will take whatever means are necessary to achieve their objectives.

Although, at a high level, the attack sequence tends to follow a set methodology, the means and methods with which attacks are executed should not be assumed to be predictable. In fact, the applications, devices, communication and application protocols, network ports, command and control, malware behavior and probable attacker targets should be expected to be both unpredictable, and, dynamic

both for a given targeted attack, and, as attacks vary over time. The point being, to create a solid defense against targeted attacks and advanced threats organizations need to develop the following capabilities:1. Monitoring of inbound, outbound and internal network traffic for malicious behavior, suspect communications, payloads and attacker behavior. Further, to

TREND MICRO | FOCUS

For more information or to place an order on Oracle,please write to [email protected] July 2015 The ValuePlus Quarterly 11

For more information, please write to [email protected]

Page 12: ValuePlus July 2015

ensure no potential points of entry are left unmonitored, this must occur seamlessly across a variety of devices. Ideally, anything that is assigned an IP Address and accesses your network(s) should be monitored for potential malicious activity.2. The ability to rapidly identify and triage known components of the early stages of targeted attacks such as malicious URLs, command and control servers, known malicious mobile apps, known malicious payloads and known bad files.3. Comprehensive analysis of suspicious payloads for exploits, zero day attacks, and evasion techniques in a manner that is consistent with your operating system and application environments. The ability to readily customize sandboxes to match computing environments as your needs change is a key attribute of this capability.4. Ease of access to correlated and actionable insight on threat activity within your network. 5. The ability to rapidly correlate threat insight from your network with a proven and reliable external source so that your security teams can proactively identify threat and respond accordingly.6. The ability to identify the extent of a breach, prioritize actions and ensure efficient allocation of resources for remediation.

Trend Micro provides major capabilities, which organizations can leverage to create the required secure business environment. Below is the brief for each capability and the value Trend Micro offers.

Custom Detection • Custom sandboxing matches exact computing images, providing accurate detection and reduced false positives. Image scan include anything desired that runs on Windows. Your security team is not limited to a checklist of standard products and operating system versions. • Deep Discovery malware detection is not just sandboxing. It uses multiple threat detection engines and multi-level threat correlation rules to detect malware in several ways. Among the benefits: detection of Mac and mobile malware.• But malware is only part of the story – usually just the first step in a targeted attack. Deep Discovery detection engines and rules also identify C&C communications and high risk attacker activities.• And to make all of the above truly effective – you need to examine all ports and protocols – not just email & HTTP traffic and associated ports. Deep Discovery examines all ports and over eighty protocols and applications to detect malware, communications or attacker activities wherever and however they are happening. • Custom blacklists can be configured and custom threat detection rules created (supported in 2014).

Custom Intelligence • Direct access to extensive threat insight and information in an intuitive form that expedites fast risk assessment and response that includes:- Threat Profile: What are the characteristics, origins and

variants of this malware.➢- C&C Information: What is the nature of the detected C&C. What C&C addresses are known to be associated with this malware or incident.- Attack Group/Campaign: Who and what is behind this threat. - Containment and Remediation: What to look for, how to remediate and eradicate. • Deep Discovery provides an even more context-rich view of the incident and can collect and analyze logs from any security product you own. With this rich information, you can match the threat profile to events across your network, quickly determining the extent of the attack your remediation plan.

Total Cost of Ownership• Deep Discovery Inspector does it all in a single appliance– all protocols and ports, web, email, internal traffic. No separate appliances for web, email, and coordination between the two. • Deep Discovery Analyzer is an optional separate server for additional custom sandboxing capacity beyond the native capabilities provided with Deep Discovery Inspector.• Deep Discovery runs on standard hardware – nothing proprietary. We offer bundled HW appliances, but also virtual appliances, letting you choose

the HW platform, reducing your costs and giving you flexibility.• Deep Discovery is priced to meet your budget. Competitive pricing, flexible form factors and a single appliance approach mean that Deep Discovery will be half the price of the competition.

The Custom Defense• Deep Discovery adds the critical network detection and analysis capability that any organization needs. But Deep Discovery can do more than that. • Deep Discovery open APIs allow the malware detection engines and sandboxing to be integrated into any product and also used directly by your security response teams as well as sharing of detected command and control information with firewalls, gateways and other security products. • All information can be fed to your SIEM, but focused log analysis can speed your response without the complexity of a SIEM. • These Capabilities help unite your entire security infrastructure into a better defense against targeted attacks - what we call a Custom Defense. Why settle for an isolated, point product when you can improve your entire security posture?

Deep Discovery malware detection is not just sandboxing. It uses multiple threat detection engines and multi-level threat correlation rules to detect malware in several ways.

FOCUS | TREND MICRO

12 The ValuePlus Quarterly July 2015

For more information, please write to [email protected]

Page 13: ValuePlus July 2015

Empowering businesses

The challenge: Out-perform physical desktopsEmployees are

more mobile than ever, and they expect access to business critical data and applications whenever and wherever they are, and from any device. They want the flexibility to bring their own device to work, meaning IT departments are increasingly investigating and supporting

EMC’s VSPEX end user computing with XtremIO solution allows users to deploy all-flash virtual desktops simply, efficiently and flexibly.

Bring Your Own Device (BYOD) initiatives. This adds layers of complexity when it comes to safeguarding sensitive information. Deploying a virtual desktop project is one way to do this.

Implementing large-scale virtual desktop environments, however, presents many challenges. Administrators must rapidly roll out persistent or non-persistent desktops for all users – task

July 2015 The ValuePlus Quarterly 13

For more information, please write to [email protected]

EMC | IN-DEPTH

Page 14: ValuePlus July 2015

XtremIO’s always-on, real-time inline data reduction technology dramatically shrinks the amount of storage capacity required to support virtual desktop environments.

workers, knowledge workers, and power users – while offering an outstanding user experience that outperforms physical desktops.

In addition to performance, a virtual desktop solution must be simple to deploy, manage, and scale with substantial cost savings over physical desktops. Storage is also a critical component of an effective virtual desktop solution. EMC VSPEX Proven Infrastructures are designed to help you address the most serious of IT challenges by creating solutions that are simple, efficient, and flexible and designed to take advantage of the many possibilities that XtremIO’s flash technology delivers.

The solution: VSPEX for end user computing with XtremIOXtremIO is ideally suited for VSPEX End User Computing solutions with VMware Horizon View. This solution comes in two reference architectures: VSPEX with XtremIO X-Brick for up to 2500 persistent /3500 non-persistent virtual desktops, VSPEX with Starter X-Brick for up to 1250 persistent/1750 non persistent virtual desktops. With VSPEX and XtremIO, applications respond instantly and consistently and business-critical data is immediately available, faster than on physical desktops. XtremIO’s All-Flash architecture delivers any desired level of performance, from hundreds of IOPS to burst capacity to thousands of IOPS per desktop, meaning every virtual desktop user enjoys the best user experience.

Additionally, users are unaffected by boot storms, antivirus scans, suspend/resume operations, application peak demands, user activity, or used capacity on the XtremIO array that can bog down typical virtual desktop implementations. An added benefit of XtremIO’s high performance and ultra-low latency is the reduction in the number of services required to support higher numbers of users. Finally, as with every VSPEX solution, VSPEX and XtremIO virtual desktop solution is rigorously tested and validated, so it is proven to solve customer challenges and accelerate deployment.

Simple: Fast and easy scaling from pilot to productionXtremIO empowers you to easily move from pilot to large-scale production. In contrast to all other virtual desktop storage solutions, XtremIO enables you to quickly deploy linked clones, full clones, and pooled-static, pooled-random, dedicated, or Provisioning Services (PVS) desktops, or any combination of these to meet business requirements with no concessions for storage performance. In short, XtremIO is easy to deploy.

Efficient: Tight integration lets you do more with lessThis VSPEX solution highlight’s EMC’s tight integration with VMware. XtremIO is the only fully compliant all-flash array to integrate all of the VMware VAAI (vStorage APIs for Array Integration) commands. As a result, XtremIO systems off-load common VMware storage management tasks, enabling unprecedented data center agility. Additionally with EMC Virtual Storage Integrator (VSI), a no-charge VMware vCenter plug-in, IT administrators can do more in less time. VSI offers unmatched access control that enables you to efficiently manage and delegate storage tasks with confidence and perform daily management tasks with up to 90 percent fewer clicks and up to 10 times higher productivity. VSI provides you with the ability to easily deploy VMware Horizon View virtual desktops from vCenter within minutes. XtremIO enables offloading and acceleration of common tasks to its all-flash arrays, and easily supports all types of users and mixed workloads. Add this up, and you can see how efficient XtremIO is to manage. Built in data protection lets you rest assured knowing critical information is protected centrally. The system is also self-healing and can rebuild

failed drives rapidly. XtremIO’s data protection is faster than traditional RAID with less write cycles and less overhead.

FlexibilityXtremIO delivers performance that scales as the number of desktops grows. Leveraging unique in-memory provisioning, XtremIO’s scale-out design easily supports additional performance and capacity requirements, automatically delivering more performance to existing desktops. This keeps the entire environment balanced as it grows and ensures that every user always gets the best desktop experience.

Deliver performance and consistent end user experience more cost-effectively than physical desktopsXtremIO’s always-on, real-time inline data reduction technology dramatically shrinks the amount of storage capacity required to support virtual desktop environments. Thousands of virtual desktops can be deployed with only a few terabytes of flash. For the first time, full clone desktops can be deployed easily and cost-effectively, allowing existing desktop management tools and applications to be re-used in virtual desktop environments. Non-persistent desktops can also be used alone or in combination with persistent desktops. Administrators no longer need to de-feature desktops or be limited to non-persistent desktops. Every desktop can be fully functional, customizable, and affordable. At the lowest cost per desktop, XtremIO makes all-flash storage for virtual desktops completely affordable.

14 The ValuePlus Quarterly July 2015

For more information, please write to [email protected]

IN-DEPTH | EMC

Page 15: ValuePlus July 2015

Can you give us a brief history of Barracuda in the region and the successful business in providing IT security and

other security related solutions?We opened our first office in Dubai three years ago with just one employee ‘on the ground’. Today, we have over 10 staff ‘on the ground’, an inside sales team in the UK to support and a dedicated marketing manager. We’re committed to investing and developing our focus in the Middle East and Africa further and plan to do this with a focus on our channel partnerships within the region. Our partners are all certified and trained on our product portfolio. Best sellers in the region to date include the Barracuda Web Application Firewall (WAF), Barracuda Application Delivery Controller (ADC) and Barracuda Spam Firewall.

Next-gen defenseToni El Inati, Regional Sales Director MEA, Barracuda, discusses in-depth plans and channel initiatives for the region.

Which new partnerships has Barracuda earmarked for 2015 and beyond in order to best provide further products and services to the region’s businesses? We held our EMEA partner conference in Dubai back in May. The conference was an invitation only event for key channel partners to get up close with the company’s team of technology experts and business leaders. At the EMEA-focused event, we awarded one of our Middle-Eastern channel partners, ‘EMEA Storage Specialist of the Year for their commitment to selling the Barracuda Backup product. During the last 12 months, it has implemented projects in hospitality, retail and public sectors with customised Barracuda backup and data protection offerings.

We’ve recruited a number of new reseller partners over the last

year, which has contributed significantly to the success and growth we have seen in the region.

In April, we relaunched our worldwide partner programme. The new programme offers our partners an improved discount structure, new tools and resources, more lead opportunities, differentiated partner levels and support for managed service partners. It is designed to accelerate profitability for loyal partners and to attract new, motivated partners.

Looking at 2015/2016, what does Barracuda see as the main demands of end-user enterprises in terms of IT security, cloud and virtualisation? A recent Freeform Dynamics study, commissioned by Barracuda showed that businesses are fearful of sinking under the growing weight of IT

expectation and this is exactly what we’re seeing in the Middle East. Increasing cloud adoption, remote or mobile access and rising network traffic are creating significant new demands on existing network infrastructure. Significantly the research found confidence gaps amongst those tasked with adapting existing IT infrastructure to meet the new demands being placed on it.

To overcome these challenges, we see there being a big focus and need for Next Generation (NG) Firewalls. Organisations can improve their security by using a NG Firewall to integrate previously disparate security functions. These include web filtering, malware protection, email security, intrusion prevention, application control and advanced threat detection.

BARRACUDA | INTERVIEW

July 2015 The ValuePlus Quarterly 15

For more information, please write to [email protected]

Page 16: ValuePlus July 2015

Are enterprises adequately investing in further education and training from Barracuda (and other industry players) or are many still reluctant to introduce their operations to an outside 3rd party?One of our reseller partners, Fast Lane is our first authorised learning partner in the Middle East and Africa region. Training courses include:

- Barracuda NGSE (Next Generation Security Engineer)

- Barracuda Web Application Firewall Systems Engineer

- Barracuda Load Balancer ADC System Engineer

The training programmes through Fast Lane are designed to enrich the Barracuda portfolio to meet our customers’ needs and demands across various technologies.

Cloud adoption, virtualisation, Big Data and mobility have been big talking points for 2015. How is Barracuda advising enterprises to best prioritise investments for 2015/2016 across these operations in order to better streamline the security of networks? Barracuda has added networking and application security capabilities to complement enhancements made to Azure. Customers using Barracuda NG Firewall and Barracuda Web Application Firewall can benefit from extended security capabilities and Azure Resource Manager Templates for faster, easier and security-enhanced Azure deployments. The Azure routing features allow the Barracuda NG Firewall to act as the default gateway for all machines on the

same Virtual Network (VNET). This enables security and operations teams to get full traffic visibility both in and out of VNETs as well as the ability to control all traffic.

Barracuda NG Firewall and Barracuda Web Application Firewall in Azure are part of the Barracuda Total Threat Protection initiative, which is aimed at providing powerful, integrated security protection across multiple threat vectors at an affordable cost. Barracuda Total Threat Protection is designed to protect multiple threat vectors – including email, web applications, remote access, web browsing by network users, mobile Internet access, and network perimeters – that span private and public cloud deployments. It includes the combination of award-winning security solutions, a common management interface, a single point of support, and affordability.

How has the BYOD phenomenon affected how Barracuda does business and how are clients best protecting their networks with BYOD becoming increasingly dominant?As increasing numbers of mobile devices access corporate networks, many of them outside of the IT department’s control, it has become ever more difficult to identify and define a network’s ‘perimeter’. What was once a clearly defined and relatively static line of demarcation between devices on the network and the rest of the world has now become amorphous, fluid, and unpredictable.

Mobile Device Management (MDM) allows IT personnel to directly control and provision mobile devices. Essentially, MDM is meant to give IT the same control over employee-owned mobile devices as they have always had over employer-owned PCs.

To be implemented successfully, it must meet two key requirements. First, it must be reasonable. That is, it should not seek to impose the same level of proprietary control over BYOD devices that IT is accustomed to imposing on desktop PCs. It should provide some kind of data loss prevention, and it should impose controls to prevent malware intrusion. It should also give IT the power to remotely wipe memory in case of theft or loss. Beyond that it should do little, if anything.

The second requirement is that the resources to which it regulates access should be kept to the absolute minimum possible. Only confidential customer data, proprietary business data, and similarly sensitive content should require MDM for mobile-device access. Less sensitive resources, such as email, IM, project management, document management, and others (depending on the industry and on individual organisational structure), should be made available to BYOD users whether or not their devices are subject to MDM controls.

With data leakages on the rise, especially as the region’s market begins to enter early maturity, what is the current landscape of firewall products?The technology behind network security is evolving all the time, with years of enhancements and continuous intelligence added to security technologies such as firewalls. All this is designed to improve processes and minimise the risk of human error

impacting the security in any business. Since the birth of the firewall some twenty odd years ago, the reason why organisations are using them and what for has changed significantly. The concept of a firewall cannot be a simple barrier between good and bad. It’s an instrument that introduces qualities to the Internet protocol-based infrastructure, which were intentionally left out of the basics. Most prominent are control, predictability and usage-based regulations, i.e. rules based on people and what they do instead of protocol-related rules.

At Barracuda, one of our biggest customer deployments of the NG Firewall to date is within a well-known bank in the Middle East. The Barracuda NG Firewall is much more than a traditional firewall. It is designed to protect network infrastructure, improve site-to-site connectivity and simplify administration of network operations. Over the past three years, we’ve seen a significant increase in demand for the Barracuda NG Firewall.

*This interview is from the July issue of

Inside_Networks_ME and is reprinted

with the permission of Lynchpin Media.

Mobile Device Management (MDM) allows IT personnel to directly control and provision mobile devices.

TONI EL INATI, REGIONAL SALES DIRECTOR MEA, BARRACUDA

INTERVIEW | BARRACUDA

16 The ValuePlus Quarterly July 2015

For more information, please write to [email protected]

Page 17: ValuePlus July 2015

July 2015 The ValuePlus Quarterly 17

For more information, please write to [email protected]

For more information or to place an order on Dell Software,please write to [email protected]

Page 18: ValuePlus July 2015

Digital experiences have become the cornerstone of just about every customer experience,

driven in part by the rapid spread of web, mobile, and social channels. Customers are in control. They decide how, when, and where they want to engage with your brand—whether it is in the store, over the phone, via a mobile app, or on the web. But no matter which channel they choose, customers expect your company to know who they are and to seamlessly recognize them at every touch-point. Mistakes are costly. Given the fluidity of today’s online exchanges, consumers are often one click away from

Exceptional experiencesAccelerate revenue growth, service excellence, and business efficiency with Oracle WebCenter

defecting to a competitor or broadcasting a bad experience to hundreds of friends.

In some cases, marketers and IT personnel struggle to create the right engagements because they lack the necessary connections among these sources of information. They rely on disconnected “point” applications, each with its own source of customer data. Customer information is often stored in multiple digital silos—both within the organization as well as from second and third parties. This information may include e-mail messages, interactions from social forums, data from weblogs, and much more.

With so many disconnected sources, it’s difficult to develop a cohesive view of your customers, prospects, and audience segments. This disparity can lead to customer experiences that are inconsistent, one-dimensional, and lacking in context or relevancy. For example, web visitors may have separate

types of experiences when they engage in a “buy” versus “service” manner across different devices and channels.

To market effectively in this diverse environment, you need systems that can rapidly convert anonymous audiences into “known” customers, so that they

IN-DEPTH | ORACLE

Oracle WebCenter helps people work together more efficiently through contextual collaboration tools that optimize connections between people, information, and applications.

18 The ValuePlus Quarterly July 2015

For more information, please write to [email protected]

Page 19: ValuePlus July 2015

can be further developed into involved customers or advocates. This requires gathering rich, granular customer information to inform the entire customer-engagement loop, including buy-side and service-side experiences.

How do you deliver an experience that reflects your understanding of who your customers are so you can meet their needs, secure their loyalty, and effectively sell your products and services to them? You do it by eliminating information silos and

new products, establish comprehensive customer-facing services, and construct nimble business models. They have learned how to empower their constituents with self-service operations—including customers, citizens,employees, suppliers, and partners—even as they optimize their business operations.The Oracle digital experience platform can be integrated directly with enterprise business applications,

mobile, social, in store, contact center, and others).

Oracle digital experience in action Panduit a world-class manufacturer of engineered systems and automation solutions, leveraged the Oracle digital experience platform to provide seamless, tailored, and innovative end-to-end digital experiences across both buy-side and service-side engagements.

“Fifty-five percent of consumers prefer automated self-service, and 26 percent of them use their mobile devices for these activities.”

CISCO SYSTEMS

H A L L M A R K S O F A N E X C P T I O N A L D I G I T A L E X P E R I E N C E

» Seamless: A customer experience that engages and enhances your brand requires consistency across channels and devices.

» Tailored: A customized experience delivers the right information and context to the right audience at the right time— throughout the engagement cycle.

» Innovative: Leveraging social marketing, video experiences, rich mobile applications, and other interactive tools are all good ways to set your brand apart.

“84 percent of smartphone shoppers use their devices to guide their in-store shopping experiences.”

GOOGLE RESEARCH

critical channels of engagement (web, mobile, social, in store, contact center, and others).

Four steps to next-generation experiences.

Oracle Digital Experience in Action Panduit a world-class manufacturer of engineered systems and automation solutions, leveraged the Oracle digital experience platform to provide seamless, tailored, and innovative end-to-end digital experiences across both buy-side and service-side engagements. The solution includes integrated platform features, out-of-the-box social media connections, built-in analytics, and support for mobile devices. This robust digital experience solution has enabled Panduit to engage its sophisticated partner ecosystem with secure, multilingual, and cohesive online experiences.

The results have been outstanding. Panduit has improved the number and quality of sales leads via web and mobile interactions, yielding 57 percent growth in online transactions and US$600,000 savings in the first year (a 58 percent return on investment) by eliminating redundancies within its technology stack. Site analytics reveal that users can complete online transactions 20 percent faster and with greater accuracy and consistency. Watch this video to learn more about Panduit’s successful deployment of digital experience and engagement technology.

Conclusion Mobile, social, and cloud paradigms are creating new opportunities for growth and innovation, even as they force organizations to rethink how they should approach their markets. According to IDC, 70 percent of the buying cycle takes place before customers ever engage with a live sales person. That means that the first connection a prospective customer has with your company, and possibly the last, is governed by the quality of the digital experience you have created.

Today’s enterprises need to connect experiences to outcomes that encompass the entire customer engagement lifecycle. Becoming a digital business is imperative to the next wave of revenue growth, service excellence, and business efficiency.

For more information on how you can create exceptional customer experiences, visit oracle.com/webcenter and oracle.com/applications/customer-experience/index.html.

CREATING EXCEPTIONAL DIGITAL EXPERIENCES 2

The solution includes integrated platform features, out-of-the-box social media connections, built-in analytics, and support for mobile devices. This robust digital experience solution has enabled Panduit to engage its sophisticated partner ecosystem with secure, multilingual, and cohesive online experiences.

The results have been outstanding. Panduit has improved the number and quality of sales leads via web and mobile interactions, yielding 57 percent growth in online transactions and US$600,000 savings in the first year (a 58 percent return on investment) by eliminating redundancies within its technology stack. Site analytics reveal that users can complete online transactions 20 percent faster and with greater accuracy and consistency.

Mobile, social, and cloud paradigms are creating new opportunities for growth and innovation, even as they force organizations to rethink how they should approach their markets. According to IDC, 70 percent of the buying cycle takes place before customers ever engage with a live sales person. That means that the first connection a prospective customer has with your company, and possibly the last, is governed by the quality of the digital experience you have created.

Today’s enterprises need to connect experiences to outcomes that encompass the entire customer engagement lifecycle. Becoming a digital business is imperative to the next wave of revenue growth, service excellence, and business efficiency.

fragmented customer engagement tools. You do it by creating a cohesive digital experience platform that can be leveraged across all marketing functions, and used to connect marketing activities to the rest of the enterprise.

Oracle WebCenter: The center of engagement for digital business Oracle WebCenter is the center of engagement for digital

businesses. It helps people work together more efficiently through contextual collaboration tools that optimize connections between people, information, and applications. Oracle WebCenter ensures users have access to the right information in the context of the business process in which they are engaged.

Market-leading companies around the world use this robust digital experience and engagement platform to launch

analytics applications, and existing customer databases or data marts that run and drive your business. This platform also leverages a powerful, high-performance infrastructure that can support millions of transactions and personalized interactions. It is this single platform that allows you to support sales, marketing, client onboarding, warranty service, and other business functions—accessible through your critical channels of engagement (web,

July 2015 The ValuePlus Quarterly 19

For more information, please write to [email protected]

Page 20: ValuePlus July 2015

4

1

3

2

REDINGTON VALUE EVENTS

REDINGTON VALUE SOCIAL MEDIA

1. Redington Value participates in GISEC – Gulf Information Security Expo & Conference – Dubai, United Arab Emirates from 26th to 28th April 2015

2. VCE ‘Focus on Innovation’ Event with Redington Value in Nairobi, Kenya on 5th May 2015

3. VMWare Technical Sales Professional training in Redington Value Riyadh Office, KSA on 14th June 2015

4. EMC - Resourcery end customer event with Redington Value in Lagos, Nigeria on 15th April 2015

https://www.facebook.com/redington.value

https://twitter.com/redingtonvalue https://www.youtube.com/user/RedingtonValueTV

LIKEUS ON

FOLLOWUS ON

VIEWUS ON

Page 21: ValuePlus July 2015

The Dell SonicWALL TZ Series of next-generation firewalls (NGFW) is ideally suited for any organization

that requires enterprise-grade network protection. SonicWALL TZ Series firewalls provide broad protection from compromise by combining advanced security services consisting of on-box and cloud-based anti-malware, anti-spyware, intrusion prevention system (IPS), and content/URL filtering. To counter the trend of encrypted attacks, the new SonicWALL TZ Series has the ability and processing power to inspect SSL connections against the latest threats, providing an even higher level of security. Backed by the Dell SonicWALL Global Response Intelligent Defense (GRID) network, the SonicWALL TZ Series delivers continuous updates to maintain a strong network defense from cybercriminals. With full deep

Boost performanceSonicWALL TZ Series is ideal for high-performance network security for small and medium businesses, remote/branch offices and retail locations

packet inspection operating at performance levels that match broadband connection speeds, the SonicWALL TZ Series is able to scan every byte of every packet on all ports and protocols with almost zero latency. This eliminates bottlenecks and allows organizations to use security as an enabler, not an inhibitor.

The SonicWALL TZ Series also features an integrated wireless access controller, 1-Gigabit Ethernet ports, and native VPN remote access clients for Apple IOS, Google Android, Windows, Mac OS and Linux for fast, secure mobile access. The Dell SonicWALL Global Management System (GMS) enables deployment and management of SonicWALL TZ Series firewalls from a single system at the central office. The products include fully tested routing features for IPv4 and IPv6, including route-based VPN protocols OSPF and RIP v1/v2.

Authentication protocols support includes LDAP and RADIUS as well as single sign-on capability that can integrate with Active Directory. All Dell SonicWALL firewalls provide advanced threat protection from botnets, and UDP and ICMP flooding.

Protection for SMBThe SonicWALL TZ Series offers small and medium business (SMB) a broad range of security protection in an integrated solution, with a wide selection of products to match speed and budget requirements. Intuitive wizards simplify deployment and setup. And should broadband service be interrupted, connections can be retained with integrated 3G/4G support. In addition, many of the SonicWALL TZ Series products feature integrated wireless controller support for high speed 802.11ac SonicPoint wireless access points

Managed security for distributed environmentsSchools, retail shops, remote sites, branch offices and distributed enterprises need a solution that integrates with their corporate firewall. SonicWALL TZ Series firewalls share the same code base—and same protection—as our flagship Super Massive next generation firewalls.

This simplifies remote site management, as every administrator sees the same user interface (UI). In addition, GMS enables remote Dell firewalls to be monitored, configured and managed through a single pane of glass. By adding high-speed, secure wireless, the SonicWALL TZ Series also extends the protection perimeter to include customers and guests frequenting the retail site or remote office.

For complex distributed environments, Dell firewalls give you a strong security perimeter

DELL SOFTWARE | FEATURE

July 2015 The ValuePlus Quarterly 21

For more information, please write to [email protected]

Page 22: ValuePlus July 2015

that extends from the central office to all remote locations to ensure consistent application of policies for the entire organization.

Reassembly-Free Deep Packet Inspection (RFDPI) engineThe RFDPI engine provides superior threat protection and application control without compromising performance. This patented engine inspects the traffic stream to detect threats at Layers 3-7. The RFDPI engine takes network streams through extensive and repeated normalization and decryption in order to neutralize advanced evasion techniques that seek to confuse detection engines and sneak malicious code into the network. Once a packet undergoes the necessary preprocessing, including SSL decryption, it is analyzed against a single proprietary memory representation of three signature databases: intrusion attacks, malware and applications. The connection state is then advanced to represent the position of the stream relative to these databases until it encounters a state of attack, or another “match” event, at which point a pre-set action is taken. As malware is identified, the SonicWALL firewall terminates the connection before any compromise can be achieved and properly logs the event. However, the engine can also be configured for inspection only or, in the case of application detection, to provide Layer 7 bandwidth management services for the remainder of the application stream as soon as the application is identified.

Extensible architecture for extreme scalability and performanceThe RFDPI engine is designed from the ground up with an emphasis

FEATURE | DELL SOFTWARE

on providing security scanning at a high performance level, to match both the inherently parallel and ever-growing nature of network traffic. When combined with multi-core processor systems, this parallel-centric software architecture scales up perfectly to address the demands of deep packet inspection at high traffic loads. The SonicWALL TZ Series platform relies on processors that, unlike x86, are optimized for packet, crypto and network processing while retaining flexibility and programmability in the field—a weak point for ASICs systems. This flexibility is essential when new code and behavior updates are necessary to protect

against new attacks that require updated and more sophisticated detection techniques.

Security and protectionThe dedicated, in-house Dell SonicWALL Threat Research Team works on researching and developing countermeasures to deploy to the firewalls in the field for up-to-date protection. The team leverages more than one million sensors across the globe for malware samples, and for telemetry feedback on the latest threat Information, which in turn is fed into the intrusion prevention, anti-malware and application detection capabilities. Dell SonicWALL firewall customers with current subscriptions are provided

inbound or outbound attacks or performance bottlenecks.

Dell SonicWALL application traffic analytics provide granular insight into application traffic, bandwidth utilization and security threats, as well as powerful troubleshooting and forensics capabilities. Additionally, secure single sign-on (SSO) capabilities enhance the user experience, increase productivity and reduce support calls. Management of application intelligence and control is simplified by using an intuitive web-based interface.

Global management and reportingFor larger, distributed enterprise deployments, the optional Dell SonicWALL Global Management System (GMS) provides administrators a unified, secure and extensible platform to manage Dell SonicWALL security appliances. It enables enterprises to easily consolidate the management of security appliances, reduce administrative and troubleshooting complexities and governs all operational aspects of the security infrastructure including centralized policy management and enforcement, real-time event monitoring, analytics and reporting, and more. GMS also meets the firewall change management requirements of enterprises through a workflow automation feature. This enables enterprises to gain agility and confidence in deploying the right firewall policies, at the right time, and in conformance with compliance regulations. GMS provides a better way to manage network security by business processes and service levels that dramatically simplify the lifecycle management of your overall security environments rather than on a device by-device basis.

The RFDPI engine provides superior threat protection and application control without compromising performance.

Brought to you by HP & Intel®. © 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

Architectthe now and future-forward. Infrastructure for the New Style of IT. What is the New Style of IT? A modern, dynamic environment advanced by total mobility, real-time analytics, on-demand services, and security that adapts to threats wherever they are. And no one is more poised to help you master it than HP and Redington Value . Spanning hardware, software, and services, HP has the deep expertise to help you align your IT and business to work as one powerful value creator. How far you take your business tomorrow depends on how fast you transform your infrastructure today. Let’s get started.

continuously updated threat protection around the clock, with new updates taking effect immediately without reboots or interruptions. The signatures on the appliances protect against wide classes of attacks, covering up to tens of thousands of individual threats with a single signature. In addition to the countermeasures on the appliance, all Dell SonicWALL firewalls also have access to the Dell SonicWALL CloudAV service, which extends the onboard signature intelligence with more than 17 million signatures, and growing. This CloudAV database is accessed via a proprietary light-weight protocol by the firewall to

augment the inspection done on the appliance. With Geo-IP and botnet filtering capabilities, Dell SonicWALL next-generation firewalls are able to block traffic from dangerous domains or entire geographies in order to reduce the risk profile of the network.

Application intelligence and controlApplication intelligence informs administrators of application traffic traversing the network, so they can schedule application controls based on business priority, throttle unproductive applications, and block potentially dangerous applications.

Real-time visualization identifies traffic anomalies as they happen, enabling immediate countermeasures against potential

22 The ValuePlus Quarterly July 2015

For more information, please write to [email protected]

Page 23: ValuePlus July 2015

Brought to you by HP & Intel®. © 2015 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice. Intel and the Intel logo are trademarks of Intel Corporation in the U.S. and/or other countries.

Architectthe now and future-forward. Infrastructure for the New Style of IT. What is the New Style of IT? A modern, dynamic environment advanced by total mobility, real-time analytics, on-demand services, and security that adapts to threats wherever they are. And no one is more poised to help you master it than HP and Redington Value . Spanning hardware, software, and services, HP has the deep expertise to help you align your IT and business to work as one powerful value creator. How far you take your business tomorrow depends on how fast you transform your infrastructure today. Let’s get started.

For more information or to place an order on HP Enterprise,please write to [email protected]

Page 24: ValuePlus July 2015

For more information or to place an order on EMC,please write to [email protected]

BUSINESSPARTNER

REDEFINESIMPLICITYAGILE. SCALABLE. TRUSTED.